Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 09:35
Behavioral task
behavioral1
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
-
Size
8.2MB
-
MD5
1b6f9f0f8009139a81698cda6e140700
-
SHA1
dd575d166428d7fca33b522914846d09f167b5e9
-
SHA256
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
-
SHA512
b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Processes:
resource yara_rule C:\Windows\System\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 63 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 3528 explorer.exe 5024 explorer.exe 3044 spoolsv.exe 2216 spoolsv.exe 1968 spoolsv.exe 2676 spoolsv.exe 4916 spoolsv.exe 1600 spoolsv.exe 5060 spoolsv.exe 4348 spoolsv.exe 2500 spoolsv.exe 3432 spoolsv.exe 2680 spoolsv.exe 848 spoolsv.exe 4464 spoolsv.exe 2636 spoolsv.exe 5068 spoolsv.exe 1532 spoolsv.exe 3272 spoolsv.exe 4724 spoolsv.exe 5092 spoolsv.exe 2188 spoolsv.exe 2720 spoolsv.exe 2336 spoolsv.exe 2384 spoolsv.exe 2204 spoolsv.exe 4156 spoolsv.exe 4376 spoolsv.exe 3124 spoolsv.exe 3844 spoolsv.exe 5032 spoolsv.exe 2796 spoolsv.exe 3096 spoolsv.exe 4172 spoolsv.exe 2860 spoolsv.exe 3004 spoolsv.exe 2168 spoolsv.exe 3712 spoolsv.exe 4256 spoolsv.exe 1736 spoolsv.exe 4780 spoolsv.exe 1732 spoolsv.exe 3220 spoolsv.exe 5076 spoolsv.exe 1592 spoolsv.exe 1952 spoolsv.exe 2500 spoolsv.exe 3176 spoolsv.exe 4000 spoolsv.exe 1892 spoolsv.exe 3656 spoolsv.exe 3764 spoolsv.exe 2108 spoolsv.exe 3812 spoolsv.exe 1028 spoolsv.exe 4196 spoolsv.exe 880 spoolsv.exe 5092 spoolsv.exe 3352 spoolsv.exe 5008 spoolsv.exe 4292 spoolsv.exe 3912 spoolsv.exe 3180 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exedescription pid process target process PID 4992 set thread context of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 set thread context of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 3528 set thread context of 5024 3528 explorer.exe explorer.exe PID 3528 set thread context of 4240 3528 explorer.exe diskperf.exe -
Drops file in Windows directory 3 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 60 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1736 2216 WerFault.exe spoolsv.exe 1868 1968 WerFault.exe spoolsv.exe 2000 2676 WerFault.exe spoolsv.exe 2448 4916 WerFault.exe spoolsv.exe 3656 1600 WerFault.exe spoolsv.exe 2208 5060 WerFault.exe spoolsv.exe 2044 4348 WerFault.exe spoolsv.exe 3104 2500 WerFault.exe spoolsv.exe 788 3432 WerFault.exe spoolsv.exe 1712 2680 WerFault.exe spoolsv.exe 5048 848 WerFault.exe spoolsv.exe 1836 4464 WerFault.exe spoolsv.exe 2692 2636 WerFault.exe spoolsv.exe 4676 5068 WerFault.exe spoolsv.exe 3812 1532 WerFault.exe spoolsv.exe 1020 3272 WerFault.exe spoolsv.exe 4196 4724 WerFault.exe spoolsv.exe 2964 5092 WerFault.exe spoolsv.exe 4880 2188 WerFault.exe spoolsv.exe 4384 2720 WerFault.exe spoolsv.exe 1616 2336 WerFault.exe spoolsv.exe 1568 2384 WerFault.exe spoolsv.exe 5100 2204 WerFault.exe spoolsv.exe 2612 4156 WerFault.exe spoolsv.exe 4572 4376 WerFault.exe spoolsv.exe 2344 3124 WerFault.exe spoolsv.exe 4032 3844 WerFault.exe spoolsv.exe 2828 5032 WerFault.exe spoolsv.exe 1156 2796 WerFault.exe spoolsv.exe 2132 3096 WerFault.exe spoolsv.exe 3272 4172 WerFault.exe spoolsv.exe 3308 2860 WerFault.exe spoolsv.exe 2424 3004 WerFault.exe spoolsv.exe 552 2168 WerFault.exe spoolsv.exe 4384 3712 WerFault.exe spoolsv.exe 1616 4256 WerFault.exe spoolsv.exe 4368 1736 WerFault.exe spoolsv.exe 2792 4780 WerFault.exe spoolsv.exe 800 1732 WerFault.exe spoolsv.exe 4156 3220 WerFault.exe spoolsv.exe 2568 5076 WerFault.exe spoolsv.exe 368 1592 WerFault.exe spoolsv.exe 2352 1952 WerFault.exe spoolsv.exe 3428 2500 WerFault.exe spoolsv.exe 804 3176 WerFault.exe spoolsv.exe 644 4000 WerFault.exe spoolsv.exe 3016 1892 WerFault.exe spoolsv.exe 3984 3656 WerFault.exe spoolsv.exe 3068 3764 WerFault.exe spoolsv.exe 4732 2108 WerFault.exe spoolsv.exe 2132 3812 WerFault.exe spoolsv.exe 4180 1028 WerFault.exe spoolsv.exe 4168 4196 WerFault.exe spoolsv.exe 2736 880 WerFault.exe spoolsv.exe 4344 5092 WerFault.exe spoolsv.exe 4860 3352 WerFault.exe spoolsv.exe 1264 5008 WerFault.exe spoolsv.exe 1172 4292 WerFault.exe spoolsv.exe 1432 3912 WerFault.exe spoolsv.exe 2676 3180 WerFault.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exepid process 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exepid process 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeexplorer.exedescription pid process target process PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 5024 3528 explorer.exe explorer.exe PID 3528 wrote to memory of 4240 3528 explorer.exe diskperf.exe PID 3528 wrote to memory of 4240 3528 explorer.exe diskperf.exe PID 3528 wrote to memory of 4240 3528 explorer.exe diskperf.exe PID 3528 wrote to memory of 4240 3528 explorer.exe diskperf.exe PID 3528 wrote to memory of 4240 3528 explorer.exe diskperf.exe PID 5024 wrote to memory of 3044 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 3044 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 3044 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2216 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2216 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2216 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1968 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1968 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1968 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2676 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2676 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2676 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4916 