Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
Resource
win10v2004-20240802-en
General
-
Target
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
-
Size
347KB
-
MD5
b5ff844d298650467e7d45a18bfb1303
-
SHA1
a1dab1a6cdd93b0aa06bedcf4088a93f2e8127a4
-
SHA256
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc
-
SHA512
b4c47ed3aef8b5f9c160572824b1a167a6a5a10143254f6b8908f9d37b227f5036feb5345f48eb6dadaed2c884d31dbc7b46de0fd343b9b8b3240869d518bdfa
-
SSDEEP
6144:hgOh2p1qF8C8gDL5GXAHsZC1JxvkChUQxL0hkMVKnzL:hgOgPqFqgD1GVg1J5pdxikfzL
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.wht5py.top/5DA9-7A96-F068-006D-FF24
http://52uo5k3t73ypjije.ssd5gt.top/5DA9-7A96-F068-006D-FF24
http://52uo5k3t73ypjije.lwbi59.top/5DA9-7A96-F068-006D-FF24
http://52uo5k3t73ypjije.3odvfb.top/5DA9-7A96-F068-006D-FF24
http://52uo5k3t73ypjije.onion.to/5DA9-7A96-F068-006D-FF24
http://52uo5k3t73ypjije.onion/5DA9-7A96-F068-006D-FF24
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" fc.exe -
Contacts a large (529) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation fc.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fc.lnk 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fc.lnk fc.exe -
Executes dropped EXE 2 IoCs
pid Process 3216 fc.exe 2628 fc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB6F7.bmp" fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 61 IoCs
pid pid_target Process procid_target 684 3680 WerFault.exe 83 1856 3680 WerFault.exe 83 3252 3680 WerFault.exe 83 2240 3680 WerFault.exe 83 692 3680 WerFault.exe 83 1004 3216 WerFault.exe 98 2928 3216 WerFault.exe 98 1308 3216 WerFault.exe 98 2052 3216 WerFault.exe 98 1548 3216 WerFault.exe 98 3296 3216 WerFault.exe 98 4140 3216 WerFault.exe 98 2260 3216 WerFault.exe 98 804 3216 WerFault.exe 98 2496 2628 WerFault.exe 131 1168 2628 WerFault.exe 131 3472 2628 WerFault.exe 131 3528 3216 WerFault.exe 98 1284 3216 WerFault.exe 98 4672 3216 WerFault.exe 98 1640 3216 WerFault.exe 98 3532 3216 WerFault.exe 98 3016 3216 WerFault.exe 98 1336 3216 WerFault.exe 98 1780 3216 WerFault.exe 98 752 3216 WerFault.exe 98 3212 3216 WerFault.exe 98 5092 3216 WerFault.exe 98 1308 3216 WerFault.exe 98 1292 3216 WerFault.exe 98 5096 3216 WerFault.exe 98 4528 3216 WerFault.exe 98 4112 3216 WerFault.exe 98 1488 3216 WerFault.exe 98 2244 3216 WerFault.exe 98 1004 3216 WerFault.exe 98 2276 3216 WerFault.exe 98 1680 3216 WerFault.exe 98 2496 3216 WerFault.exe 98 4992 3216 WerFault.exe 98 2120 3216 WerFault.exe 98 848 3216 WerFault.exe 98 1920 3216 WerFault.exe 98 3724 3216 WerFault.exe 98 800 3216 WerFault.exe 98 5052 3216 WerFault.exe 98 1452 3216 WerFault.exe 98 1976 3216 WerFault.exe 98 456 3216 WerFault.exe 98 4988 3216 WerFault.exe 98 1328 3216 WerFault.exe 98 4672 3216 WerFault.exe 98 1556 3216 WerFault.exe 98 4640 3216 WerFault.exe 98 4880 3216 WerFault.exe 98 392 3216 WerFault.exe 98 1500 3216 WerFault.exe 98 2508 3216 WerFault.exe 98 392 3216 WerFault.exe 98 1120 3216 WerFault.exe 98 5224 3216 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4456 cmd.exe 4500 PING.EXE 5244 cmd.exe 5336 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4368 taskkill.exe 5296 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\fc.exe\"" fc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings fc.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4500 PING.EXE 5336 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe 3216 fc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Token: SeDebugPrivilege 4368 taskkill.exe Token: SeDebugPrivilege 3216 fc.exe Token: SeDebugPrivilege 2628 fc.exe Token: 33 432 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 432 AUDIODG.EXE Token: SeDebugPrivilege 5296 taskkill.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 3216 fc.exe 2628 fc.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 3216 fc.exe 2628 fc.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3216 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 98 PID 3680 wrote to memory of 3216 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 98 PID 3680 wrote to memory of 3216 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 98 PID 3680 wrote to memory of 4456 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 101 PID 3680 wrote to memory of 4456 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 101 PID 3680 wrote to memory of 4456 3680 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 101 PID 4456 wrote to memory of 4368 4456 cmd.exe 105 PID 4456 wrote to memory of 4368 4456 cmd.exe 105 PID 4456 wrote to memory of 4368 4456 cmd.exe 105 PID 4456 wrote to memory of 4500 4456 cmd.exe 106 PID 4456 wrote to memory of 4500 4456 cmd.exe 106 PID 4456 wrote to memory of 4500 4456 cmd.exe 106 PID 3216 wrote to memory of 692 3216 fc.exe 214 PID 3216 wrote to memory of 692 3216 fc.exe 214 PID 692 wrote to memory of 4152 692 msedge.exe 216 PID 692 wrote to memory of 4152 692 msedge.exe 216 PID 3216 wrote to memory of 1968 3216 fc.exe 220 PID 3216 wrote to memory of 1968 3216 fc.exe 220 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 3568 692 msedge.exe 224 PID 692 wrote to memory of 2276 692 msedge.exe 225 PID 692 wrote to memory of 2276 692 msedge.exe 225 PID 692 wrote to memory of 804 692 msedge.exe 227 PID 692 wrote to memory of 804 692 msedge.exe 227 PID 692 wrote to memory of 804 692 msedge.exe 227 PID 692 wrote to memory of 804 692 msedge.exe 227
Processes
-
C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 85842⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 86002⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 87362⤵
- Program crash
PID:3252
-
-
