Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 09:00
Behavioral task
behavioral1
Sample
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
Resource
win10v2004-20241007-en
General
-
Target
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe
-
Size
8.2MB
-
MD5
92632fa28d2d712ff25a8e2f08d9e560
-
SHA1
a37ba3f12223c4171d8bc508b90ca028c6c3e7d7
-
SHA256
6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78b
-
SHA512
339f1799002bc302c24ed57b76ec5e0353314045f98e8dfdcd52d3508e47259c153d0d6f91e95cf75e30c768a1d54cd3ff9931aaee7b024b34edbdce28402625
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecp:V8e8e8f8e8e84
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cd6-26.dat warzonerat behavioral2/files/0x0008000000023cd4-48.dat warzonerat behavioral2/files/0x0008000000023cd9-59.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
resource yara_rule behavioral2/files/0x0008000000023cd6-26.dat aspack_v212_v242 behavioral2/files/0x0008000000023cd4-48.dat aspack_v212_v242 behavioral2/files/0x0008000000023cd9-59.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 1668 explorer.exe 2148 explorer.exe 448 spoolsv.exe 2432 spoolsv.exe 3332 spoolsv.exe 4388 spoolsv.exe 1288 spoolsv.exe 4396 spoolsv.exe 3292 spoolsv.exe 1500 spoolsv.exe 2312 spoolsv.exe 4284 spoolsv.exe 1952 spoolsv.exe 5012 spoolsv.exe 5104 spoolsv.exe 5072 spoolsv.exe 808 spoolsv.exe 2344 spoolsv.exe 3232 spoolsv.exe 720 spoolsv.exe 3704 spoolsv.exe 4272 spoolsv.exe 4872 spoolsv.exe 1124 spoolsv.exe 2136 spoolsv.exe 1760 spoolsv.exe 4244 spoolsv.exe 3680 spoolsv.exe 1108 spoolsv.exe 868 spoolsv.exe 3828 spoolsv.exe 1464 spoolsv.exe 2776 spoolsv.exe 1444 spoolsv.exe 1148 spoolsv.exe 716 spoolsv.exe 1520 spoolsv.exe 912 spoolsv.exe 1356 spoolsv.exe 5092 spoolsv.exe 1288 spoolsv.exe 2232 spoolsv.exe 4396 spoolsv.exe 2920 spoolsv.exe 4460 spoolsv.exe 4320 spoolsv.exe 4724 spoolsv.exe 4060 spoolsv.exe 3852 spoolsv.exe 1604 spoolsv.exe 2240 spoolsv.exe 5056 spoolsv.exe 4044 spoolsv.exe 3480 spoolsv.exe 3704 spoolsv.exe 4296 spoolsv.exe 2276 spoolsv.exe 4048 spoolsv.exe 1856 spoolsv.exe 4408 spoolsv.exe 556 spoolsv.exe 5108 spoolsv.exe 1400 spoolsv.exe 552 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3944 set thread context of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 set thread context of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 1668 set thread context of 2148 1668 explorer.exe 101 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 62 IoCs
pid pid_target Process procid_target 4508 2432 WerFault.exe 104 512 3332 WerFault.exe 108 540 4388 WerFault.exe 111 2020 1288 WerFault.exe 114 4244 4396 WerFault.exe 117 4796 3292 WerFault.exe 120 1744 1500 WerFault.exe 123 3972 2312 WerFault.exe 126 1456 4284 WerFault.exe 129 3340 1952 WerFault.exe 132 1912 5012 WerFault.exe 135 312 5104 WerFault.exe 138 4352 5072 WerFault.exe 141 748 808 WerFault.exe 144 3208 2344 WerFault.exe 147 2088 3232 WerFault.exe 150 5020 720 WerFault.exe 153 4532 3704 WerFault.exe 156 1520 4272 WerFault.exe 159 4444 4872 WerFault.exe 163 5048 1124 WerFault.exe 166 5092 2136 WerFault.exe 170 4556 1760 WerFault.exe 174 5064 4244 WerFault.exe 177 2296 3680 WerFault.exe 180 4440 1108 WerFault.exe 184 3036 868 WerFault.exe 187 232 3828 WerFault.exe 190 752 1464 WerFault.exe 193 2128 2776 WerFault.exe 197 1600 1444 WerFault.exe 201 4912 1148 WerFault.exe 205 1220 716 WerFault.exe 208 2280 1520 WerFault.exe 211 3956 912 WerFault.exe 214 1856 1356 WerFault.exe 217 4924 5092 WerFault.exe 220 2696 1288 WerFault.exe 223 1592 2232 WerFault.exe 226 2052 4396 WerFault.exe 229 1168 2920 WerFault.exe 232 3108 4460 WerFault.exe 235 4832 4320 WerFault.exe 238 4008 4724 WerFault.exe 241 2624 4060 WerFault.exe 244 3344 3852 WerFault.exe 247 2760 1604 WerFault.exe 250 4620 2240 WerFault.exe 253 2344 5056 WerFault.exe 256 4816 4044 WerFault.exe 259 2508 3480 WerFault.exe 262 4344 3704 WerFault.exe 265 412 4296 WerFault.exe 268 1640 2276 WerFault.exe 271 724 4048 WerFault.exe 274 2584 1856 WerFault.exe 277 3676 4408 WerFault.exe 280 5028 556 WerFault.exe 283 3292 5108 WerFault.exe 286 1108 1400 WerFault.exe 289 644 552 WerFault.exe 292 1668 3660 WerFault.exe 295 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 2036 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 97 PID 3944 wrote to memory of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 3944 wrote to memory of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 3944 wrote to memory of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 3944 wrote to memory of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 3944 wrote to memory of 3684 3944 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 98 PID 2036 wrote to memory of 1668 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2036 wrote to memory of 1668 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 2036 wrote to memory of 1668 2036 6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe 99 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 2148 1668 explorer.exe 101 PID 1668 wrote to memory of 4484 1668 explorer.exe 102 PID 1668 wrote to memory of 4484 1668 explorer.exe 102 PID 1668 wrote to memory of 4484 1668 explorer.exe 102 PID 2148 wrote to memory of 448 2148 explorer.exe 103 PID 2148 wrote to memory of 448 2148 explorer.exe 103 PID 2148 wrote to memory of 448 2148 explorer.exe 103 PID 2148 wrote to memory of 2432 2148 explorer.exe 104 PID 2148 wrote to memory of 2432 2148 explorer.exe 104 PID 2148 wrote to memory of 2432 2148 explorer.exe 104 PID 2148 wrote to memory of 3332 2148 explorer.exe 108 PID 2148 wrote to memory of 3332 2148 explorer.exe 108 PID 2148 wrote to memory of 3332 2148 explorer.exe 108 PID 2148 wrote to memory of 4388 2148 explorer.exe 111 PID 2148 wrote to memory of 4388 2148 explorer.exe 111 PID 2148 wrote to memory of 4388 2148 explorer.exe 111 PID 2148 wrote to memory of 1288 2148 explorer.exe 114 PID 2148 