Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe
Resource
win10v2004-20241007-en
General
-
Target
207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe
-
Size
468KB
-
MD5
802f33e95e89e336ce40395ee6472a70
-
SHA1
b94fd0488dd4859aa8cb18df66dcb3222633e5fd
-
SHA256
207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243
-
SHA512
9322496beaad74774cbd06b471b7b8e7247e8e4568b9288a85a39b9ba5d3752f2dc71e36e8fa3428e7874e95ada78736fbf92786885e93d068ab07f02a1079f6
-
SSDEEP
3072:1GeHo5IKq05UDbYnH5cOcf8/vCuzc0T1nIHexVPtqPH+X7psvRld:1Guoe8UDwHSOcf1i95qPeLpsv
Malware Config
Signatures
-
Executes dropped EXE 27 IoCs
pid Process 1004 Unicorn-39401.exe 244 Unicorn-13682.exe 1428 Unicorn-444.exe 4012 Unicorn-48851.exe 4236 Unicorn-54087.exe 2416 Unicorn-10122.exe 3332 Unicorn-50709.exe 5032 Unicorn-21135.exe 1172 Unicorn-38815.exe 4600 Unicorn-25577.exe 4508 Unicorn-12146.exe 2700 Unicorn-17347.exe 4900 Unicorn-35027.exe 2468 Unicorn-52515.exe 2856 Unicorn-5042.exe 4832 Unicorn-22531.exe 4172 Unicorn-27923.exe 3012 Unicorn-10600.exe 1960 Unicorn-27897.exe 3888 Unicorn-45385.exe 1464 Unicorn-32339.exe 4884 Unicorn-49827.exe 2464 Unicorn-55603.exe 1256 Unicorn-7554.exe 3932 Unicorn-25235.exe 4964 Unicorn-42723.exe 4860 Unicorn-29293.exe -
Program crash 28 IoCs
pid pid_target Process procid_target 4876 3532 WerFault.exe 82 3812 1004 WerFault.exe 86 712 244 WerFault.exe 90 3248 1428 WerFault.exe 93 2972 4012 WerFault.exe 96 1960 4236 WerFault.exe 99 3464 2416 WerFault.exe 102 5028 3332 WerFault.exe 105 1192 5032 WerFault.exe 108 3564 1172 WerFault.exe 111 2864 4600 WerFault.exe 116 4080 4508 WerFault.exe 119 772 2700 WerFault.exe 122 3520 4900 WerFault.exe 125 3144 2468 WerFault.exe 130 3692 2856 WerFault.exe 133 2212 4832 WerFault.exe 136 2268 4172 WerFault.exe 139 2652 3012 WerFault.exe 142 4688 1960 WerFault.exe 145 3160 3888 WerFault.exe 148 3600 1464 WerFault.exe 151 2772 4884 WerFault.exe 154 1620 2464 WerFault.exe 157 4464 1256 WerFault.exe 160 3428 3932 WerFault.exe 163 4100 4964 WerFault.exe 166 3724 4860 WerFault.exe 169 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54087.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38815.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5042.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 3532 207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe 1004 Unicorn-39401.exe 244 Unicorn-13682.exe 1428 Unicorn-444.exe 4012 Unicorn-48851.exe 4236 Unicorn-54087.exe 2416 Unicorn-10122.exe 3332 Unicorn-50709.exe 5032 Unicorn-21135.exe 1172 Unicorn-38815.exe 4600 Unicorn-25577.exe 4508 Unicorn-12146.exe 2700 Unicorn-17347.exe 4900 Unicorn-35027.exe 2468 Unicorn-52515.exe 2856 Unicorn-5042.exe 4832 Unicorn-22531.exe 4172 Unicorn-27923.exe 3012 Unicorn-10600.exe 1960 Unicorn-27897.exe 3888 Unicorn-45385.exe 1464 Unicorn-32339.exe 4884 Unicorn-49827.exe 2464 Unicorn-55603.exe 1256 Unicorn-7554.exe 3932 Unicorn-25235.exe 4964 Unicorn-42723.exe 4860 Unicorn-29293.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1004 3532 207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe 86 PID 3532 wrote to memory of 1004 3532 207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe 86 PID 3532 wrote to memory of 1004 3532 207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe 86 PID 1004 wrote to memory of 244 1004 Unicorn-39401.exe 90 PID 1004 wrote to memory of 244 1004 Unicorn-39401.exe 90 PID 1004 wrote to memory of 244 1004 Unicorn-39401.exe 90 PID 244 wrote to memory of 1428 