Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 09:05
Behavioral task
behavioral1
Sample
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
Resource
win10v2004-20241007-en
General
-
Target
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
-
Size
8.2MB
-
MD5
92632fa28d2d712ff25a8e2f08d9e560
-
SHA1
a37ba3f12223c4171d8bc508b90ca028c6c3e7d7
-
SHA256
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78b
-
SHA512
339f1799002bc302c24ed57b76ec5e0353314045f98e8dfdcd52d3508e47259c153d0d6f91e95cf75e30c768a1d54cd3ff9931aaee7b024b34edbdce28402625
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecp:V8e8e8f8e8e84
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cba-26.dat warzonerat behavioral2/files/0x0007000000023cb8-47.dat warzonerat behavioral2/files/0x0008000000023cbd-59.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral2/files/0x0008000000023cba-26.dat aspack_v212_v242 behavioral2/files/0x0007000000023cb8-47.dat aspack_v212_v242 behavioral2/files/0x0008000000023cbd-59.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 1960 explorer.exe 208 explorer.exe 4308 spoolsv.exe 4244 spoolsv.exe 5044 spoolsv.exe 1208 spoolsv.exe 1420 spoolsv.exe 876 spoolsv.exe 3864 spoolsv.exe 3844 spoolsv.exe 4884 spoolsv.exe 4036 spoolsv.exe 2172 spoolsv.exe 4456 spoolsv.exe 3440 spoolsv.exe 4880 spoolsv.exe 3028 spoolsv.exe 5064 spoolsv.exe 3536 spoolsv.exe 1824 spoolsv.exe 2940 spoolsv.exe 3124 spoolsv.exe 4552 spoolsv.exe 4568 spoolsv.exe 1300 spoolsv.exe 796 spoolsv.exe 1908 spoolsv.exe 4124 spoolsv.exe 5104 spoolsv.exe 4420 spoolsv.exe 5060 spoolsv.exe 1940 spoolsv.exe 4484 spoolsv.exe 3936 spoolsv.exe 4792 spoolsv.exe 4400 spoolsv.exe 4872 spoolsv.exe 1616 spoolsv.exe 1628 spoolsv.exe 1724 spoolsv.exe 3556 spoolsv.exe 4496 spoolsv.exe 1276 spoolsv.exe 2480 spoolsv.exe 2984 spoolsv.exe 3572 spoolsv.exe 3440 spoolsv.exe 2868 spoolsv.exe 784 spoolsv.exe 3444 spoolsv.exe 4656 spoolsv.exe 4516 spoolsv.exe 396 spoolsv.exe 1556 spoolsv.exe 2768 spoolsv.exe 5068 spoolsv.exe 3052 spoolsv.exe 4552 spoolsv.exe 4584 spoolsv.exe 336 spoolsv.exe 2248 spoolsv.exe 384 spoolsv.exe 4360 spoolsv.exe 4392 svchost.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2288 set thread context of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 set thread context of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 1960 set thread context of 208 1960 explorer.exe 102 PID 4308 set thread context of 384 4308 spoolsv.exe 287 PID 4308 set thread context of 2300 4308 spoolsv.exe 288 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 59 IoCs
pid pid_target Process procid_target 3556 4244 WerFault.exe 105 1488 5044 WerFault.exe 109 4508 1208 WerFault.exe 112 4796 1420 WerFault.exe 115 1016 876 WerFault.exe 118 1092 3864 WerFault.exe 121 2868 3844 WerFault.exe 124 920 4884 WerFault.exe 127 2288 4036 WerFault.exe 130 1844 2172 WerFault.exe 133 2032 4456 WerFault.exe 136 4968 3440 WerFault.exe 139 2320 4880 WerFault.exe 143 4312 3028 WerFault.exe 147 800 5064 WerFault.exe 150 3588 3536 WerFault.exe 154 4488 1824 WerFault.exe 157 1144 2940 WerFault.exe 161 2008 3124 WerFault.exe 164 4796 4552 WerFault.exe 167 1016 4568 WerFault.exe 170 3812 1300 WerFault.exe 175 2780 796 WerFault.exe 179 4004 1908 WerFault.exe 182 2040 4124 WerFault.exe 185 4180 5104 WerFault.exe 188 3680 4420 WerFault.exe 191 1704 5060 WerFault.exe 194 1364 1940 WerFault.exe 197 4168 4484 WerFault.exe 200 2276 3936 WerFault.exe 203 4264 4792 WerFault.exe 206 3388 4400 WerFault.exe 209 4316 4872 WerFault.exe 212 2940 1616 WerFault.exe 215 1208 1628 WerFault.exe 218 4664 1724 WerFault.exe 221 4504 3556 WerFault.exe 224 2300 4496 WerFault.exe 227 4360 1276 WerFault.exe 230 3672 2480 WerFault.exe 233 4004 2984 WerFault.exe 236 3660 3572 WerFault.exe 239 2352 3440 WerFault.exe 242 1168 2868 WerFault.exe 245 3900 784 WerFault.exe 248 3028 3444 WerFault.exe 251 5064 4656 WerFault.exe 254 1548 4516 WerFault.exe 257 4668 396 WerFault.exe 260 4652 1556 WerFault.exe 263 1012 2768 WerFault.exe 266 4640 5068 WerFault.exe 269 3824 3052 WerFault.exe 272 2064 4552 WerFault.exe 275 4960 4584 WerFault.exe 278 1956 336 WerFault.exe 281 4436 2248 WerFault.exe 284 796 4360 WerFault.exe 289 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 208 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 208 explorer.exe 384 spoolsv.exe 384 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 4980 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2288 wrote to memory of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2288 wrote to memory of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2288 wrote to memory of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2288 wrote to memory of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2288 wrote to memory of 2848 2288 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 4980 wrote to memory of 1960 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 100 PID 4980 wrote to memory of 1960 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 100 PID 4980 wrote to memory of 1960 4980 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 100 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 208 1960 explorer.exe 102 PID 1960 wrote to memory of 3588 1960 explorer.exe 103 PID 1960 wrote to memory of 3588 1960 explorer.exe 103 PID 1960 wrote to memory of 3588 1960 explorer.exe 103 PID 208 wrote to memory of 4308 208 explorer.exe 104 PID 208 wrote to memory of 4308 208 explorer.exe 104 PID 208 wrote to memory of 4308 208 explorer.exe 104 PID 208 wrote to memory of 4244 208 explorer.exe 105 PID 208 wrote to memory of 4244 208 explorer.exe 105 PID 208 wrote to memory of 4244 208 explorer.exe 105 PID 208 wrote to memory of 5044 208 explorer.exe 109 PID 208 wrote to memory of 5044 208 explorer.exe 