Resubmissions
07-01-2025 17:56
250107-wh2kdssjcw 10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-01-2025 17:56
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4684 set thread context of 4884 4684 Script.exe 129 PID 2500 set thread context of 5840 2500 Script.exe 135 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6a25afe9-a357-47e3-9ddc-17c7cd982b39.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250107175622.pma setup.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5200 4684 WerFault.exe 125 2456 2500 WerFault.exe 133 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3506525125-3566313221-3651816328-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 668 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3668 msedge.exe 3668 msedge.exe 3132 identity_helper.exe 3132 identity_helper.exe 5256 msedge.exe 5256 msedge.exe 5504 msedge.exe 5504 msedge.exe 5504 msedge.exe 5504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1736 3668 msedge.exe 84 PID 3668 wrote to memory of 1736 3668 msedge.exe 84 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 2648 3668 msedge.exe 85 PID 3668 wrote to memory of 3928 3668 msedge.exe 86 PID 3668 wrote to memory of 3928 3668 msedge.exe 86 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 PID 3668 wrote to memory of 3620 3668 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/abingculme546/Seliware-Executor/releases/download/Download/script.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffafd4146f8,0x7ffafd414708,0x7ffafd4147182⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:1960 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6c6fe5460,0x7ff6c6fe5470,0x7ff6c6fe54803⤵PID:4548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2259794725838310448,7030184673024609164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5840
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Script.txt1⤵
- Opens file in notepad (likely ransom note)
PID:668
-
C:\Users\Admin\Desktop\Script.exe"C:\Users\Admin\Desktop\Script.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Users\Admin\Desktop\Script.exe"C:\Users\Admin\Desktop\Script.exe"2⤵PID:4352
-
-
C:\Users\Admin\Desktop\Script.exe"C:\Users\Admin\Desktop\Script.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 8402⤵
- Program crash
PID:5200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4684 -ip 46841⤵PID:5728
-
C:\Users\Admin\Desktop\Script.exe"C:\Users\Admin\Desktop\Script.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\Desktop\Script.exe"C:\Users\Admin\Desktop\Script.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 7282⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2500 -ip 25001⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD524dada8956438ead89d9727022bac03a
SHA109b4fb1dba48ec8e47350131ae6113edd0fdecf0
SHA256bf1e5c7828e4672982b16451b5a201e65e812e98a97b87c9f2f7c22677cb4ec1
SHA51203f092a4b20a4d8cc111220b35fbf5470878b7723faeddee65b1d9cf327167053792c77864103b4530b9b9f819e32a5721b44189291dfdb5832769835ea5dd94
-
Filesize
152B
MD58b712a4c83dfb3c522d032cf900e863a
SHA14f5bec4be6f4ebfa959e899ceafc62309bb1f141
SHA25631da2a41a051db11559c47feb923d4baad32a384f530013a435fa884dad64493
SHA51203b24d9307623b3a341230805f3ea662b0107c314650a51ae7e89d901cb3ad212d4219bab4d763d0aa8d50831aa0e6d4e3379573cc2f724873804578e8642898
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58d81b.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD5107813b66f37d2a63fc909965230cc21