244 Unicorn-13682.exe 93 PID 244 wrote to memory of 1428 244 Unicorn-13682.exe 93 PID 244 wrote to memory of 1428 244 Unicorn-13682.exe 93 PID 1428 wrote to memory of 4012 1428 Unicorn-444.exe 96 PID 1428 wrote to memory of 4012 1428 Unicorn-444.exe 96 PID 1428 wrote to memory of 4012 1428 Unicorn-444.exe 96 PID 4012 wrote to memory of 4236 4012 Unicorn-48851.exe 99 PID 4012 wrote to memory of 4236 4012 Unicorn-48851.exe 99 PID 4012 wrote to memory of 4236 4012 Unicorn-48851.exe 99 PID 4236 wrote to memory of 2416 4236 Unicorn-54087.exe 102 PID 4236 wrote to memory of 2416 4236 Unicorn-54087.exe 102 PID 4236 wrote to memory of 2416 4236 Unicorn-54087.exe 102 PID 2416 wrote to memory of 3332 2416 Unicorn-10122.exe 105 PID 2416 wrote to memory of 3332 2416 Unicorn-10122.exe 105 PID 2416 wrote to memory of 3332 2416 Unicorn-10122.exe 105 PID 3332 wrote to memory of 5032 3332 Unicorn-50709.exe 108 PID 3332 wrote to memory of 5032 3332 Unicorn-50709.exe 108 PID 3332 wrote to memory of 5032 3332 Unicorn-50709.exe 108 PID 5032 wrote to memory of 1172 5032 Unicorn-21135.exe 111 PID 5032 wrote to memory of 1172 5032 Unicorn-21135.exe 111 PID 5032 wrote to memory of 1172 5032 Unicorn-21135.exe 111 PID 1172 wrote to memory of 4600 1172 Unicorn-38815.exe 116 PID 1172 wrote to memory of 4600 1172 Unicorn-38815.exe 116 PID 1172 wrote to memory of 4600 1172 Unicorn-38815.exe 116 PID 4600 wrote to memory of 4508 4600 Unicorn-25577.exe 119 PID 4600 wrote to memory of 4508 4600 Unicorn-25577.exe 119 PID 4600 wrote to memory of 4508 4600 Unicorn-25577.exe 119 PID 4508 wrote to memory of 2700 4508 Unicorn-12146.exe 122 PID 4508 wrote to memory of 2700 4508 Unicorn-12146.exe 122 PID 4508 wrote to memory of 2700 4508 Unicorn-12146.exe 122 PID 2700 wrote to memory of 4900 2700 Unicorn-17347.exe 125 PID 2700 wrote to memory of 4900 2700 Unicorn-17347.exe 125 PID 2700 wrote to memory of 4900 2700 Unicorn-17347.exe 125 PID 4900 wrote to memory of 2468 4900 Unicorn-35027.exe 130 PID 4900 wrote to memory of 2468 4900 Unicorn-35027.exe 130 PID 4900 wrote to memory of 2468 4900 Unicorn-35027.exe 130 PID 2468 wrote to memory of 2856 2468 Unicorn-52515.exe 133 PID 2468 wrote to memory of 2856 2468 Unicorn-52515.exe 133 PID 2468 wrote to memory of 2856 2468 Unicorn-52515.exe 133 PID 2856 wrote to memory of 4832 2856 Unicorn-5042.exe 136 PID 2856 wrote to memory of 4832 2856 Unicorn-5042.exe 136 PID 2856 wrote to memory of 4832 2856 Unicorn-5042.exe 136 PID 4832 wrote to memory of 4172 4832 Unicorn-22531.exe 139 PID 4832 wrote to memory of 4172 4832 Unicorn-22531.exe 139 PID 4832 wrote to memory of 4172 4832 Unicorn-22531.exe 139 PID 4172 wrote to memory of 3012 4172 Unicorn-27923.exe 142 PID 4172 wrote to memory of 3012 4172 Unicorn-27923.exe 142 PID 4172 wrote to memory of 3012 4172 Unicorn-27923.exe 142 PID 3012 wrote to memory of 1960 3012 Unicorn-10600.exe 145 PID 3012 wrote to memory of 1960 3012 Unicorn-10600.exe 145 PID 3012 wrote to memory of 1960 3012 Unicorn-10600.exe 145 PID 1960 wrote to memory of 3888 1960 Unicorn-27897.exe 148 PID 1960 wrote to memory of 3888 1960 Unicorn-27897.exe 148 PID 1960 wrote to memory of 3888 1960 Unicorn-27897.exe 148 PID 3888 wrote to memory of 1464 3888 Unicorn-45385.exe 151 PID 3888 wrote to memory of 1464 3888 Unicorn-45385.exe 151 PID 3888 wrote to memory of 1464 3888 Unicorn-45385.exe 151 PID 1464 wrote to memory of 4884 1464 Unicorn-32339.