109 PID 208 wrote to memory of 5044 208 explorer.exe 109 PID 208 wrote to memory of 1208 208 explorer.exe 112 PID 208 wrote to memory of 1208 208 explorer.exe 112 PID 208 wrote to memory of 1208 208 explorer.exe 112 PID 208 wrote to memory of 1420 208 explorer.exe 115 PID 208 wrote to memory of 1420 208 explorer.exe 115 PID 208 wrote to memory of 1420 208 explorer.exe 115 PID 208 wrote to memory of 876 208 explorer.exe 118 PID 208 wrote to memory of 876 208 explorer.exe 118 PID 208 wrote to memory of 876 208 explorer.exe 118 PID 208 wrote to memory of 3864 208 explorer.exe 121 PID 208 wrote to memory of 3864 208 explorer.exe 121 PID 208 wrote to memory of 3864 208 explorer.exe 121 PID 208 wrote to memory of 3844 208 explorer.exe 124 PID 208 wrote to memory of 3844 208 explorer.exe 124 PID 208 wrote to memory of 3844 208 explorer.exe 124 PID 208 wrote to memory of 4884 208 explorer.exe 127 PID 208 wrote to memory of 4884 208 explorer.exe 127 PID 208 wrote to memory of 4884 208 explorer.exe 127 PID 208 wrote to memory of 4036 208 explorer.exe 130 PID 208 wrote to memory of 4036 208 explorer.exe 130 PID 208 wrote to memory of 4036 208 explorer.exe 130 PID 208 wrote to memory of 2172 208 explorer.exe 133 PID 208 wrote to memory of 2172 208 explorer.exe 133 PID 208 wrote to memory of 2172 208 explorer.exe 133 PID 208 wrote to memory of 4456 208 explorer.exe 136 PID 208 wrote to memory of 4456 208 explorer.exe 136 PID 208 wrote to memory of 4456 208 explorer.exe 136 PID 208 wrote to memory of 3440 208 explorer.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4308 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:384 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 1926⤵
- Program crash
PID:3556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1926⤵
- Program crash
PID:1488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1926⤵
- Program crash
PID:4508
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1926⤵
- Program crash
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 1926⤵
- Program crash
PID:1016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 1926⤵
- Program crash
PID:1092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 1926⤵
- Program crash
PID:2868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 1926⤵
- Program crash
PID:920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1926⤵
- Program crash
PID:2288
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1926⤵
- Program crash
PID:1844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 1926⤵
- Program crash
PID:2032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 1926⤵
- Program crash
PID:4968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1926⤵
- Program crash
PID:2320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 1926⤵
- Program crash
PID:4312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 2006⤵
- Program crash
PID:800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1926⤵
- Program crash
PID:3588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 1926⤵
- Program crash
PID:4488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1926⤵
- Program crash
PID:1144
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 1926⤵
- Program crash
PID:2008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1926⤵
- Program crash
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 2006⤵
- Program crash
PID:1016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 1926⤵
- Program crash
PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 1926⤵
- Program crash
PID:2780
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 2006⤵
- Program crash
PID:4004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 2006⤵
- Program crash
PID:2040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1926⤵
- Program crash
PID:4180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1926⤵
- Program crash
PID:3680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1926⤵
- Program crash
PID:1704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 1926⤵
- Program crash
PID:1364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1926⤵
- Program crash
PID:4168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 1926⤵
- Program crash
PID:2276
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1926⤵
- Program crash
PID:4264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 1926⤵
- Program crash
PID:3388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1926⤵
- Program crash
PID:4316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1926⤵
- Program crash
PID:2940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1926⤵
- Program crash
PID:1208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1926⤵
- Program crash
PID:4664
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 1926⤵
- Program crash
PID:4504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 1926⤵
- Program crash
PID:2300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 1926⤵
- Program crash
PID:4360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1926⤵
- Program crash
PID:3672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1926⤵
- Program crash
PID:4004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1926⤵
- Program crash
PID:3660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 1926⤵
- Program crash
PID:2352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1926⤵
- Program crash
PID:1168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 1926⤵
- Program crash
PID:3900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1926⤵
- Program crash
PID:3028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 1926⤵
- Program crash
PID:5064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1926⤵
- Program crash
PID:1548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 1926⤵
- Program crash