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4916 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4916 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1600 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1600 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 1600 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 5060 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 5060 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 5060 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4348 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4348 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 4348 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2500 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2500 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2500 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 3432 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 3432 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 3432 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2680 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2680 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 2680 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 848 5024 explorer.exe spoolsv.exe PID 5024 wrote to memory of 848 5024 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1926⤵
- Program crash
PID:1736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1926⤵
- Program crash
PID:1868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1926⤵
- Program crash
PID:2000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1926⤵
- Program crash
PID:2448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1926⤵
- Program crash
PID:3656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1926⤵
- Program crash
PID:2208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1926⤵
- Program crash
PID:2044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1926⤵
- Program crash
PID:3104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 1926⤵
- Program crash
PID:788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1926⤵
- Program crash
PID:1712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 1926⤵
- Program crash
PID:5048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1926⤵
- Program crash
PID:1836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 1926⤵
- Program crash
PID:2692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1926⤵
- Program crash
PID:4676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 1926⤵
- Program crash
PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 1926⤵
- Program crash
PID:1020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1926⤵
- Program crash
PID:4196
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1926⤵
- Program crash
PID:2964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 1926⤵
- Program crash
PID:4880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1926⤵
- Program crash
PID:4384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 1926⤵
- Program crash
PID:1616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2006⤵
- Program crash
PID:1568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1926⤵
- Program crash
PID:5100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1926⤵
- Program crash
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1926⤵
- Program crash
PID:4572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 1926⤵
- Program crash
PID:2344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 1926⤵
- Program crash
PID:4032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1926⤵
- Program crash
PID:2828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1926⤵
- Program crash
PID:1156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1926⤵
- Program crash
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 1926⤵
- Program crash
PID:3272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 1926⤵
- Program crash
PID:3308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1926⤵
- Program crash
PID:2424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1926⤵
- Program crash
PID:552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1926⤵
- Program crash
PID:4384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 1926⤵
- Program crash
PID:1616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1926⤵
- Program crash
PID:4368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1926⤵
- Program crash
PID:2792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1926⤵
- Program crash
PID:800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 1926⤵
- Program crash
PID:4156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1926⤵
- Program crash
PID:2568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 1926⤵
- Program crash
PID:368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1926⤵
- Program crash
PID:2352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1926⤵
- Program crash
PID:3428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1926⤵
- Program crash
PID:804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1926⤵
- Program crash
PID:644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 1926⤵
- Program crash
PID:3016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 1926⤵
- Program crash
PID:3984
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 1926⤵
- Program crash
PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1926⤵
- Program crash
PID:4732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 1926⤵
- Program crash
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 2006⤵