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe"C:\Users\Admin\AppData\Local\Temp\207b016c8de99a87d3d575150a5fea495821598f87e4d2b1b6dc59a4a2d8b243N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39401.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13682.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-444.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48851.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54087.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50709.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21135.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38815.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25577.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12146.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17347.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35027.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52515.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5042.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22531.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27923.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10600.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27897.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45385.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32339.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49827.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7554.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25235.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42723.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29293.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 72029⤵
- Program crash
PID:3724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 72428⤵
- Program crash
PID:4100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 75227⤵
- Program crash
PID:3428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 74426⤵
- Program crash
PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 72425⤵
- Program crash
PID:1620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 74424⤵
- Program crash
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 74423⤵
- Program crash
PID:3600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 72422⤵
- Program crash
PID:3160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 74421⤵
- Program crash
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 74420⤵
- Program crash
PID:2652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 74419⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 74418⤵
- Program crash
PID:2212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 74417⤵
- Program crash
PID:3692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 72416⤵
- Program crash
PID:3144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 75215⤵
- Program crash
PID:3520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 74414⤵
- Program crash
PID:772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 74413⤵
- Program crash
PID:4080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 74412⤵
- Program crash
PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 72411⤵
- Program crash
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 74010⤵
- Program crash
PID:1192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7449⤵
- Program crash
PID:5028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 7408⤵
- Program crash
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7447⤵
- Program crash
PID:1960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7446⤵
