Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 13:18
Static task
static1
Behavioral task
behavioral1
Sample
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe
Resource
win10v2004-20220414-en
General
-
Target
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe
-
Size
267KB
-
MD5
e542c60af6aea3645c48ebd7ac97c47f
-
SHA1
7ee9d926e260b2442d8cdbe849abf78eb3b0100f
-
SHA256
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6
-
SHA512
fb729ff8c4b975a1b20435823139565557afd0190435ceb331fa42248efdfaa2fb5e88c7c058394b74c1ce5e4d99735b20dee520f4f823b01af368bb3fe72e49
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe = "C:\\Windows\\System32\\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe" f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\desktop.ini f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\desktop.ini f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Drops file in System32 directory 1 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exedescription ioc process File created C:\Windows\System32\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Drops file in Program Files directory 64 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100_contrast-white.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\cacerts.pem.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteSmallTile.scale-100.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\feature.properties f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_replace_signer_18.svg.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-pl.xrm-ms f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-72_altform-unplated_contrast-black.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nl-nl\ui-strings.js.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\content-types.properties.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansDemiBold.ttf.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription5-ul-oob.xrm-ms f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\TXP_CarReservation.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jfxswt.jar.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\ui-strings.js.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedSmallTile.scale-200.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Frosted Glass.eftx f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\ui-strings.js f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-heapdump.xml f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBHW6.CHM.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\main.css.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ppd.xrm-ms f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0000-1000-0000000FF1CE.xml.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarLargeTile.scale-400.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\root\ui-strings.js.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-32.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-32_altform-unplated.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ja-jp\ui-strings.js.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\libEGL.dll.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-100.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-60_contrast-white.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\rsod\osm.x-none.msi.16.x-none.tree.dat.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\THMBNAIL.PNG.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-pl.xrm-ms.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jvm.hprof.txt f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL001.XML.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\rsod\excel.x-none.msi.16.x-none.tree.dat.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\WebviewOffline.html f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\MicrosoftAccount.scale-140.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\ui-strings.js f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\PlayStore_icon.svg.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-20_altform-unplated_contrast-white.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\ContactPhoto.scale-100.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\typing\bubble\white.gif f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\selection-actions.png.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-il\ui-strings.js.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected].[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupLargeTile.scale-100.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_BypassTrial180-ul-oob.xrm-ms.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ppd.xrm-ms.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\EssentialLetter.dotx.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File created C:\Program Files\Java\jre1.8.0_66\lib\ext\sunjce_provider.jar.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmux.x-none.msi.16.x-none.boot.tree.dat.id-84906AC1.[[email protected]].ROGER f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteWideTile.scale-100.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-24.png f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Program crash 42 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2344 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4780 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4356 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4224 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4644 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2592 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4836 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1424 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3532 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1052 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2304 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4840 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1536 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2676 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1212 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2320 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4812 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2396 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3848 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4432 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4156 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4532 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 736 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 724 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1956 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3088 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 1532 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2376 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4852 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2380 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3928 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 276 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4608 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 440 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4740 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 488 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2412 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 4264 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3228 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2492 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 460 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 3780 2428 WerFault.exe f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4728 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exepid process 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4388 vssvc.exe Token: SeRestorePrivilege 4388 vssvc.exe Token: SeAuditPrivilege 4388 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.execmd.exedescription pid process target process PID 2428 wrote to memory of 3248 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe cmd.exe PID 2428 wrote to memory of 3248 2428 f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe cmd.exe PID 3248 wrote to memory of 3468 3248 cmd.exe mode.com PID 3248 wrote to memory of 3468 3248 cmd.exe mode.com PID 3248 wrote to memory of 4728 3248 cmd.exe vssadmin.exe PID 3248 wrote to memory of 4728 3248 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe"C:\Users\Admin\AppData\Local\Temp\f1254916677f0a7ebd645c2b2247a225f3b3673bccc4485a87179b977bf031e6.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:3468
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5242⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5442⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5522⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5842⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5762⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 6162⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5922⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 6442⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5522⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7082⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7402⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 5362⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7602⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7682⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7202⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7722⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9082⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9162⤵
- Program crash
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 8842⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9482⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7602⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10122⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7722⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7602⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10082⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 8842⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9042⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7322⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 8842⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 6562⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 8322⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10042⤵
- Program crash
PID:276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10122⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9602⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9522⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9442⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9082⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9642⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 6722⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9202⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 9762⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 7882⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2428 -ip 24281⤵PID:4604
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2428 -ip 24281⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2428 -ip 24281⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2428 -ip 24281⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2428 -ip 24281⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2428 -ip 24281⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2428 -ip 24281⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2428 -ip 24281⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2428 -ip 24281⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2428 -ip 24281⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2428 -ip 24281⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2428 -ip 24281⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2428 -ip 24281⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2428 -ip 24281⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2428 -ip 24281⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2428 -ip 24281⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2428 -ip 24281⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2428 -ip 24281⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2428 -ip 24281⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2428 -ip 24281⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2428 -ip 24281⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2428 -ip 24281⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2428 -ip 24281⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2428 -ip 24281⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2428 -ip 24281⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2428 -ip 24281⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2428 -ip 24281⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2428 -ip 24281⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2428 -ip 24281⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2428 -ip 24281⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2428 -ip 24281⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 2428 -ip 24281⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 2428 -ip 24281⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2428 -ip 24281⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 2428 -ip 24281⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2428 -ip 24281⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2428 -ip 24281⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 2428 -ip 24281⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 2428 -ip 24281⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2428 -ip 24281⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2428 -ip 24281⤵PID:1448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 2428 -ip 24281⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 2428 -ip 24281⤵PID:3748