Analysis
-
max time kernel
62s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
Resource
win10v2004-20220414-en
General
-
Target
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
-
Size
290KB
-
MD5
dc942bea79a81738046c66c1e5add4aa
-
SHA1
c2755f5165c93acb708e8e485fcfbadd1125049e
-
SHA256
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c
-
SHA512
bb067c86eb1abff78d0e207da4de4aad80314410021e52d148d01491b85ca3da5f40c294a8bcbec6d2dad6f5395fc5fe4e29fd6a820bdf8398d1012749b12e54
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe = "C:\\Windows\\System32\\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe" 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\desktop.ini 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\desktop.ini 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops file in System32 directory 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File created C:\Windows\System32\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File created C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-impl.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jawt.h.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-search.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedbck2.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-annotations-common.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup-impl.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-spi-quicksearch.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\license.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-visual.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\fa.txt.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\invalid32x32.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-swing-outline.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\feature.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\time-span-16.png.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rightnav.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-explorer.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\ConnectUse.m1v 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-multitabs.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-io.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-common.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-tools.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-windows.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-explorer.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-ui.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-remote.xml.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\bn.txt.id-87039EC6.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Program crash 42 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2076 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4220 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1672 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2516 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4776 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 704 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3676 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1708 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4640 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4624 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3740 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1788 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3608 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2772 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4592 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1952 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1140 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2868 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2144 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4324 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3644 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2912 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4008 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1716 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4216 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 284 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2960 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1448 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4484 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 436 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4816 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2256 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4420 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4492 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3972 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4488 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3348 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2908 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3980 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 3016 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1560 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 2996 4200 WerFault.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4212 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exepid process 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4248 vssvc.exe Token: SeRestorePrivilege 4248 vssvc.exe Token: SeAuditPrivilege 4248 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.execmd.exedescription pid process target process PID 4200 wrote to memory of 4360 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 4200 wrote to memory of 4360 4200 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 4360 wrote to memory of 4868 4360 cmd.exe mode.com PID 4360 wrote to memory of 4868 4360 cmd.exe mode.com PID 4360 wrote to memory of 4212 4360 cmd.exe vssadmin.exe PID 4360 wrote to memory of 4212 4360 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe"C:\Users\Admin\AppData\Local\Temp\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5042⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5402⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5362⤵
- Program crash
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5722⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5802⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5842⤵
- Program crash
PID:704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5362⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6962⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6602⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7082⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7162⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7442⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7282⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7362⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7682⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8002⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8282⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7722⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7202⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9122⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9042⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8602⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8842⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8802⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8082⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8322⤵
- Program crash
PID:284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8362⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9162⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7402⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9162⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9042⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9882⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7562⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7442⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 10082⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 9522⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8882⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 7682⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 10122⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8562⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8442⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6482⤵
- Program crash
PID:2996
-
-
C:\Windows\system32\mode.commode con cp select=12511⤵PID:4868
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4200 -ip 42001⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4200 -ip 42001⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4200 -ip 42001⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4200 -ip 42001⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4200 -ip 42001⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4200 -ip 42001⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4200 -ip 42001⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4200 -ip 42001⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4200 -ip 42001⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4200 -ip 42001⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4200 -ip 42001⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4200 -ip 42001⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4200 -ip 42001⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4200 -ip 42001⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4200 -ip 42001⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4200 -ip 42001⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4200 -ip 42001⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4200 -ip 42001⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4200 -ip 42001⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4200 -ip 42001⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4200 -ip 42001⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4200 -ip 42001⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4200 -ip 42001⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4200 -ip 42001⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4200 -ip 42001⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4200 -ip 42001⤵PID:280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4200 -ip 42001⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4200 -ip 42001⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4200 -ip 42001⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4200 -ip 42001⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4200 -ip 42001⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4200 -ip 42001⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4200 -ip 42001⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4200 -ip 42001⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4200 -ip 42001⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4200 -ip 42001⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4200 -ip 42001⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4200 -ip 42001⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4200 -ip 42001⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4200 -ip 42001⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4200 -ip 42001⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4200 -ip 42001⤵PID:4076