Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe
Resource
win7-20240903-en
General
-
Target
560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe
-
Size
1.4MB
-
MD5
c7fc0cee8ca35d709ed276e9f88ddbed
-
SHA1
ceea9d76bf0429872f4d7420addd0abdb5e8f4dc
-
SHA256
560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e
-
SHA512
a1b93c9cb87993f77f2decf0e4ee33277567651d7fb664b579f3e293f97c6b198ce701c02cffd9d295b3e40f62cd6500f55bc252212c5ec81ac9e257831273da
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8aIHo9Hi9Yc1St1R1M9p09oMMhDIGL0:2TvC/MTQYxsWR7aIHEC+coJ1OpwoMMhv
Malware Config
Extracted
remcos
Main
84.38.132.103:7001
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FR1M2R
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RegAsymX.vbs RegAsymX.exe -
Executes dropped EXE 3 IoCs
pid Process 964 RegAsymX.exe 4316 RegAsymX.exe 4064 RegAsymX.exe -
AutoIT Executable 45 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00030000000226ca-14.dat autoit_exe behavioral2/memory/2432-66-0x00000000010E0000-0x0000000001242000-memory.dmp autoit_exe behavioral2/memory/2432-67-0x00000000010E0000-0x0000000001242000-memory.dmp autoit_exe behavioral2/memory/1092-68-0x0000000000A00000-0x0000000000B62000-memory.dmp autoit_exe behavioral2/memory/1092-69-0x0000000000A00000-0x0000000000B62000-memory.dmp autoit_exe behavioral2/memory/1592-70-0x0000000001080000-0x00000000011E2000-memory.dmp autoit_exe behavioral2/memory/1592-71-0x0000000001080000-0x00000000011E2000-memory.dmp autoit_exe behavioral2/memory/1484-73-0x0000000000680000-0x00000000007E2000-memory.dmp autoit_exe behavioral2/memory/1484-74-0x0000000000680000-0x00000000007E2000-memory.dmp autoit_exe behavioral2/memory/4808-75-0x0000000000C70000-0x0000000000DD2000-memory.dmp autoit_exe behavioral2/memory/4808-76-0x0000000000C70000-0x0000000000DD2000-memory.dmp autoit_exe behavioral2/memory/3120-78-0x0000000000400000-0x0000000000562000-memory.dmp autoit_exe behavioral2/memory/3120-79-0x0000000000400000-0x0000000000562000-memory.dmp autoit_exe behavioral2/memory/2692-80-0x0000000000E00000-0x0000000000F62000-memory.dmp autoit_exe behavioral2/memory/2692-81-0x0000000000E00000-0x0000000000F62000-memory.dmp autoit_exe behavioral2/memory/4764-82-0x0000000000800000-0x0000000000962000-memory.dmp autoit_exe behavioral2/memory/4764-83-0x0000000000800000-0x0000000000962000-memory.dmp autoit_exe behavioral2/memory/4120-86-0x0000000000400000-0x0000000000562000-memory.dmp autoit_exe behavioral2/memory/4272-87-0x0000000000C00000-0x0000000000D62000-memory.dmp autoit_exe behavioral2/memory/4272-88-0x0000000000C00000-0x0000000000D62000-memory.dmp autoit_exe behavioral2/memory/4736-91-0x0000000000800000-0x0000000000962000-memory.dmp autoit_exe behavioral2/memory/1744-95-0x0000000000400000-0x0000000000562000-memory.dmp autoit_exe behavioral2/memory/4036-96-0x0000000000820000-0x0000000000982000-memory.dmp autoit_exe behavioral2/memory/4036-97-0x0000000000820000-0x0000000000982000-memory.dmp autoit_exe behavioral2/memory/3656-99-0x00000000006A0000-0x0000000000802000-memory.dmp autoit_exe behavioral2/memory/3656-100-0x00000000006A0000-0x0000000000802000-memory.dmp autoit_exe behavioral2/memory/1376-101-0x0000000000A50000-0x0000000000BB2000-memory.dmp autoit_exe behavioral2/memory/1376-102-0x0000000000A50000-0x0000000000BB2000-memory.dmp autoit_exe behavioral2/memory/4420-104-0x0000000001000000-0x0000000001162000-memory.dmp autoit_exe behavioral2/memory/4420-105-0x0000000001000000-0x0000000001162000-memory.dmp autoit_exe behavioral2/memory/1420-106-0x0000000000600000-0x0000000000762000-memory.dmp autoit_exe behavioral2/memory/1420-107-0x0000000000600000-0x0000000000762000-memory.dmp autoit_exe behavioral2/memory/3224-109-0x0000000000800000-0x0000000000962000-memory.dmp autoit_exe behavioral2/memory/1800-111-0x0000000000A40000-0x0000000000BA2000-memory.dmp autoit_exe behavioral2/memory/1800-112-0x0000000000A40000-0x0000000000BA2000-memory.dmp