Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe
-
Size
265KB
-
MD5
96e7a97c1faea19584f8500c5380013b
-
SHA1
bea0e51f31e0832bb448c411b88f6f4f6d51a244
-
SHA256
4ef2624b6deb1c7e1c0b3f26ee6e30a567a645aa3681e73028da13c62be14a94
-
SHA512
904931f5e07d67ee4ca906e9b41be8bd730c05827a892c907fe251a3218b6d8b8bcac55c3cdc65322a18df955c6e97babdc4e531bf16cd0a10eb83fe606f4f00
-
SSDEEP
6144:BKBMwhQPUP79Yme7jj+r48fiYslrNukL1vgYVKvnP:yMUIuYmuD8KYOrNtL1bUP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation igfxcv32.exe -
Deletes itself 1 IoCs
pid Process 2240 igfxcv32.exe -
Executes dropped EXE 14 IoCs
pid Process 2240 igfxcv32.exe 888 igfxcv32.exe 2784 igfxcv32.exe 3524 igfxcv32.exe 2188 igfxcv32.exe 1996 igfxcv32.exe 2000 igfxcv32.exe 5080 igfxcv32.exe 1812 igfxcv32.exe 4236 igfxcv32.exe 1644 igfxcv32.exe 4020 igfxcv32.exe 5044 igfxcv32.exe 532 igfxcv32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxcv32.exe File opened for modification C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe File created C:\Windows\SysWOW64\igfxcv32.exe igfxcv32.exe -
resource yara_rule behavioral2/memory/936-1-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/936-2-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/936-6-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2240-40-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/936-41-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2240-42-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2240-45-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/888-47-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2784-51-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2784-52-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/3524-54-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2188-56-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2188-58-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1996-59-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1996-61-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2000-63-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2000-64-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/5080-65-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/5080-67-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1812-69-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/4236-72-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/4236-73-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1644-74-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1644-76-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/4020-78-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/5044-80-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/5044-81-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 5080 936 WerFault.exe 82 2260 936 WerFault.exe 82 448 936 WerFault.exe 82 644 936 WerFault.exe 82 4260 936 WerFault.exe 82 2720 936 WerFault.exe 82 672 2240 WerFault.exe 108 4188 2240 WerFault.exe 108 3148 2240 WerFault.exe 108 4304 2240 WerFault.exe 108 4868 2240 WerFault.exe 108 4944 2240 WerFault.exe 108 1536 888 WerFault.exe 121 1524 888 WerFault.exe 121 3176 888 WerFault.exe 121 4356 888 WerFault.exe 121 2708 888 WerFault.exe 121 1656 888 WerFault.exe 121 1428 2784 WerFault.exe 137 2476 2784 WerFault.exe 137 4384 2784 WerFault.exe 137 2896 2784 WerFault.exe 137 4988 2784 WerFault.exe 137 2888 3524 WerFault.exe 148 3636 3524 WerFault.exe 148 4928 3524 WerFault.exe 148 4716 3524 WerFault.exe 148 3144 3524 WerFault.exe 148 2180 2188 WerFault.exe 159 2456 2188 WerFault.exe 159 3496 2188 WerFault.exe 159 5060 2188 WerFault.exe 159 2916 2188 WerFault.exe 159 3764 2188 WerFault.exe 159 1064 1996 WerFault.exe 172 2836 1996 WerFault.exe 172 3272 1996 WerFault.exe 172 1464 1996 WerFault.exe 172 456 1996 WerFault.exe 172 1656 1996 WerFault.exe 172 1588 2000 WerFault.exe 185 4648 2000 WerFault.exe 185 3956 2000 WerFault.exe 185 2516 2000 WerFault.exe 185 3952 2000 WerFault.exe 185 3192 2000 WerFault.exe 185 2020 5080 WerFault.exe 198 1552 5080 WerFault.exe 198 568 5080 WerFault.exe 198 2772 5080 WerFault.exe 198 3532 5080 WerFault.exe 198 3452 5080 WerFault.exe 198 3964 1812 WerFault.exe 211 4840 1812 WerFault.exe 211 3696 1812 WerFault.exe 211 4864 1812 WerFault.exe 211 5100 1812 WerFault.exe 211 984 1812 WerFault.exe 211 3704 4236 WerFault.exe 224 1844 4236 WerFault.exe 224 4852 4236 WerFault.exe 224 3708 4236 WerFault.exe 224 1464 4236 WerFault.exe 224 4972 4236 WerFault.exe 224 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcv32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxcv32.