SHA1aae93b4d27ecc52b6d6311930ccd47bcedca8955
SHA256b03eeb145ad9e8bf06ae88d6d79e1d817bee115485735b4402c561121f0eb18f
SHA5126fbff402f96dd693634f5fc707ed4f42635b20e2837686e288756f8c3e066f2c300d62ff12cb156c22ba49930f59840ad14b82a34294f1b157e6ff64094979ad
-
Filesize
5KB
MD5ac76967f83f75785d0e09bc0d3330d55
SHA1af5c0593c435e2c3e600fd2cd3f3c21aa79c959d
SHA256d73555900b74859296479636b9472a8b194374e14b98ded25f1ee808a4706e9b
SHA512a60ee99a533020bda63370aec06a2e4b2d07e8967df0af8a5b40c3e407c45df0195f34ae54f7f29b6afe1d0a3cfa3ff551d6ce9b5bf7d5f4e2092147d0cb9f5a
-
Filesize
5KB
MD59c81218c27164ad208587f0be6e0868d
SHA1c4e737e4464bed380a07f686fbc9a40cebbe297e
SHA25682ba138d22fb9c7aeefb769fb43f8a6e0b78dae8b5bcb322221086931e28c875
SHA5122f0f757fb994e5f17cf412b860f556da4c647bab0d04485af62789d0b56227c1894073189b0ed1ffc2d372aff1fc7c8295af7671089e01b40d52d8879a0fb6ef
-
Filesize
5KB
MD59facf0cf6b24da37bf6e77a2fb026541
SHA19aa7e395823dfae20c2ab67e7dd3496a19af67f0
SHA2567c4536b7d9dfe94d8ab05c324de58614c64b0894929f709556561509ca788e1e
SHA51228a773569a55e28bacc2200c1ae626d9b82aa8d6dd450354fb677f5081f3db86fabd9ef791b8b403a96d6f25ce5aabd537777a2bddb55c141fcb84232c4aeaf1
-
Filesize
24KB
MD585eca930a791cbcb1373f5fdaf17857b
SHA1ffea7d54e9803374a484f1e4c124766e80024efc
SHA256fbc990061790350f00dc28f2dda277aac81bb8385a6e92e90a20101436c3312c
SHA5122ffe0de3f80ac60f2ffa55f334026979e6be328b7c69f4603aa3c5d1bfa6c3b3744d86ac2a34ecf904d0a41b36bc485392ece58f6cc89d7ffca293d02efe5bed
-
Filesize
24KB
MD599a7edf9124dba808b6d025b14aea278
SHA1f1de2fdd81ea87ee78e8afdc1a7cdffcf62a92ef
SHA2569d38a8d193a503b9be7b39be5d150bcf22038c84fbf3d53979e2f075a35b9089
SHA512fc371b7ad5606a9948ba4a315e40a0a93592f57103be4a3712020977b43e4277d95d74ff35e490239dbce1cc475fe1d1746764f5970d2e9f04483c985268f5c7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD59bdcb000d0b9723e4d6badc9c2338094
SHA14339bdfb22f79ff75519b044f668ab12d8cc1448
SHA256acc65a03031d3160ade9bbfe75278ff1cb7c16492bcf7e98767f1db16c235707
SHA51237d14d15e32b5db438f135c8a1420bf96b653266377b0f2555d44cd90a48dca4b32a90e98ab0aeb0e1263ae2bf7fa03e7fdff04dad160a75a6f1c7c78a1bc4e1
-
Filesize
11KB
MD5d98c243a206732b79c21a62b7698f7aa
SHA1b65c78baeed0ba6c659f97e03c0df540721e63ca
SHA256d42fb79502c8c8fde187fe5f3795aacadd3eac0e8430e8d8c946edb2f4b93629
SHA512af7acc67c7f496cec9250791181ee78774c4c3972f70144c4e79c11dbea89caa2117d1de7acefbd36b1d02c47e1e19f2ebb0ad2153a94e4ed399a5c3a445e66c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD57791021cd0ab7ac57ce6d4863142e820
SHA1e02d8da5513a5206018487c1ca3ec73aef134804
SHA2566dc0a6cd80bed3365f183c0a3d58ac58dce2c33bb6764e897261f33d4cafe05c
SHA512e269ca6f78472024cebeb7247cf19819200d47e607eca9ff3b134007380130c046cee89a1e428e935f2390d633998f530cefd8350fd523927d28314d1a56e9bd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5cb3a2d5d418ab1acb01ca7fd29a1ec9c
SHA17348aeb1b93c64900c0fb32e63b5a401129a54a7
SHA25602407aaa33f62b021b2e3ecb2136d35a662d50acb59a8b700fa23ff0342c7274
SHA512da7f3629678431095c354cbab8fd30f478fc83fd731373910c8d81bad5f1070e24950a693246830e2dee44a6058ccf3608f5a2fa4b246ddc52ae97d416ff89b9
-
Filesize
5.5MB
MD5d23f680812d614afae51436e43a7acbe
SHA14906667187e56bc7242ba7540efc01e621e1399b
SHA25686ef1d24279e7eea5ecfefb4d8e605c78916e3d504ba4bb6dd86063159e50389
SHA51291148c0abac076a385b5afbb9e2e4927b0c1ad50d483ba84aca0cae8b0c4a16f5b17b75879a47afed893e9c1a3426f7138b1ac7ec7ec2f3908be224b76487626