autoit_exe behavioral2/memory/5108-113-0x0000000000B00000-0x0000000000C62000-memory.dmp autoit_exe behavioral2/memory/5108-114-0x0000000000B00000-0x0000000000C62000-memory.dmp autoit_exe behavioral2/memory/4184-117-0x0000000001000000-0x0000000001162000-memory.dmp autoit_exe behavioral2/memory/4952-118-0x0000000001240000-0x00000000013A2000-memory.dmp autoit_exe behavioral2/memory/4952-119-0x0000000001240000-0x00000000013A2000-memory.dmp autoit_exe behavioral2/memory/2580-123-0x0000000000E00000-0x0000000000F62000-memory.dmp autoit_exe behavioral2/memory/1464-125-0x0000000000A80000-0x0000000000BE2000-memory.dmp autoit_exe behavioral2/memory/1464-126-0x0000000000A80000-0x0000000000BE2000-memory.dmp autoit_exe behavioral2/memory/3752-128-0x0000000000800000-0x0000000000962000-memory.dmp autoit_exe behavioral2/memory/3536-131-0x00000000010E0000-0x0000000001242000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4064 set thread context of 2432 4064 RegAsymX.exe 100 PID 4064 set thread context of 1092 4064 RegAsymX.exe 104 PID 4064 set thread context of 1592 4064 RegAsymX.exe 108 PID 4064 set thread context of 1484 4064 RegAsymX.exe 113 PID 4064 set thread context of 4808 4064 RegAsymX.exe 117 PID 4064 set thread context of 3120 4064 RegAsymX.exe 120 PID 4064 set thread context of 2692 4064 RegAsymX.exe 123 PID 4064 set thread context of 4764 4064 RegAsymX.exe 126 PID 4064 set thread context of 4120 4064 RegAsymX.exe 129 PID 4064 set thread context of 4272 4064 RegAsymX.exe 132 PID 4064 set thread context of 4736 4064 RegAsymX.exe 135 PID 4064 set thread context of 1744 4064 RegAsymX.exe 138 PID 4064 set thread context of 4036 4064 RegAsymX.exe 141 PID 4064 set thread context of 3656 4064 RegAsymX.exe 145 PID 4064 set thread context of 1376 4064 RegAsymX.exe 148 PID 4064 set thread context of 4420 4064 RegAsymX.exe 152 PID 4064 set thread context of 1420 4064 RegAsymX.exe 155 PID 4064 set thread context of 3224 4064 RegAsymX.exe 158 PID 4064 set thread context of 1800 4064 RegAsymX.exe 161 PID 4064 set thread context of 5108 4064 RegAsymX.exe 164 PID 4064 set thread context of 4184 4064 RegAsymX.exe 167 PID 4064 set thread context of 4952 4064 RegAsymX.exe 170 PID 4064 set thread context of 2580 4064 RegAsymX.exe 173 PID 4064 set thread context of 1464 4064 RegAsymX.exe 176 PID 4064 set thread context of 3752 4064 RegAsymX.exe 179 PID 4064 set thread context of 3536 4064 RegAsymX.exe 182 PID 4064 set thread context of 3452 4064 RegAsymX.exe 185 PID 4064 set thread context of 4564 4064 RegAsymX.exe 188 PID 4064 set thread context of 1268 4064 RegAsymX.exe 191 PID 4064 set thread context of 1584 4064 RegAsymX.exe 194 PID 4064 set thread context of 3832 4064 RegAsymX.exe 197 PID 4064 set thread context of 4744 4064 RegAsymX.exe 200 PID 4064 set thread context of 2504 4064 RegAsymX.exe 203 PID 4064 set thread context of 2216 4064 RegAsymX.exe 206 PID 4064 set thread context of 1668 4064 RegAsymX.exe 209 PID 4064 set thread context of 3352 4064 RegAsymX.exe 212 PID 4064 set thread context of 804 4064 RegAsymX.exe 215 PID 4064 set thread context of 2720 4064 RegAsymX.exe 218 PID 4064 set thread context of 1448 4064 RegAsymX.exe 221 PID 4064 set thread context of 4988 4064 RegAsymX.exe 224 PID 4064 set thread context of 372 4064 RegAsymX.exe 227 PID 4064 set thread context of 1496 4064 RegAsymX.exe 230 PID 4064 set thread context of 2748 4064 RegAsymX.exe 233 PID 4064 set thread context of 1600 4064 RegAsymX.exe 236 PID 4064 set thread context of 692 4064 RegAsymX.exe 239 PID 4064 set thread context of 3260 4064 RegAsymX.exe 242 PID 4064 set thread context of 4968 4064 RegAsymX.exe 245 PID 4064 set thread context of 4448 4064 RegAsymX.exe 248 PID 4064 set thread context of 684 4064 RegAsymX.exe 251 PID 4064 set thread context of 4320 4064 RegAsymX.exe 254 PID 4064 set thread context of 900 4064 RegAsymX.exe 257 PID 4064 set thread context of 4100 4064 RegAsymX.exe 