Overview
overview
10Static
static
f5068e95e1...T1.exe
windows10-2004_x64
10f5068e95e1...dH.exe
windows10-2004_x64
10f5068e95e1...ty.ps1
windows10-2004_x64
1f5068e95e1...st.exe
windows10-2004_x64
1f5068e95e1...cb.exe
windows10-2004_x64
10f5068e95e1...ry.ps1
windows10-2004_x64
1f5068e95e1...ue.ps1
windows10-2004_x64
1f5068e95e1...me.ps1
windows10-2004_x64
1f5068e95e1...ry.ps1
windows10-2004_x64
1f5068e95e1...ue.ps1
windows10-2004_x64
1f5068e95e1...ry.ps1
windows10-2004_x64
1f5068e95e1...me.ps1
windows10-2004_x64
1f5068e95e1...ue.ps1
windows10-2004_x64
1f5068e95e1...UI.exe
windows10-2004_x64
1f5068e95e1...nl.ps1
windows10-2004_x64
1f5068e95e1...wp.exe
windows10-2004_x64
1f5068e95e1...zg.exe
windows10-2004_x64
10f5068e95e1...st.exe
windows10-2004_x64
1f5068e95e1...tb.exe
windows10-2004_x64
10f5068e95e1...ar.exe
windows10-2004_x64
10Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-06-2022 21:38
Static task
static1
Behavioral task
behavioral1
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/A8O1E003-R4Q1-P8Q3-X4A6-Y2R2V7W0G8T1.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral2
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/BIozhqydH.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/CL_Utility.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/DismHost.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/IoJbxlqcb.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral6
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/RS_AdminDiagnosticHistory.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/RS_MachineWERQueue.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral8
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/RS_SyncSystemTime.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/RS_UserDiagnosticHistory.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral10
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/RS_UserWERQueue.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/TS_DiagnosticHistory.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral12
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/TS_InaccurateSystemTime.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/TS_WERQueue.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral14
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/Video.UI.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/__PSScriptPolicyTest_eg4nc2yx.0nl.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral16
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/aspnet_wp.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/esfctKdzg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral18
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/smsvchost.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/w..orIFtb.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral20
Sample
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/xpertwar.exe
Resource
win10v2004-20220414-en
General
-
Target
f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4/Downloaded_files/IoJbxlqcb.exe
-
Size
172KB
-
MD5
2e6f05e8245b62297355f070a6f966df
-
SHA1
7461222b5d34eb2328c7d50a75956f9dc78c32a3
-
SHA256
f5c1bcee04671046761d44546a3e4a413049a42cd9067caa25e7640ab5867178
-
SHA512
44302f90666acbaaedc8c4a8481cc2fdc82da786514683d5c5664f5b6eda7ee4e415e2c4155b1e92f7d93d82ddd60d6f652e35332b5ce50eba84897c5202a899
Malware Config
Signatures
-
Processes:
IoJbxlqcb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IoJbxlqcb.exe -
Processes:
IoJbxlqcb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" IoJbxlqcb.exe -
Processes:
IoJbxlqcb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" IoJbxlqcb.exe -
Processes:
IoJbxlqcb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IoJbxlqcb.exe -
Program crash 49 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4156 3372 WerFault.exe iexplore.exe 4152 4216 WerFault.exe iexplore.exe 4864 4144 WerFault.exe iexplore.exe 2080 4364 WerFault.exe iexplore.exe 3416 3992 WerFault.exe iexplore.exe 652 4332 WerFault.exe iexplore.exe 4744 4020 WerFault.exe iexplore.exe 116 3748 WerFault.exe iexplore.exe 2968 1824 WerFault.exe iexplore.exe 3584 2748 WerFault.exe iexplore.exe 3432 4532 WerFault.exe iexplore.exe 4076 1964 WerFault.exe iexplore.exe 4472 1200 WerFault.exe iexplore.exe 444 1696 WerFault.exe iexplore.exe 3980 3140 WerFault.exe iexplore.exe 2368 4716 WerFault.exe iexplore.exe 4552 2544 WerFault.exe iexplore.exe 4832 1480 WerFault.exe iexplore.exe 4172 4772 WerFault.exe iexplore.exe 2928 4840 WerFault.exe iexplore.exe 3492 2404 WerFault.exe iexplore.exe 4356 3352 WerFault.exe iexplore.exe 2020 3700 WerFault.exe iexplore.exe 1092 1232 WerFault.exe iexplore.exe 3516 780 WerFault.exe iexplore.exe 3096 3932 WerFault.exe iexplore.exe 1512 3868 WerFault.exe iexplore.exe 4436 3268 WerFault.exe iexplore.exe 4844 2524 WerFault.exe iexplore.exe 2608 2224 WerFault.exe iexplore.exe 4136 3340 WerFault.exe iexplore.exe 844 4864 WerFault.exe iexplore.exe 1956 1872 WerFault.exe iexplore.exe 4412 1784 WerFault.exe iexplore.exe 376 3124 WerFault.exe iexplore.exe 3872 3604 WerFault.exe iexplore.exe 1572 3956 WerFault.exe iexplore.exe 2180 3128 WerFault.exe iexplore.exe 4420 2852 WerFault.exe iexplore.exe 4780 5100 WerFault.exe iexplore.exe 3744 224 WerFault.exe iexplore.exe 5000 5112 WerFault.exe iexplore.exe 3560 2804 WerFault.exe iexplore.exe 3508 4736 WerFault.exe iexplore.exe 3148 2304 WerFault.exe iexplore.exe 2488 4692 WerFault.exe iexplore.exe 4720 3648 WerFault.exe iexplore.exe 5092 4160 WerFault.exe iexplore.exe 2516 5088 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 49 IoCs
Processes:
