Analysis
-
max time kernel
186s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 10:12
Static task
static1
Behavioral task
behavioral1
Sample
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe
Resource
win10v2004-20220414-en
General
-
Target
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe
-
Size
269KB
-
MD5
c54a53612414dcedead971bf88f16d2d
-
SHA1
addc96bd67738c7228eaa71ba6740ad0579936f3
-
SHA256
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3
-
SHA512
b981b873af5acb266b1d6da3d6fee46ce3a243100ad64d16e19a0768d8bc92f6f6efc4644cc3fb06605ac1dd5f6eaa10541e2d9efee9f4ab329db8c976728311
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe = "C:\\Windows\\System32\\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe" bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\desktop.ini bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\desktop.ini bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Drops file in System32 directory 1 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exedescription ioc process File created C:\Windows\System32\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exedescription ioc process File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jsdt.dll bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-charts.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sampler.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-dialogs_ja.jar bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-search.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\calendars.properties.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.VisualElementsManifest.xml bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\msvcp120.dll bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL016.XML bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.di.nl_ja_4.4.0.v20140623020002.jar bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.dom.smil_1.0.0.v200806040011.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-compat.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue.xml bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesdistinctive.dotx.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATERMAR\THMBNAIL.PNG.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\VBAOWS10.CHM.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msadcor.dll.mui bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.properties.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Word 2010 look.dotx bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_zh_4.4.0.v20140623020002.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-api_zh_CN.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\THMBNAIL.PNG.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.properties bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\vreg\powerview.x-none.msi.16.x-none.vreg.dat.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.fr-fr.msi.16.fr-fr.boot.tree.dat.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCalls.c bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-utilities.xml bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL105.XML.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-attach.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\t2k.dll bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\Office.Runtime.js bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesstylish.dotx bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_zh_CN.properties.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-spi-actions.jar bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\7-Zip\7-zip32.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt_0.11.101.v20140818-1343.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-masterfs-nio2.jar bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\mlib_image.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-util.xml.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\wsdetect.dll.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\DSMESSAGES.XML.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets_1.0.0.v20140514-1823.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\ExcelMessageDismissal.txt.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Wisp.thmx.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_ja_4.4.0.v20140623020002.jar.id-C13BC6E0.[telegram_@spacedatax].ROGER bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipTsf.dll.mui bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Program crash 40 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4252 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4484 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4208 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1540 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 212 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2800 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2724 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3940 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3152 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2892 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3604 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4984 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 372 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2664 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2032 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4132 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 532 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 748 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1136 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1924 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4592 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1608 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 664 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3720 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2340 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1560 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3756 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2448 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2728 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4420 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 296 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1552 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 672 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4252 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1548 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 4280 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3344 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1648 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 3080 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 2724 1900 WerFault.exe bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1892 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exepid process 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2996 vssvc.exe Token: SeRestorePrivilege 2996 vssvc.exe Token: SeAuditPrivilege 2996 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.execmd.exedescription pid process target process PID 1900 wrote to memory of 1048 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe cmd.exe PID 1900 wrote to memory of 1048 1900 bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe cmd.exe PID 1048 wrote to memory of 4832 1048 cmd.exe mode.com PID 1048 wrote to memory of 4832 1048 cmd.exe mode.com PID 1048 wrote to memory of 1892 1048 cmd.exe vssadmin.exe PID 1048 wrote to memory of 1892 1048 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe"C:\Users\Admin\AppData\Local\Temp\bcd2682a5e842d67f198b6d59b2591c8eb4390a85b949dd745dab5a1bc9a96b3.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4832
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6282⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6722⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6642⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6442⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6682⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 7202⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6842⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 7322⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 7482⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8082⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8682⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8162⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8602⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8922⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8762⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8162⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8722⤵
- Program crash
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9402⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9602⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9482⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9722⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9842⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9562⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9962⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 10002⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9402⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9922⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9762⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9922⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9482⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8722⤵
- Program crash
PID:296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9042⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8682⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9322⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 10202⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8402⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9602⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9042⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 8202⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 9762⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1900 -ip 19001⤵PID:988
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1900 -ip 19001⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1900 -ip 19001⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1900 -ip 19001⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1900 -ip 19001⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1900 -ip 19001⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1900 -ip 19001⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1900 -ip 19001⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1900 -ip 19001⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1900 -ip 19001⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1900 -ip 19001⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1900 -ip 19001⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1900 -ip 19001⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1900 -ip 19001⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1900 -ip 19001⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1900 -ip 19001⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1900 -ip 19001⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1900 -ip 19001⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1900 -ip 19001⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1900 -ip 19001⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1900 -ip 19001⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1900 -ip 19001⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 1900 -ip 19001⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1900 -ip 19001⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1900 -ip 19001⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 1900 -ip 19001⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 1900 -ip 19001⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 1900 -ip 19001⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 1900 -ip 19001⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 1900 -ip 19001⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 832 -p 1900 -ip 19001⤵PID:272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 832 -p 1900 -ip 19001⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 1900 -ip 19001⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 1900 -ip 19001⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 1900 -ip 19001⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 900 -p 1900 -ip 19001⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 900 -p 1900 -ip 19001⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 924 -p 1900 -ip 19001⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 928 -p 1900 -ip 19001⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 944 -p 1900 -ip 19001⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 916 -p 1900 -ip 19001⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 1900 -ip 19001⤵PID:3940