260 PID 4064 set thread context of 2416 4064 RegAsymX.exe 263 PID 4064 set thread context of 2808 4064 RegAsymX.exe 266 PID 4064 set thread context of 4580 4064 RegAsymX.exe 269 PID 4064 set thread context of 2708 4064 RegAsymX.exe 272 PID 4064 set thread context of 3276 4064 RegAsymX.exe 275 PID 4064 set thread context of 1988 4064 RegAsymX.exe 278 PID 4064 set thread context of 3388 4064 RegAsymX.exe 281 PID 4064 set thread context of 1168 4064 RegAsymX.exe 284 PID 4064 set thread context of 4532 4064 RegAsymX.exe 287 PID 4064 set thread context of 2252 4064 RegAsymX.exe 290 PID 4064 set thread context of 3944 4064 RegAsymX.exe 293 PID 4064 set thread context of 2612 4064 RegAsymX.exe 296 -
Program crash 64 IoCs
pid pid_target Process procid_target 620 2432 WerFault.exe 100 464 1092 WerFault.exe 104 4748 1592 WerFault.exe 108 4624 1484 WerFault.exe 113 1776 4808 WerFault.exe 117 3696 3120 WerFault.exe 120 4832 2692 WerFault.exe 123 4420 4764 WerFault.exe 126 2172 4120 WerFault.exe 129 4172 4272 WerFault.exe 132 3712 4736 WerFault.exe 135 2540 1744 WerFault.exe 138 948 4036 WerFault.exe 141 5012 3656 WerFault.exe 145 3916 1376 WerFault.exe 148 3192 4420 WerFault.exe 152 2736 1420 WerFault.exe 155 4624 3224 WerFault.exe 158 3044 1800 WerFault.exe 161 4504 5108 WerFault.exe 164 3440 4184 WerFault.exe 167 4824 4952 WerFault.exe 170 2320 2580 WerFault.exe 173 2216 1464 WerFault.exe 176 3816 3752 WerFault.exe 179 3004 3536 WerFault.exe 182 692 3452 WerFault.exe 185 2180 4564 WerFault.exe 188 5072 1268 WerFault.exe 191 2220 1584 WerFault.exe 194 3704 3832 WerFault.exe 197 2488 4744 WerFault.exe 200 3432 2504 WerFault.exe 203 4708 2216 WerFault.exe 206 4624 1668 WerFault.exe 209 4572 3352 WerFault.exe 212 2084 804 WerFault.exe 215 2220 2720 WerFault.exe 218 3304 1448 WerFault.exe 221 4380 4988 WerFault.exe 224 2020 372 WerFault.exe 227 4708 1496 WerFault.exe 230 3844 2748 WerFault.exe 233 2816 1600 WerFault.exe 236 736 692 WerFault.exe 239 664 3260 WerFault.exe 242 2156 4968 WerFault.exe 245 5100 4448 WerFault.exe 248 2992 684 WerFault.exe 251 2704 4320 WerFault.exe 254 4512 900 WerFault.exe 257 4748 4100 WerFault.exe 260 3816 2416 WerFault.exe 263 2728 2808 WerFault.exe 266 1152 4580 WerFault.exe 269 4740 2708 WerFault.exe 272 3296 3276 WerFault.exe 275 4028 1988 WerFault.exe 278 4824 3388 WerFault.exe 281 1444 1168 WerFault.exe 284 5116 4532 WerFault.exe 287 1776 2252 WerFault.exe 290 3216 3944 WerFault.exe 293 2616 2612 WerFault.exe 296 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsymX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsymX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsymX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 964 RegAsymX.exe 964 RegAsymX.exe 4316 RegAsymX.exe 4316 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 964 RegAsymX.exe 964 RegAsymX.exe 4316 RegAsymX.exe 4316 RegAsymX.exe 4064 RegAsymX.exe 4064 RegAsymX.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 964 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 93 PID 3312 wrote to memory of 964 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 93 PID 3312 wrote to memory of 964 3312 560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe 93 PID 964 wrote to memory of 4316 964 RegAsymX.exe 94 PID 964 wrote to memory of 4316 964 RegAsymX.exe 94 PID 964 wrote to memory of 4316 964 RegAsymX.exe 94 PID 4316 wrote to memory of 4064 4316 RegAsymX.exe 97 PID 4316 wrote to memory of 4064 4316 RegAsymX.exe 97 PID 4316 wrote to memory of 4064 4316 RegAsymX.exe 97 PID 4064 wrote to memory of 2432 4064 RegAsymX.exe 100 PID 4064 wrote to memory of 2432 4064 RegAsymX.exe 100 PID 4064 wrote to memory of 2432 4064 RegAsymX.exe 100 PID 4064 wrote to memory of 2432 4064 RegAsymX.exe 100 PID 4064 wrote to memory of 1092 4064 RegAsymX.exe 104 PID 4064 wrote to memory of 1092 4064 RegAsymX.exe 104 PID 4064 wrote to memory of 1092 4064 RegAsymX.exe 104 PID 