Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 09:35
Behavioral task
behavioral1
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
-
Size
8.2MB
-
MD5
1b6f9f0f8009139a81698cda6e140700
-
SHA1
dd575d166428d7fca33b522914846d09f167b5e9
-
SHA256
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
-
SHA512
b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023b92-26.dat warzonerat behavioral2/files/0x000a000000023b90-48.dat warzonerat behavioral2/files/0x000c000000023b90-64.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral2/files/0x000b000000023b92-26.dat aspack_v212_v242 behavioral2/files/0x000a000000023b90-48.dat aspack_v212_v242 behavioral2/files/0x000c000000023b90-64.dat aspack_v212_v242 -
Executes dropped EXE 63 IoCs
pid Process 3528 explorer.exe 5024 explorer.exe 3044 spoolsv.exe 2216 spoolsv.exe 1968 spoolsv.exe 2676 spoolsv.exe 4916 spoolsv.exe 1600 spoolsv.exe 5060 spoolsv.exe 4348 spoolsv.exe 2500 spoolsv.exe 3432 spoolsv.exe 2680 spoolsv.exe 848 spoolsv.exe 4464 spoolsv.exe 2636 spoolsv.exe 5068 spoolsv.exe 1532 spoolsv.exe 3272 spoolsv.exe 4724 spoolsv.exe 5092 spoolsv.exe 2188 spoolsv.exe 2720 spoolsv.exe 2336 spoolsv.exe 2384 spoolsv.exe 2204 spoolsv.exe 4156 spoolsv.exe 4376 spoolsv.exe 3124 spoolsv.exe 3844 spoolsv.exe 5032 spoolsv.exe 2796 spoolsv.exe 3096 spoolsv.exe 4172 spoolsv.exe 2860 spoolsv.exe 3004 spoolsv.exe 2168 spoolsv.exe 3712 spoolsv.exe 4256 spoolsv.exe 1736 spoolsv.exe 4780 spoolsv.exe 1732 spoolsv.exe 3220 spoolsv.exe 5076 spoolsv.exe 1592 spoolsv.exe 1952 spoolsv.exe 2500 spoolsv.exe 3176 spoolsv.exe 4000 spoolsv.exe 1892 spoolsv.exe 3656 spoolsv.exe 3764 spoolsv.exe 2108 spoolsv.exe 3812 spoolsv.exe 1028 spoolsv.exe 4196 spoolsv.exe 880 spoolsv.exe 5092 spoolsv.exe 3352 spoolsv.exe 5008 spoolsv.exe 4292 spoolsv.exe 3912 spoolsv.exe 3180 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4992 set thread context of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 set thread context of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 3528 set thread context of 5024 3528 explorer.exe 107 PID 3528 set thread context of 4240 3528 explorer.exe 108 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 60 IoCs
pid pid_target Process procid_target 1736 2216 WerFault.exe 110 1868 1968 WerFault.exe 115 2000 2676 WerFault.exe 118 2448 4916 WerFault.exe 121 3656 1600 WerFault.exe 124 2208 5060 WerFault.exe 127 2044 4348 WerFault.exe 130 3104 2500 WerFault.exe 133 788 3432 WerFault.exe 136 1712 2680 WerFault.exe 139 5048 848 WerFault.exe 142 1836 4464 WerFault.exe 145 2692 2636 WerFault.exe 148 4676 5068 WerFault.exe 151 3812 1532 WerFault.exe 154 1020 3272 WerFault.exe 157 4196 4724 WerFault.exe 160 2964 5092 WerFault.exe 163 4880 2188 WerFault.exe 167 4384 2720 WerFault.exe 170 1616 2336 WerFault.exe 174 1568 2384 WerFault.exe 177 5100 2204 WerFault.exe 180 2612 4156 WerFault.exe 184 4572 4376 WerFault.exe 188 2344 3124 WerFault.exe 192 4032 3844 WerFault.exe 195 2828 5032 WerFault.exe 198 1156 2796 WerFault.exe 202 2132 3096 WerFault.exe 206 3272 4172 WerFault.exe 210 3308 2860 WerFault.exe 213 2424 3004 WerFault.exe 216 552 2168 WerFault.exe 219 4384 3712 WerFault.exe 222 1616 4256 WerFault.exe 225 4368 1736 WerFault.exe 228 2792 4780 WerFault.exe 231 800 1732 WerFault.exe 234 4156 3220 WerFault.exe 237 2568 5076 WerFault.exe 240 368 1592 WerFault.exe 243 2352 1952 WerFault.exe 246 3428 2500 WerFault.exe 249 804 3176 WerFault.exe 252 644 4000 WerFault.exe 255 3016 1892 WerFault.exe 258 3984 3656 WerFault.exe 261 3068 3764 WerFault.exe 264 4732 2108 WerFault.exe 267 2132 3812 WerFault.exe 270 4180 1028 WerFault.exe 273 4168 4196 WerFault.exe 276 2736 880 WerFault.exe 279 4344 5092 WerFault.exe 282 4860 3352 WerFault.exe 285 1264 5008 WerFault.exe 288 1172 4292 WerFault.exe 291 1432 3912 WerFault.exe 294 2676 3180 WerFault.exe 297 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe 5024 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 3268 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 102 PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 4992 wrote to memory of 4224 4992 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 103 PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 104 PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 104 PID 3268 wrote to memory of 3528 3268 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 104 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 5024 3528 explorer.exe 107 PID 3528 wrote to memory of 4240 3528 explorer.exe 108 PID 3528 wrote to memory of 4240 3528 explorer.exe 108 PID 3528 wrote to memory of 4240 3528 explorer.exe 108 PID 3528 wrote to memory of 4240 3528 explorer.exe 108 PID 3528 wrote to memory of 4240 3528 explorer.exe 108 PID 5024 wrote to memory of 3044 5024 explorer.exe 109 PID 5024 wrote to memory of 3044 5024 explorer.exe 109 PID 5024 wrote to memory of 3044 5024 explorer.exe 109 PID 5024 wrote to memory of 2216 5024 explorer.exe 110 PID 5024 wrote to memory of 2216 5024 explorer.exe 110 PID 5024 wrote to memory of 2216 5024 explorer.exe 110 PID 5024 wrote to memory of 1968 5024 explorer.exe 115 PID 5024 wrote to memory of 1968 5024 explorer.exe 115 PID 5024 wrote to memory of 1968 5024 explorer.exe 115 PID 5024 wrote to memory of 2676 5024 explorer.exe 118 PID 5024 wrote to memory of 2676 5024 explorer.exe 118 PID 5024 wrote to memory of 2676 5024 explorer.exe 118 PID 5024 wrote to memory of 4916 5024 explorer.exe 121 PID 5024 wrote to memory of 4916 5024 