- Program crash
PID:2972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 7445⤵
- Program crash
PID:3248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 7244⤵
- Program crash
PID:712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 7243⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 7442⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3532 -ip 35321⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1004 -ip 10041⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 244 -ip 2441⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1428 -ip 14281⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4012 -ip 40121⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4236 -ip 42361⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2416 -ip 24161⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3332 -ip 33321⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5032 -ip 50321⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1172 -ip 11721⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4600 -ip 46001⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4508 -ip 45081⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2700 -ip 27001⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4900 -ip 49001⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2468 -ip 24681⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2856 -ip 28561⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4832 -ip 48321⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4172 -ip 41721⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3012 -ip 30121⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1960 -ip 19601⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3888 -ip 38881⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1464 -ip 14641⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4884 -ip 48841⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2464 -ip 24641⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1256 -ip 12561⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3932 -ip 39321⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4964 -ip 49641⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4860 -ip 48601⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5d89338620af2aaf56c03976b52bff570
SHA193bb1592609290bb76daab8df72fde462d48e9c0
SHA2568191e09ac0fb8bbe986ca10dcd2d34ca9edfdc56e2eb830762f4f6727af5ec1b
SHA51255cd8894cafdd06492fa7e48f8fb04ffffb861ea7c3228acf4030afe9701009e5fdf0914a1f551a87312b50ca099a4ee1cd304f8b57826c4b249195d760dcecc
-
Filesize
468KB
MD5d379a002ed8fccb58665325c7ece0393
SHA1923de484335945928ddfcffbb5d6e825f802e368
SHA2567cb16197edf226be2724e0f7279220a7ea1c2212f1f71eb46e0ec2205e1aa143
SHA512f47c719087fa6fb381182528ca13657e2afb281a654553f42b25a2df996b401c52c8eee4cca91ec82392cde1291d45fefbfeca5070363d71cf001d41cc50cba7
-
Filesize
468KB
MD5c8baf1891b2fa8b5f2a018ff7b77e8e3
SHA11b740ccb713130e591b4767fc8111999bf84b00e
SHA2569146fd5924064b307cc34ba1531781f5af827f7bd901aceaa2bb261528b708a2
SHA512a84bde29a2dffc830f0cd9a253e3fa6f8123097284c478b31e89c1685f85b8f8079f12b35d25a7c690e082b2aea0200fd6e4d574d2acb4e19e9d46a86299ad87
-
Filesize
468KB
MD5e5e81e3999b04c04a3d70db096452bd5
SHA11d18e391fcb5439f014957169f0dde4437c1a51e
SHA2562bb40643a67834241b98ee5536172f4591ab17396b6a81464dbfd4c3c0adec84
SHA512ac70a2371a10fa19c11fc04c03192ff6f902115516971da6a59ab314f427bd9e986cc2e3f4defd3e167d9bff5b6aae417f3871c91ef907a38519247595223cde
-
Filesize
468KB