4064 wrote to memory of 1092 4064 RegAsymX.exe 104 PID 4064 wrote to memory of 1592 4064 RegAsymX.exe 108 PID 4064 wrote to memory of 1592 4064 RegAsymX.exe 108 PID 4064 wrote to memory of 1592 4064 RegAsymX.exe 108 PID 4064 wrote to memory of 1592 4064 RegAsymX.exe 108 PID 4064 wrote to memory of 1484 4064 RegAsymX.exe 113 PID 4064 wrote to memory of 1484 4064 RegAsymX.exe 113 PID 4064 wrote to memory of 1484 4064 RegAsymX.exe 113 PID 4064 wrote to memory of 1484 4064 RegAsymX.exe 113 PID 4064 wrote to memory of 4808 4064 RegAsymX.exe 117 PID 4064 wrote to memory of 4808 4064 RegAsymX.exe 117 PID 4064 wrote to memory of 4808 4064 RegAsymX.exe 117 PID 4064 wrote to memory of 4808 4064 RegAsymX.exe 117 PID 4064 wrote to memory of 3120 4064 RegAsymX.exe 120 PID 4064 wrote to memory of 3120 4064 RegAsymX.exe 120 PID 4064 wrote to memory of 3120 4064 RegAsymX.exe 120 PID 4064 wrote to memory of 3120 4064 RegAsymX.exe 120 PID 4064 wrote to memory of 2692 4064 RegAsymX.exe 123 PID 4064 wrote to memory of 2692 4064 RegAsymX.exe 123 PID 4064 wrote to memory of 2692 4064 RegAsymX.exe 123 PID 4064 wrote to memory of 2692 4064 RegAsymX.exe 123 PID 4064 wrote to memory of 4764 4064 RegAsymX.exe 126 PID 4064 wrote to memory of 4764 4064 RegAsymX.exe 126 PID 4064 wrote to memory of 4764 4064 RegAsymX.exe 126 PID 4064 wrote to memory of 4764 4064 RegAsymX.exe 126 PID 4064 wrote to memory of 4120 4064 RegAsymX.exe 129 PID 4064 wrote to memory of 4120 4064 RegAsymX.exe 129 PID 4064 wrote to memory of 4120 4064 RegAsymX.exe 129 PID 4064 wrote to memory of 4120 4064 RegAsymX.exe 129 PID 4064 wrote to memory of 4272 4064 RegAsymX.exe 132 PID 4064 wrote to memory of 4272 4064 RegAsymX.exe 132 PID 4064 wrote to memory of 4272 4064 RegAsymX.exe 132 PID 4064 wrote to memory of 4272 4064 RegAsymX.exe 132 PID 4064 wrote to memory of 4736 4064 RegAsymX.exe 135 PID 4064 wrote to memory of 4736 4064 RegAsymX.exe 135 PID 4064 wrote to memory of 4736 4064 RegAsymX.exe 135 PID 4064 wrote to memory of 4736 4064 RegAsymX.exe 135 PID 4064 wrote to memory of 1744 4064 RegAsymX.exe 138 PID 4064 wrote to memory of 1744 4064 RegAsymX.exe 138 PID 4064 wrote to memory of 1744 4064 RegAsymX.exe 138 PID 4064 wrote to memory of 1744 4064 RegAsymX.exe 138 PID 4064 wrote to memory of 4036 4064 RegAsymX.exe 141 PID 4064 wrote to memory of 4036 4064 RegAsymX.exe 141 PID 4064 wrote to memory of 4036 4064 RegAsymX.exe 141 PID 4064 wrote to memory of 4036 4064 RegAsymX.exe 141 PID 4064 wrote to memory of 3656 4064 RegAsymX.exe 145 PID 4064 wrote to memory of 3656 4064 RegAsymX.exe 145 PID 4064 wrote to memory of 3656 4064 RegAsymX.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe"C:\Users\Admin\AppData\Local\Temp\560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\directory\RegAsymX.exe"C:\Users\Admin\AppData\Local\Temp\560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\directory\RegAsymX.exe"C:\Users\Admin\AppData\Local\directory\RegAsymX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\directory\RegAsymX.exe"C:\Users\Admin\AppData\Local\directory\RegAsymX.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 5606⤵
- Program crash
PID:620
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1966⤵
- Program crash
PID:464
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 5766⤵
- Program crash
PID:4748
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 2086⤵
- Program crash
PID:4624
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 5726⤵
- Program crash
PID:1776
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 5606⤵
- Program crash
PID:3696
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 2086⤵
- Program crash
PID:4832
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 5606⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 1926⤵
- Program crash
PID:2172
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 5606⤵
- Program crash
PID:4172