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\fc.exe"C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\fc.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 85763⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 86643⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 87643⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 87643⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 87643⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 88363⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 87923⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 89403⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 89203⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 86163⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5163⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 92963⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5163⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 92243⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93803⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93843⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93883⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93923⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93963⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93843⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 92243⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93883⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94043⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5163⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93923⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94083⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 92963⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94003⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94083⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 86163⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94043⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94003⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94083⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 92963⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 86163⤵
- Program crash
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94043⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 86163⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94083⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94003⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5163⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93723⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94043⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93883⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93523⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 87043⤵
- Program crash
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc195f46f8,0x7ffc195f4708,0x7ffc195f47184⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:84⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:14⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:14⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:14⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:14⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:14⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:84⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:84⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:14⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:14⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3641067151266409745,7768936015629906964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:14⤵PID:824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93123⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93283⤵
- Program crash
PID:4880
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94523⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93283⤵
- Program crash
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.wht5py.top/5DA9-7A96-F068-006D-FF24?auto3⤵PID:2488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc195f46f8,0x7ffc195f4708,0x7ffc195f47184⤵PID:1956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 94843⤵
- Program crash
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93123⤵
- Program crash
PID:392
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93443⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 93923⤵
- Program crash
PID:5224
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "fc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\fc.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5244 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "fc.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5296
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 89122⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 88922⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3680 -ip 36801⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3680 -ip 36801⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3680 -ip 36801⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3680 -ip 36801⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3680 -ip 36801⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3216 -ip 32161⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3216 -ip 32161⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3216 -ip 32161⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3216 -ip 32161⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3216 -ip 32161⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3216 -ip 32161⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3216 -ip 32161⤵PID:2496