wrote to memory of 1288 2148 explorer.exe 114 PID 2148 wrote to memory of 1288 2148 explorer.exe 114 PID 2148 wrote to memory of 4396 2148 explorer.exe 117 PID 2148 wrote to memory of 4396 2148 explorer.exe 117 PID 2148 wrote to memory of 4396 2148 explorer.exe 117 PID 2148 wrote to memory of 3292 2148 explorer.exe 120 PID 2148 wrote to memory of 3292 2148 explorer.exe 120 PID 2148 wrote to memory of 3292 2148 explorer.exe 120 PID 2148 wrote to memory of 1500 2148 explorer.exe 123 PID 2148 wrote to memory of 1500 2148 explorer.exe 123 PID 2148 wrote to memory of 1500 2148 explorer.exe 123 PID 2148 wrote to memory of 2312 2148 explorer.exe 126 PID 2148 wrote to memory of 2312 2148 explorer.exe 126 PID 2148 wrote to memory of 2312 2148 explorer.exe 126 PID 2148 wrote to memory of 4284 2148 explorer.exe 129 PID 2148 wrote to memory of 4284 2148 explorer.exe 129 PID 2148 wrote to memory of 4284 2148 explorer.exe 129 PID 2148 wrote to memory of 1952 2148 explorer.exe 132 PID 2148 wrote to memory of 1952 2148 explorer.exe 132 PID 2148 wrote to memory of 1952 2148 explorer.exe 132 PID 2148 wrote to memory of 5012 2148 explorer.exe 135 PID 2148 wrote to memory of 5012 2148 explorer.exe 135 PID 2148 wrote to memory of 5012 2148 explorer.exe 135 PID 2148 wrote to memory of 5104 2148 explorer.exe 138
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"C:\Users\Admin\AppData\Local\Temp\6aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78bN.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 1926⤵
- Program crash
PID:4508
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 1926⤵
- Program crash
PID:512
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 1926⤵
- Program crash
PID:540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 2006⤵
- Program crash
PID:2020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 1926⤵
- Program crash
PID:4244
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1926⤵
- Program crash
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 2006⤵
- Program crash
PID:1744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1926⤵
- Program crash
PID:3972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 1926⤵
- Program crash
PID:1456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1926⤵
- Program crash
PID:3340
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 1926⤵
- Program crash
PID:1912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1926⤵
- Program crash
PID:312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 1926⤵
- Program crash
PID:4352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 1926⤵
- Program crash
PID:748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1926⤵
- Program crash
PID:3208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 1926⤵
- Program crash
PID:2088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 1926⤵
- Program crash
PID:5020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 1926⤵
- Program crash
PID:4532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 1926⤵
- Program crash
PID:1520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1926⤵
- Program crash
PID:4444
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 1926⤵
- Program crash
PID:5048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1926⤵
- Program crash
PID:5092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 1926⤵
- Program crash
PID:4556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 1926⤵
- Program crash
PID:5064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 1926⤵
- Program crash
PID:2296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 1926⤵
- Program crash
PID:4440
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 2006⤵
- Program crash
PID:3036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 1926⤵
- Program crash
PID:232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 1926⤵
- Program crash
PID:752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 1926⤵
- Program crash
PID:2128
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 1926⤵
- Program crash
PID:1600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 1926⤵
- Program crash
PID:4912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 2006⤵
- Program crash
PID:1220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 1926⤵
- Program crash
PID:2280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 1926⤵
- Program crash
PID:3956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 1926⤵
- Program crash
PID:1856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1926⤵
- Program crash
PID:4924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1926⤵
- Program crash
PID:2696
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1926⤵
- Program crash
PID:1592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 1926⤵
- Program crash
PID:2052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1926⤵
- Program crash
PID:1168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1926⤵
- Program crash
PID:3108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 1926⤵
- Program crash
PID:4832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1926⤵
- Program crash
PID:4008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1926⤵
- Program crash
PID:2624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 1926⤵
- Program crash
PID:3344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 1926⤵
- Program crash
PID:2760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 1926⤵
- Program crash
PID:4620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1926⤵
- Program crash
PID:2344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 1926⤵
- Program crash
PID:4816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 1926⤵
- Program crash
PID:2508
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 1926⤵
- Program crash
PID:4344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 1926⤵
- Program crash
PID:412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 1926⤵