explorer.exe 121 PID 5024 wrote to memory of 4916 5024 explorer.exe 121 PID 5024 wrote to memory of 1600 5024 explorer.exe 124 PID 5024 wrote to memory of 1600 5024 explorer.exe 124 PID 5024 wrote to memory of 1600 5024 explorer.exe 124 PID 5024 wrote to memory of 5060 5024 explorer.exe 127 PID 5024 wrote to memory of 5060 5024 explorer.exe 127 PID 5024 wrote to memory of 5060 5024 explorer.exe 127 PID 5024 wrote to memory of 4348 5024 explorer.exe 130 PID 5024 wrote to memory of 4348 5024 explorer.exe 130 PID 5024 wrote to memory of 4348 5024 explorer.exe 130 PID 5024 wrote to memory of 2500 5024 explorer.exe 133 PID 5024 wrote to memory of 2500 5024 explorer.exe 133 PID 5024 wrote to memory of 2500 5024 explorer.exe 133 PID 5024 wrote to memory of 3432 5024 explorer.exe 136 PID 5024 wrote to memory of 3432 5024 explorer.exe 136 PID 5024 wrote to memory of 3432 5024 explorer.exe 136 PID 5024 wrote to memory of 2680 5024 explorer.exe 139 PID 5024 wrote to memory of 2680 5024 explorer.exe 139 PID 5024 wrote to memory of 2680 5024 explorer.exe 139 PID 5024 wrote to memory of 848 5024 explorer.exe 142 PID 5024 wrote to memory of 848 5024 explorer.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1926⤵
- Program crash
PID:1736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1926⤵
- Program crash
PID:1868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1926⤵
- Program crash
PID:2000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1926⤵
- Program crash
PID:2448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1926⤵
- Program crash
PID:3656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1926⤵
- Program crash
PID:2208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1926⤵
- Program crash
PID:2044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1926⤵
- Program crash
PID:3104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 1926⤵
- Program crash
PID:788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1926⤵
- Program crash
PID:1712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 1926⤵
- Program crash
PID:5048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1926⤵
- Program crash
PID:1836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 1926⤵
- Program crash
PID:2692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1926⤵
- Program crash
PID:4676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 1926⤵
- Program crash
PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 1926⤵
- Program crash
PID:1020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1926⤵
- Program crash
PID:4196
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1926⤵
- Program crash
PID:2964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 1926⤵
- Program crash
PID:4880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1926⤵
- Program crash
PID:4384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 1926⤵
- Program crash
PID:1616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2006⤵
- Program crash
PID:1568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1926⤵
- Program crash
PID:5100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1926⤵
- Program crash
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1926⤵
- Program crash
PID:4572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 1926⤵
- Program crash
PID:2344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 1926⤵
- Program crash
PID:4032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1926⤵
- Program crash
PID:2828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1926⤵
- Program crash
PID:1156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1926⤵
- Program crash
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 1926⤵
- Program crash
PID:3272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 1926⤵
- Program crash
PID:3308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1926⤵
- Program crash
PID:2424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1926⤵
- Program crash
PID:552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1926⤵
- Program crash
PID:4384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 1926⤵
- Program crash
PID:1616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1926⤵
- Program crash
PID:4368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1926⤵
- Program crash
PID:2792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1926⤵
- Program crash
PID:800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 1926⤵
- Program crash
PID:4156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1926⤵
- Program crash
PID:2568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 1926⤵
- Program crash
PID:368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1926⤵
- Program crash
PID:2352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1926⤵
- Program crash
PID:3428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1926⤵
- Program crash
PID:804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1926⤵
- Program crash
PID:644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 1926⤵
- Program crash
PID:3016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 1926⤵
- Program crash
PID:3984
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 1926⤵
- Program crash
PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1926⤵
- Program crash
PID:4732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 1926⤵
- Program crash
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 2006⤵
- Program crash
PID:4180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1926⤵