-
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\fc.exeC:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\fc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 85562⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 86002⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 86202⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2628 -ip 26281⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2628 -ip 26281⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2628 -ip 26281⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3216 -ip 32161⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3216 -ip 32161⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3216 -ip 32161⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3216 -ip 32161⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3216 -ip 32161⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3216 -ip 32161⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3216 -ip 32161⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3216 -ip 32161⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3216 -ip 32161⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3216 -ip 32161⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3216 -ip 32161⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3216 -ip 32161⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3216 -ip 32161⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3216 -ip 32161⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3216 -ip 32161⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3216 -ip 32161⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3216 -ip 32161⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3216 -ip 32161⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3216 -ip 32161⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3216 -ip 32161⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3216 -ip 32161⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3216 -ip 32161⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3216 -ip 32161⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3216 -ip 32161⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3216 -ip 32161⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3216 -ip 32161⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3216 -ip 32161⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3216 -ip 32161⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3216 -ip 32161⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3216 -ip 32161⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3216 -ip 32161⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3216 -ip 32161⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3216 -ip 32161⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3216 -ip 32161⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3216 -ip 32161⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3216 -ip 32161⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3216 -ip 32161⤵PID:544
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:5208
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
5KB
MD518f7ef8f4a5facf621f5cf2bf43d6616
SHA1f1db78a481faa8fec9211b7b5bbacc49ef4716bf
SHA256e7d8348063631c206d9c8478f376fbcf1b0626e18ccf2294fea0996e8dee2ed0
SHA512cbae2e00a2a3255c3aa7eacc4f00bb7e71d5a3dea83bd54624113ef398ae043b33fddce514efc431b9fd014ca29b01b33293f30d0b022c9fb52b18f1b978cde1
-
Filesize
6KB
MD5d294f5c746be7db45ff9a0915b8ce93a
SHA103d882b5f08b9fb41f4f400d2075eaece75194fe
SHA256bf04e8d27b64d64aca5eca6fe784fd7d110c8f28a35512529cc69933670be8a9
SHA51262515f0d9ada2457573b77ea6b2fecd794d2eb700cb3014bd3285763736ae30f36809dacc130fd40530820eaf989d9d6b48c8feeca7a6dad9d26045390a78010
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56c0c0a237939ad7c7eb0fc66a8b882e1
SHA15c1e5dbeb098f619ef535be3a838f4dece5be07a
SHA25605f4db8a0a5249a4195e1f0b87b9a55012f7344bd0c3dceae126d1eac3c6e879
SHA512ffb3af47fbfcab08176d1ace5b9280a83004cfbbce107d6987f71ecf4518b7be1f638692ef85545edfe68c239dcd10d8676bcbe8fd19f068fc013b9318559b09
-
Filesize
1KB
MD53755af4278e9a85948cc1a1f1459c22e
SHA103b49da6d7058002db10f1824ea06a1a8461fc53
SHA2566d6eb8e8479e18c4544179891ee9d3599d63529df9d5d001676952bd8c82d12f
SHA51274f3e61dd4c477bd439e6f4b59ef48558aa974ff08322fc87bd2b63c247032a2d6387f86237719156274c40ccc222b9806243631b21c0385e26cd097c8abc3a9
-
Filesize
347KB
MD5b5ff844d298650467e7d45a18bfb1303
SHA1a1dab1a6cdd93b0aa06bedcf4088a93f2e8127a4
SHA25651716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc
SHA512b4c47ed3aef8b5f9c160572824b1a167a6a5a10143254f6b8908f9d37b227f5036feb5345f48eb6dadaed2c884d31dbc7b46de0fd343b9b8b3240869d518bdfa
-
Filesize
12KB
MD5c18a2bf132510543c555b25cb1930995
SHA112bb9c687c0d28ef61e057f28cfb028bd80a3450
SHA2564d6bea33aadfbd26edda69e2d53c6c2f5951e4513306e0b72a3f61a4d787b66e
SHA51294a7ca6eb13e0ad04dafda2cca59d31b126642ba88b7fa2d2c1b2260dd8ae9ac5f4ca5bd19a13aea9d1339f29e8ea6ba39aaa71063e21b33f7c19c1cc5c8e0f8
-
Filesize
10KB
MD571cbaa86f89a4665c3565015da28eec8
SHA1fffc88dfef86f03ef8b478054fcfb15ddc069031
SHA256dbbc9f131695d56ad64fcff7a7b8ac31be89dd5d1acd9f79f94048c6b8c82f81
SHA5123759cda5a3304585e964e10200096371f0447cc258361cf5cc5a01e02db7fa595cc7e22d877c7c88b1742fc69ae48df821f6637d718287eadca7b09fef3df859
-
Filesize
90B
MD597713602233ef3baac38112576908fe0
SHA1a0c62abd89d7fc072026b230d689b303d82b7d71
SHA256231bd1d331a7c3fd3acf58648682f2bc8c49572fa92269b6effa209ea466677f
SHA5123741fca99f2ea57a3495c536359d5b183239d8a1dc1edac5009a934b779e8939ba25a266c686c15fdadcc40f3e7d65828e6383e645330f93bc8571b898655584
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a