- Program crash
PID:1640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 1926⤵
- Program crash
PID:724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 1926⤵
- Program crash
PID:2584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 1926⤵
- Program crash
PID:3676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 1926⤵
- Program crash
PID:5028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 1926⤵
- Program crash
PID:3292
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1926⤵
- Program crash
PID:1108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 1926⤵
- Program crash
PID:644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 1926⤵
- Program crash
PID:1668
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4484
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2432 -ip 24321⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3332 -ip 33321⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4388 -ip 43881⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1288 -ip 12881⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4396 -ip 43961⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3292 -ip 32921⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1500 -ip 15001⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2312 -ip 23121⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4284 -ip 42841⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1952 -ip 19521⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5012 -ip 50121⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5104 -ip 51041⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5072 -ip 50721⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 808 -ip 8081⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2344 -ip 23441⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3232 -ip 32321⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 720 -ip 7201⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3704 -ip 37041⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4272 -ip 42721⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4872 -ip 48721⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1124 -ip 11241⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2136 -ip 21361⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1760 -ip 17601⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4244 -ip 42441⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3680 -ip 36801⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1108 -ip 11081⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 868 -ip 8681⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3828 -ip 38281⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1464 -ip 14641⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2776 -ip 27761⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1444 -ip 14441⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1148 -ip 11481⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 716 -ip 7161⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1520 -ip 15201⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 912 -ip 9121⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1356 -ip 13561⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5092 -ip 50921⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1288 -ip 12881⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2232 -ip 22321⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4396 -ip 43961⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2920 -ip 29201⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4460 -ip 44601⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4320 -ip 43201⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4724 -ip 47241⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4060 -ip 40601⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3852 -ip 38521⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1604 -ip 16041⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2240 -ip 22401⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5056 -ip 50561⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4044 -ip 40441⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3480 -ip 34801⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3704 -ip 37041⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4296 -ip 42961⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2276 -ip 22761⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4048 -ip 40481⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1856 -ip 18561⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4408 -ip 44081⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 556 -ip 5561⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5108 -ip 51081⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1400 -ip 14001⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 552 -ip 5521⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3660 -ip 36601⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD592632fa28d2d712ff25a8e2f08d9e560
SHA1a37ba3f12223c4171d8bc508b90ca028c6c3e7d7
SHA2566aa49505f657f948f6876df76d9828113c28619ac0d072dcf60663ec7f75f78b
SHA512339f1799002bc302c24ed57b76ec5e0353314045f98e8dfdcd52d3508e47259c153d0d6f91e95cf75e30c768a1d54cd3ff9931aaee7b024b34edbdce28402625
-
Filesize
8.2MB
MD530f1187add785c610310cdef8262809a
SHA13294644fccd6f226baee91a060ecb06c4af72046
SHA256a7199a193e5d11bbff04773682cfc63d628927be7a6260eb861e3060ba5a3ed6
SHA5125e180cbb289d450ecb3749c04654c1720f4bdac75e774000d73c4d93eea9b9799ae223c8e6b4d170044990b79a7d8e2f6a601a54d2c43cc3bcc95d28c02034e8
-
Filesize
8.2MB
MD59ce9ff9a6a89cedd697cddf30a93419c
SHA16eb68cdc909dc00dea93ea9fcdbedb3dd31477b6
SHA2561ab6418decd503b54b333d7d1bf1804fd8589ed0f3facff78bc5f54d0443b423
SHA512eba7cf2ef6d0a4a32a7b4e504867441de7f22a89124a08f30d44df749a55836f0107ea80defbd1de23124b8439012f069aacf325fa1f8453559db51a5f4f748b