- Program crash
PID:4168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 1926⤵
- Program crash
PID:2736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1926⤵
- Program crash
PID:4344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 1926⤵
- Program crash
PID:4860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1926⤵
- Program crash
PID:1264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 1926⤵
- Program crash
PID:1172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 1926⤵
- Program crash
PID:1432
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 1926⤵
- Program crash
PID:2676
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2216 -ip 22161⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1968 -ip 19681⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2676 -ip 26761⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4916 -ip 49161⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1600 -ip 16001⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5060 -ip 50601⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4348 -ip 43481⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2500 -ip 25001⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3432 -ip 34321⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2680 -ip 26801⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 848 -ip 8481⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4464 -ip 44641⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2636 -ip 26361⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5068 -ip 50681⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1532 -ip 15321⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3272 -ip 32721⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 47241⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5092 -ip 50921⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2188 -ip 21881⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2720 -ip 27201⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2336 -ip 23361⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2384 -ip 23841⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2204 -ip 22041⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4156 -ip 41561⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3124 -ip 31241⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3844 -ip 38441⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5032 -ip 50321⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2796 -ip 27961⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3096 -ip 30961⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4172 -ip 41721⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2860 -ip 28601⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3004 -ip 30041⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2168 -ip 21681⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3712 -ip 37121⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4256 -ip 42561⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1736 -ip 17361⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4780 -ip 47801⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1732 -ip 17321⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3220 -ip 32201⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5076 -ip 50761⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1592 -ip 15921⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1952 -ip 19521⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2500 -ip 25001⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3176 -ip 31761⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4000 -ip 40001⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1892 -ip 18921⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3656 -ip 36561⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3764 -ip 37641⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2108 -ip 21081⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3812 -ip 38121⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1028 -ip 10281⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4196 -ip 41961⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 880 -ip 8801⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5092 -ip 50921⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3352 -ip 33521⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5008 -ip 50081⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4292 -ip 42921⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3912 -ip 39121⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3180 -ip 31801⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51b6f9f0f8009139a81698cda6e140700
SHA1dd575d166428d7fca33b522914846d09f167b5e9
SHA2561e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
SHA512b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
Filesize
8.2MB
MD511603a89737377eea7ed93f311d09fca
SHA1b522a86f92d20445341c7bab4ea12f38d7b4ecda
SHA2565b8d92cdf64164f0a1d5afd0b0bd76c9e5dcf54aaf18cc6411e0c4b0b6c2cb67
SHA512e8d6a325b920571a11e6a192ad7fb3351471d6ea32f3f657586586936254d24458d13b06309e6461534b37c82759031155cf0f785a65b5c63abda47c9732eaaf
-
Filesize
8.2MB
MD58bffebebb0008281b2b512787d662e19
SHA1f823c68978d357028bb8e6e5f7729b29cefb45d6
SHA256c2b13c3e89814f34c416e8d12ad5e0514cda5f7a0e8ece31c28c9d1a7bfcca15
SHA512fac4ed4081ef09eecdd5e2b47f94a5869782ee69514b09c60951df8b33068f030ddacac9179d74d594a4431217ecd45c6f66972578637e2f76866405485e0f22