- Program crash
PID:4180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1926⤵
- Program crash
PID:4168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 1926⤵
- Program crash
PID:2736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1926⤵
- Program crash
PID:4344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 1926⤵
- Program crash
PID:4860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1926⤵
- Program crash
PID:1264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 1926⤵
- Program crash
PID:1172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 1926⤵
- Program crash
PID:1432
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 1926⤵
- Program crash
PID:2676
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2216 -ip 22161⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1968 -ip 19681⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2676 -ip 26761⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4916 -ip 49161⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1600 -ip 16001⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5060 -ip 50601⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4348 -ip 43481⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2500 -ip 25001⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3432 -ip 34321⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2680 -ip 26801⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 848 -ip 8481⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4464 -ip 44641⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2636 -ip 26361⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5068 -ip 50681⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1532 -ip 15321⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3272 -ip 32721⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 47241⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5092 -ip 50921⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2188 -ip 21881⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2720 -ip 27201⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2336 -ip 23361⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2384 -ip 23841⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2204 -ip 22041⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4156 -ip 41561⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3124 -ip 31241⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3844 -ip 38441⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5032 -ip 50321⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2796 -ip 27961⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3096 -ip 30961⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4172 -ip 41721⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2860 -ip 28601⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3004 -ip 30041⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2168 -ip 21681⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3712 -ip 37121⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4256 -ip 42561⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1736 -ip 17361⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4780 -ip 47801⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1732 -ip 17321⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3220 -ip 32201⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5076 -ip 50761⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1592 -ip 15921⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1952 -ip 19521⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2500 -ip 25001⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3176 -ip 31761⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4000 -ip 40001⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1892 -ip 18921⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3656 -ip 36561⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3764 -ip 37641⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2108 -ip 21081⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3812 -ip 38121⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1028 -ip 10281⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4196 -ip 41961⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 880 -ip 8801⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5092 -ip 50921⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3352 -ip 33521⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5008 -ip 50081⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4292 -ip 42921⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3912 -ip 39121⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3180 -ip 31801⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51b6f9f0f8009139a81698cda6e140700
SHA1dd575d166428d7fca33b522914846d09f167b5e9
SHA2561e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
SHA512b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
Filesize
8.2MB
MD511603a89737377eea7ed93f311d09fca
SHA1b522a86f92d20445341c7bab4ea12f38d7b4ecda
SHA2565b8d92cdf64164f0a1d5afd0b0bd76c9e5dcf54aaf18cc6411e0c4b0b6c2cb67
SHA512e8d6a325b920571a11e6a192ad7fb3351471d6ea32f3f657586586936254d24458d13b06309e6461534b37c82759031155cf0f785a65b5c63abda47c9732eaaf
-
Filesize
8.2MB
MD58bffebebb0008281b2b512787d662e19
SHA1f823c68978d357028bb8e6e5f7729b29cefb45d6
SHA256c2b13c3e89814f34c416e8d12ad5e0514cda5f7a0e8ece31c28c9d1a7bfcca15
SHA512fac4ed4081ef09eecdd5e2b47f94a5869782ee69514b09c60951df8b33068f030ddacac9179d74d594a4431217ecd45c6f66972578637e2f76866405485e0f22