MD5741ffdd5d7d520d3a457da5ffc7a7477
SHA1432a4c38fb47e3e8996f456ef0d86b63ed0e0800
SHA2566e9882617777a1332c71c86a3713390517640fbbd173b7345a26640e58552845
SHA512e635cdcc8a98d49959e62c43ef2ae0970f23b75451370f1e16d82a98733025c13d47d364ae9ebeb3ce669b96a6945192f28cecb431ea543e252ead931e9adb68
-
Filesize
468KB
MD56d05add1955b2b3053866605a411b791
SHA195c06803783f25cf65e2bf93c8357a7f3eaffaab
SHA2569c42cc2b56146f9915c8ec9dd93e64cbf40b629bddf89a77ae9f8732b4b2d239
SHA512669b96d961c24266b2529dc7ddcfee6d20dfad1e979059d2bd0d1e02e167d57cec482ed30fd0ceccbcc967be824695d98a894769680b0e7ef5615ef4a8ef0163
-
Filesize
468KB
MD5ea8076f2c64b51c2eafe8e8fae47e4de
SHA100e5007bfd6c44609dcfad29cc42752820a0f333
SHA25658e1dae2d7fd9506337a1f3873e211ce7d33cce3e881c881ee2aa295c52dfa15
SHA5123d6c21755da6f6a964152535e21e26e13bb206dc968a21d69babf87bb170232bf747d2c84f41ca80c4d6104f03c7864d8ffe92bcf6bbc68aee5d07c1f092f0d4
-
Filesize
468KB
MD51282ad8405b6ece8d7c5c9ece8462d76
SHA1962917518dc23f1ccccf9c422b19b7ce238cec85
SHA2566145a80265ead7b43dd35d3547a7ac35954a52c1eca8cfca94bb7de736082fba
SHA5126a0bb53204f2f3ccf1edcc1b11a64c4ef3f6a4f2e4103d8a03e0042bb305eb18c9bc260c40d701bc9908199ce68d4694da3069686875fe550d0b110f49648145
-
Filesize
468KB
MD566e45c732e2c7aa1af4bf7651a7c5d67
SHA11a9dff1614727878f4dab7a8b6d1a4205a14451a
SHA256e3a0eec327ecc3d161fa4af5fd505c0138e542ef6a2e6a84f16e4fffc57e68b9
SHA51292bb6200b84758dd3468ea5f7882a465550fd2e99c74de9259442af8386d19ad7e72fb9042c6eb6bf4b84010ac9c0a6be4194d926605f17aaf427be3efcf07c9
-
Filesize
468KB
MD5d36a63c787b0a3c1859afdac6bcf5376
SHA1be00bc1a02d1eee66fc538011b849ff31dadcdba
SHA256d8ea5f1eccf005bf65cc497aab540c29e940c3bd57accb23bf5a4b8163cc0c07
SHA512170ddffdff39a8b8f5238ea1382765cc7fd30d39cc2295dd03f4eb8bb2dcc6f52183a06558a41fa24c3fcd65214e81a09ecdd8682ee3b1e3d8777581271152db
-
Filesize
468KB
MD5a5086ed6387c100031b2b2e5ee7efe70
SHA1e354c546e2e137e99b41424b4c16b2afc58d4237
SHA2568cacfbb94ab35a76f2c5c47215feabc3379a448916cfd63a321073ddd1fad498
SHA512a60ff0b4cea222e10647c1b4e56eb0fa01ca96b286480d9bd44c0db36aa7e16db483e7a035836351765ce06ff08d7d88db7cd3633e0c69c5e9d420295519114f
-
Filesize
468KB
MD5598803e5e6f88728cb901e8089b94f2a
SHA10a8922845c6f05b00a67a464a75a65a27221169c
SHA256d23ed5925447832e6f18c97800cddedc73d06f9b34fc6011e69f25c93f208fb2
SHA512213e8d9ac3b15acbe142f634f9fb9d83c84d40c68f2299367a69d70857e8a39e21f162e913bb1854c90cf2678a759ddf794b63505d9ecdbbfc49fcd28194f1ed
-
Filesize
468KB
MD555fc4da3fbca91e187bde42bd494aa54
SHA16590e668a3f2bf5a36296c779414c0082b7b3470
SHA2562ac3a0776b5d73670c8fcd5f0aaa3216053a47a794d372d80b9852174410a850
SHA5126eeca53bcd97f7278d4bc2d0354559bc643ae8407d1fe0b27a841a1ac00c2b8245ebdfcd57c6b578b79e462c14cddd220beb165e15dd5def417fa4fe67ea7243
-
Filesize
468KB
MD5d5f73418ff8556812a5d0b6ad0988297
SHA1a05c3b4e01df091c21403c5c999eb818f7286766
SHA25662f4f7598d6d4bb9fd009e7102fdcbfc083cae9bff9d92ebb17ab8549aeca767
SHA51291de75d56172d7ea80dda8c16675c8b9ea10174f57dc33ba63fdf578174b2275810aa45b751a0be2d9635ad45570b34c051a0eae30e30116e76161f14fca7341
-
Filesize
468KB
MD5fa5fcd0622d427b2d783ab80fd280273
SHA184deaf040088309daa450f127d65c163e1fc8845
SHA25611abf5f218967b046863e5cdd0214923d72cb32e38a37dab76f8fa6b0b03378c
SHA5129d28b834110532b6c7c559f705ba544c3d45140556b8b0611affffe9be7f1cac8fc259ba6124c2b599a35b491d4358ebf7f36810a3db2cd4b40bbfca58eb02a9
-
Filesize
468KB
MD5c3b4573dc1f3b749797bbf07fa7256cb
SHA17cc8b94972c1e38cb0e609432053d5e85a5142f2
SHA25606dad39eac363290ca091ae7de7c80712383c0f8653b8532464d720002e89b2a