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 5646⤵
- Program crash
PID:3712
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 5606⤵
- Program crash
PID:2540
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 5606⤵
- Program crash
PID:948
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 5606⤵
- Program crash
PID:5012
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 5646⤵
- Program crash
PID:3916
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 5606⤵
- Program crash
PID:3192
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 2086⤵
- Program crash
PID:2736
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 5606⤵
- Program crash
PID:4624
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 2086⤵
- Program crash
PID:3044
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 5606⤵
- Program crash
PID:4504
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 5606⤵
- Program crash
PID:3440
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 5606⤵
- Program crash
PID:4824
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 5606⤵
- Program crash
PID:2320
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 5606⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 5726⤵
- Program crash
PID:3816
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 2126⤵
- Program crash
PID:3004
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 2126⤵
- Program crash
PID:692
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 5926⤵
- Program crash
PID:2180
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 5606⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 5606⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 5646⤵
- Program crash
PID:3704
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 5646⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 5606⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 5606⤵
- Program crash
PID:4708
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 5726⤵
- Program crash
PID:4624
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 2166⤵
- Program crash
PID:4572
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 2046⤵
- Program crash
PID:2084
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2006⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 5606⤵
- Program crash
PID:3304
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 2086⤵
- Program crash
PID:4380
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 5606⤵
- Program crash
PID:2020
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 5606⤵
- Program crash
PID:4708
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 5846⤵
- Program crash
PID:3844
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2006⤵
- Program crash
PID:2816
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 5766⤵
- Program crash
PID:736
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 5606⤵
- Program crash
PID:664
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 1966⤵
- Program crash
PID:2156
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 2166⤵
- Program crash
PID:5100
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 5606⤵
- Program crash
PID:2992
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 2086⤵
- Program crash
PID:2704
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 5606⤵
- Program crash
PID:4512
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 5886⤵
- Program crash
PID:4748
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 5766⤵
- Program crash
PID:3816
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 1966⤵
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 2086⤵
- Program crash
PID:1152
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2046⤵
- Program crash
PID:4740
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 2046⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 2046⤵
- Program crash
PID:4028
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 2046⤵
- Program crash
PID:4824