PID:4668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 1926⤵
- Program crash
PID:4652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 1926⤵
- Program crash
PID:1012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1926⤵
- Program crash
PID:4640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 1926⤵
- Program crash
PID:3824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1926⤵
- Program crash
PID:2064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 1926⤵
- Program crash
PID:4960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 1926⤵
- Program crash
PID:1956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1926⤵
- Program crash
PID:4436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1926⤵
- Program crash
PID:796
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:3588
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4244 -ip 42441⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5044 -ip 50441⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1208 -ip 12081⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1420 -ip 14201⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 876 -ip 8761⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3864 -ip 38641⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3844 -ip 38441⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4884 -ip 48841⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4036 -ip 40361⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2172 -ip 21721⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4456 -ip 44561⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3440 -ip 34401⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4880 -ip 48801⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3028 -ip 30281⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5064 -ip 50641⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3536 -ip 35361⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1824 -ip 18241⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2940 -ip 29401⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3124 -ip 31241⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4552 -ip 45521⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4568 -ip 45681⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1300 -ip 13001⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 796 -ip 7961⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1908 -ip 19081⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4124 -ip 41241⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5104 -ip 51041⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4420 -ip 44201⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5060 -ip 50601⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1940 -ip 19401⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4484 -ip 44841⤵PID:800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3936 -ip 39361⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4792 -ip 47921⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4400 -ip 44001⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4872 -ip 48721⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1616 -ip 16161⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1628 -ip 16281⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1724 -ip 17241⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3556 -ip 35561⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4496 -ip 44961⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1276 -ip 12761⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2480 -ip 24801⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2984 -ip 29841⤵PID:100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3572 -ip 35721⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3440 -ip 34401⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2868 -ip 28681⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 784 -ip 7841⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3444 -ip 34441⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4656 -ip 46561⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4516 -ip 45161⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 396 -ip 3961⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1556 -ip 15561⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2768 -ip 27681⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5068 -ip 50681⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3052 -ip 30521⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4552 -ip 45521⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4584 -ip 45841⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 336 -ip 3361⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2248 -ip 22481⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4360 -ip 43601⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD592632fa28d2d712ff25a8e2f08d9e560
SHA1a37ba3f12223c4171d8bc508b90ca028c6c3e7d7
SHA2566aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78b
SHA512339f1799002bc302c24ed57b76ec5e0353314045f98e8dfdcd52d3508e47259c153d0d6f91e95cf75e30c768a1d54cd3ff9931aaee7b024b34edbdce28402625
-
Filesize
8.2MB
MD5da85126295c189dfd53177307b5bbd00
SHA175c8a06e152ca8e20cc66ecc94619dfc5f824d3e
SHA256c48e6b0462b91d01783d82bd0fe35c8cd6b78135f1f746f9be393cc5d3c7ab70
SHA51200c99e59b92cfb3ff027474035f82bc42de40af756d6463b5a8e9ad44c7908b23ff9183e9b1b9969c794316e7a390c6fa0f9f75c22a5261fdbe6309d3085fc26
-
Filesize
8.2MB
MD5b5c1688bc9f2dc6dc5ca4607ff6b8312
SHA14f26bcb68ce9aafe5328be4fba4ee9a524504dad
SHA256a10ba19bc43c0d797a484f3bba4ec900551b717bd78077a97ad089aafc99e936
SHA512032b7c9a21356be94b184a7ba6e2e50c9c1fd32e03292839e04f07372fe3117d9911244260d9f6330a8ad7f3a8f25bb608aa71343db38cbcc646fe55857f9275