SHA512a138ffd4c4430088e82ef7446696ea9ca919b38def3fe4483a469ac25a38fdf928394dedc1bd14ff111eaf4f6101bb52e4273b6d36b55f09bdad78dd77fbd914
-
Filesize
468KB
MD5bbb3dbc60dacb71d96d77a95cfa2a5f3
SHA13d5ad1ae86aa1a0d1f98709ff05fbf109b0038de
SHA2561ee6d778b4b9d6a656783c9fcbe6d7aec55029703d62be54e01afb46ba45361b
SHA51224b873d2da2ba6e43ed5ca9b4bbcec3799c6c0e689aa5cde542b8ad1b3fa8a6a5fc6482eb2035ac3f383911bc9ba920c70545b28f7353ceca7ffecb88461f3f1
-
Filesize
468KB
MD5ecacfba6358f5ee751b0223395e7cf60
SHA1dc9df9c0438bda1c354625355a504c4fd23c452d
SHA256fbecf44a053342d413bf3e36994fc364ab227c91152d566b13493a0502ca4f19
SHA51256cb18c1edf565c62ca8501c193c490a61600b0c6e1d4d2086fff9d3e01775c4f9119e8b0f9d899f485e12b9dce43127e4f6d54284ac69d120b51b48f39eeb6e
-
Filesize
468KB
MD5755e06ef9fe7d2c7c2d6d93c938c206e
SHA14721eecb07e854d15fce56922e36db9b6e9cfe96
SHA256d0e26456d33155c06f9ba9c54d9fffad019937158e9f615d247ac1852584c382
SHA512ad7646b0eda986245a2b347fde6f9f12e49346f1f3a97d054f1bd68428370e0ca54f08337062a336afb82176ed03fcecf3eccef54ccc47bb12b3b0817101bb6e
-
Filesize
468KB
MD5e48b465cd44f6f40ef662cbf6bb39282
SHA183dd20aaa212fa29ab1f50a70170151ccfea8cea
SHA2562ba80f31581a837d540c2b0d63b19772ac19454b0ae10bd2a69c6c19327dd58b
SHA512e9bea09ae68425c3d258631b5e3898094841391cd5c0f0c9715c514ef5047ac64cc6438a692c4843d9016b168791a58f3a2de7337bf0201cceb765ec5b6bddb1
-
Filesize
468KB
MD5de1bfac76c3fbdccc42b003be54870f9
SHA12888cd270fafe4c09dae06af71df327dff9cc52b
SHA2564f460edd925ceb110d7a101fc49294469b0f3e7b5992854c68a7d9b89501220c
SHA512654dcbfa72bf81fb709b84fb071c1156adae67bd86bfb9057329315ff073232463cbf4cc83a419f65edaa510faf36f5fdf3135c4a86dabb56f4dbe2602d91ce9
-
Filesize
468KB
MD5729cb568e523715470a3d2e0a99bc98c
SHA110c32841dab675e81a08fcd5c85f7ecdc67724ef
SHA256f09c2aa58d4eb7ff07f9cb6018d2f3401af93d8cbab94b357d2c74080c055804
SHA5126e754bbe44787f78c49bde706e0e1282f23ef6ccd880095ae9fd6bbf49fcb833a72951abbd1a20e7b2af4e961861aae06020cef39b4054893e8f7e0985011cc1
-
Filesize
468KB
MD568429af372b877114d6f3aed62063a2f
SHA153e6d05052c657005ea2aeac4222a2c2e794b459
SHA25689606f1db524c4757b1d96dbfa2605127c78b86c18e9f1e3e0406cfcaf998178
SHA512abe3c045a75e8008d5dee65657137ba7b406f39c5246ab499e5f72eebd85a629aa68ab9426b3a7a3948f4a8aa7fa6c265c071fb211e7ba034c3d58491db54949
-
Filesize
468KB
MD53da05e96359e8c3bcd6af8479ef19807
SHA1ad6cdd4422ebe3427e05c0d142f3fdc639cdaaa5
SHA2567344f5a89bb2cf63efab0a347bfaad418f4d3beac4c33a1c1cd5e6212c132f9e
SHA5127d79ff3075ff00de52d42d47638abf7e6212da277bfe6bb81cbb04497ab68d0f0dd44a045e01efaf54e90a0cdf76aa9950000e6d5ba3f2010424dd360cb02c63
-
Filesize
468KB
MD5f7d500c6b41fcabae5f2c4c83af7410b
SHA11f7299c1bbf33f40685d661a83ce5cc15941c73b
SHA256fc3e8425d2d8838656aedba438b654319117c86f264d7dca36a16a4ad8a5f922
SHA512623f9b0d84bba8ed7b4f9a22eef4ce313b7226cceaf1eaf4f257b8f17d223de74dda62273fc15721e42c6826934a2cc40a9116da4f067cb03a0e28b726c7f82b
-
Filesize
468KB
MD5c0842a89268b97d5ab363699c6f26954
SHA179ebfd711771aca1248e9644ba6e3f9f765d1b17
SHA256b0e3359d9f0276e7c0ae422574a33b334265efc14870817dc86068a53b4370e0
SHA5120637d9805be9c0df213ff24aafc4692f2b47ff6eed6e607aac28a31cdd42c7e61be1d001df7933689f1674538d9ed281aedab914c6f571c38948d3ec5e60279f
-
Filesize
468KB
MD511365bfa5c595a212a13f8467d819d6c
SHA1b5e32fac1d63de239a6bd1871925fb03ba7cbaba
SHA2564a36d37e4ea6ab0e454570337b2b3e3826cdc8b4934b0d1147b56cc0ef87f57a
SHA5129239d0fa3acea1c0cd9ba0c3587b5a662fb1178efce4ec11dde53d32cb00227d480a6b455be45772646ac22d53d570eba247b8f8ba91423caba728c131e1b8d5