IoJbxlqcb.exedescription pid process target process PID 3460 set thread context of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1824 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4532 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1964 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1200 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1696 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3140 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4716 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2544 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1480 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4772 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4840 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2404 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3352 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3700 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1232 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 780 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3932 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3868 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3268 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2524 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2224 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3340 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4864 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1872 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 1784 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3124 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3604 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3956 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3128 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2852 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 5100 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 224 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 5112 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2804 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4736 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 2304 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4692 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 3648 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 4160 3460 IoJbxlqcb.exe iexplore.exe PID 3460 set thread context of 5088 3460 IoJbxlqcb.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
IoJbxlqcb.exepid process 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe 3460 IoJbxlqcb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
IoJbxlqcb.exepid process 3460 IoJbxlqcb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
IoJbxlqcb.exedescription pid process target process PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3372 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4216 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4144 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4364 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3992 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4332 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 4020 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe PID 3460 wrote to memory of 3748 3460 IoJbxlqcb.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
IoJbxlqcb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IoJbxlqcb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe"C:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 883⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 1923⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 123⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 763⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 123⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 843⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f5068e95e11b906cf33949376159ed87e03eb29e774029e84b8151c76d69ccf4\Downloaded_files\IoJbxlqcb.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3372 -ip 33721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4216 -ip 42161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4144 -ip 41441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4364 -ip 43641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 3992 -ip 39921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4332 -ip 43321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4020 -ip 40201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3748 -ip 37481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1824 -ip 18241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2748 -ip 27481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4532 -ip 45321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1200 -ip 12001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1696 -ip 16961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3140 -ip 31401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4716 -ip 47161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2544 -ip 25441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1480 -ip 14801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4772 -ip 47721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4840 -ip 48401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2404 -ip 24041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3352 -ip 33521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3700 -ip 37001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1232 -ip 12321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 780 -ip 7801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3932 -ip 39321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3868 -ip 38681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3268 -ip 32681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2524 -ip 25241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2224 -ip 22241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3340 -ip 33401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4864 -ip 48641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1872 -ip 18721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1784 -ip 17841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3604 -ip 36041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3956 -ip 39561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3128 -ip 31281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2852 -ip 28521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5100 -ip 51001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 224 -ip 2241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5112 -ip 51121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2804 -ip 28041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3648 -ip 36481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4160 -ip 41601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5088 -ip 50881⤵