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 5646⤵
- Program crash
PID:1444
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 2086⤵
- Program crash
PID:5116
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 5766⤵
- Program crash
PID:1776
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 2006⤵
- Program crash
PID:3216
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2006⤵
- Program crash
PID:2616
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 5726⤵PID:1812
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 2126⤵PID:756
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2126⤵PID:552
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 2086⤵PID:232
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 5606⤵PID:1580
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 2126⤵PID:2256
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 5606⤵PID:5008
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 1966⤵PID:2728
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2046⤵PID:2564
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2432 -ip 24321⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1092 -ip 10921⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1592 -ip 15921⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1484 -ip 14841⤵PID:3536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4808 -ip 48081⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3120 -ip 31201⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2692 -ip 26921⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4764 -ip 47641⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4120 -ip 41201⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4272 -ip 42721⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4736 -ip 47361⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1744 -ip 17441⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4036 -ip 40361⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3656 -ip 36561⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1376 -ip 13761⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4420 -ip 44201⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1420 -ip 14201⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3224 -ip 32241⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1800 -ip 18001⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5108 -ip 51081⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4184 -ip 41841⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4952 -ip 49521⤵PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2580 -ip 25801⤵PID:1168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1464 -ip 14641⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3752 -ip 37521⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3536 -ip 35361⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3452 -ip 34521⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4564 -ip 45641⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1268 -ip 12681⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1584 -ip 15841⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3832 -ip 38321⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4744 -ip 47441⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2504 -ip 25041⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2216 -ip 22161⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1668 -ip 16681⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3352 -ip 33521⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 804 -ip 8041⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2720 -ip 27201⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1448 -ip 14481⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4988 -ip 49881⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 372 -ip 3721⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1496 -ip 14961⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2748 -ip 27481⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1600 -ip 16001⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 692 -ip 6921⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3260 -ip 32601⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4968 -ip 49681⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4448 -ip 44481⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 684 -ip 6841⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4320 -ip 43201⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 900 -ip 9001⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4100 -ip 41001⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2416 -ip 24161⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2808 -ip 28081⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4580 -ip 45801⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2708 -ip 27081⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3276 -ip 32761⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1988 -ip 19881⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3388 -ip 33881⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1168 -ip 11681⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4532 -ip 45321⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2252 -ip 22521⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3944 -ip 39441⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2612 -ip 26121⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 4572 -ip 45721⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 2316 -ip 23161⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2844 -ip 28441⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3992 -ip 39921⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 1952 -ip 19521⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4536 -ip 45361⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2024 -ip 20241⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4128 -ip 41281⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2740 -ip 27401⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c2e38219d7a60c6d2d6eddae03c85343
SHA1b7e589e418ffb337b676a7520672bb9d336075ad
SHA256efb484d82e900438e9b6910c3dc3ee6ba3cf828f5852000d90045dcd074dea79
SHA512a6c6a4bdfe05d8d3743b88e0821732cba640f064b399872665806e2e86c58de537bc188a02d3699e2e95d1a0e648cd30b2c457ad36480cf0489371f6cea33329
-
Filesize
84KB
MD5e9d80ff6fcd8ceeb2f0c63b6d84354fd
SHA19e697f748635834b3b88f33fbb77323261b325b0
SHA25691f5f7478ffcd500ad50e86ada1faffc60979b449af4d56b3bf1f71bb7da0a3d
SHA512aba78fb40aae7238b20ba9fbe9d975481da595896a651962c41b89f6bea323a7040afaf35a33f0608a4f2d0aaf899537a5e1cc37887afc6ece0e468f9916b343
-
Filesize
408KB
MD5ce86f406e025ab6c2d4619b42b06a10f
SHA1910ec8a487315a88f37d98e65c61886bfb6e5a8d
SHA256c74e9a1bc00368e1cce005364c3b8ec3822241d895febc6f018491ea368e6464
SHA5126b999d9b150eb8b6ecbb37a4b0f3e0a0246a97bce310044bdd90926945a4fd6942bfece1b0f64c57108834efc63a60feb48497db2d4a1a7ded076dc1fe162665
-
Filesize
42KB
MD582867b0c21d8c24cf50c4408d8f9821b
SHA108cdc310e08ae5e72502e4077134bb6de08f3739
SHA256900638a4da24c03753d210ea0c53ff6d729c04563c67b533c5e4f5271f4a3fd5
SHA512f416f2e257caa70d47f152958c95f3f71443afbdd1e641b37ae0ca5d15954f19d8f0461fe035dd3a23afcb6d5e8c62577ae33aa192e35da3af3922bd868f2e0c
-
Filesize
483KB
MD589669f54c2cf58a12e6eb05f0b0c8b45
SHA19dd08035fb240b2d8c284c31786f20c04e4d871a
SHA2567367a34c0b9d0c68678b8bd5bd02a54c94d7a60000aabc0525079b641c0f5e03
SHA512000188de8af2c2886ab5085890835e29cf0e65f6c9fc01a52f47a709650d8c9f411bb8931e545c27edc132ee14fa685ec063d5681bffd9ece56a52473e9f2686
-
Filesize
1.4MB
MD5c7fc0cee8ca35d709ed276e9f88ddbed
SHA1ceea9d76bf0429872f4d7420addd0abdb5e8f4dc
SHA256560def626fc69a10e4979b67107efaad102e2a01ce4733d005003dd47437a30e
SHA512a1b93c9cb87993f77f2decf0e4ee33277567651d7fb664b579f3e293f97c6b198ce701c02cffd9d295b3e40f62cd6500f55bc252212c5ec81ac9e257831273da