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 2240 igfxcv32.exe 2240 igfxcv32.exe 2240 igfxcv32.exe 2240 igfxcv32.exe 888 igfxcv32.exe 888 igfxcv32.exe 888 igfxcv32.exe 888 igfxcv32.exe 2784 igfxcv32.exe 2784 igfxcv32.exe 2784 igfxcv32.exe 2784 igfxcv32.exe 3524 igfxcv32.exe 3524 igfxcv32.exe 3524 igfxcv32.exe 3524 igfxcv32.exe 2188 igfxcv32.exe 2188 igfxcv32.exe 2188 igfxcv32.exe 2188 igfxcv32.exe 1996 igfxcv32.exe 1996 igfxcv32.exe 1996 igfxcv32.exe 1996 igfxcv32.exe 2000 igfxcv32.exe 2000 igfxcv32.exe 2000 igfxcv32.exe 2000 igfxcv32.exe 5080 igfxcv32.exe 5080 igfxcv32.exe 5080 igfxcv32.exe 5080 igfxcv32.exe 1812 igfxcv32.exe 1812 igfxcv32.exe 1812 igfxcv32.exe 1812 igfxcv32.exe 4236 igfxcv32.exe 4236 igfxcv32.exe 4236 igfxcv32.exe 4236 igfxcv32.exe 1644 igfxcv32.exe 1644 igfxcv32.exe 1644 igfxcv32.exe 1644 igfxcv32.exe 4020 igfxcv32.exe 4020 igfxcv32.exe 4020 igfxcv32.exe 4020 igfxcv32.exe 5044 igfxcv32.exe 5044 igfxcv32.exe 5044 igfxcv32.exe 5044 igfxcv32.exe 532 igfxcv32.exe 532 igfxcv32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 936 wrote to memory of 2240 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 108 PID 936 wrote to memory of 2240 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 108 PID 936 wrote to memory of 2240 936 96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe 108 PID 2240 wrote to memory of 888 2240 igfxcv32.exe 121 PID 2240 wrote to memory of 888 2240 igfxcv32.exe 121 PID 2240 wrote to memory of 888 2240 igfxcv32.exe 121 PID 888 wrote to memory of 2784 888 igfxcv32.exe 137 PID 888 wrote to memory of 2784 888 igfxcv32.exe 137 PID 888 wrote to memory of 2784 888 igfxcv32.exe 137 PID 2784 wrote to memory of 3524 2784 igfxcv32.exe 148 PID 2784 wrote to memory of 3524 2784 igfxcv32.exe 148 PID 2784 wrote to memory of 3524 2784 igfxcv32.exe 148 PID 3524 wrote to memory of 2188 3524 igfxcv32.exe 159 PID 3524 wrote to memory of 2188 3524 igfxcv32.exe 159 PID 3524 wrote to memory of 2188 3524 igfxcv32.exe 159 PID 2188 wrote to memory of 1996 2188 igfxcv32.exe 172 PID 2188 wrote to memory of 1996 2188 igfxcv32.exe 172 PID 2188 wrote to memory of 1996 2188 igfxcv32.exe 172 PID 1996 wrote to memory of 2000 1996 igfxcv32.exe 185 PID 1996 wrote to memory of 2000 1996 igfxcv32.exe 185 PID 1996 wrote to memory of 2000 1996 igfxcv32.exe 185 PID 2000 wrote to memory of 5080 2000 igfxcv32.exe 198 PID 2000 wrote to memory of 5080 2000 igfxcv32.exe 198 PID 2000 wrote to memory of 5080 2000 igfxcv32.exe 198 PID 5080 wrote to memory of 1812 5080 igfxcv32.exe 211 PID 5080 wrote to memory of 1812 5080 igfxcv32.exe 211 PID 5080 wrote to memory of 1812 5080 igfxcv32.exe 211 PID 1812 wrote to memory of 4236 1812 igfxcv32.exe 224 PID 1812 wrote to memory of 4236 1812 igfxcv32.exe 224 PID 1812 wrote to memory of 4236 1812 igfxcv32.exe 224 PID 4236 wrote to memory of 1644 4236 igfxcv32.exe 237 PID 4236 wrote to memory of 1644 4236 igfxcv32.exe 237 PID 4236 wrote to memory of 1644 4236 igfxcv32.exe 237 PID 1644 wrote to memory of 4020 1644 igfxcv32.exe 248 PID 1644 wrote to memory of 4020 1644 igfxcv32.exe 248 PID 1644 wrote to memory of 4020 1644 igfxcv32.exe 248 PID 4020 wrote to memory of 5044 4020 igfxcv32.exe 259 PID 4020 wrote to memory of 5044 4020 igfxcv32.exe 259 PID 4020 wrote to memory of 5044 4020 igfxcv32.exe 259 PID 5044 wrote to memory of 532 5044 igfxcv32.exe 272 PID 5044 wrote to memory of 532 5044 igfxcv32.exe 272 PID 5044 wrote to memory of 532 5044 igfxcv32.exe 272
Processes
-
C:\Users\Admin\AppData\Local\Temp\96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96e7a97c1faea19584f8500c5380013b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 8362⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 9242⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 9402⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 10042⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 10122⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Users\Admin\AppData\Local\Temp\96E7A9~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 8283⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9363⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9963⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9843⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 8363⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 8764⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 9324⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 9084⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 9324⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 10004⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 8125⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 8725⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 8925⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9605⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8566⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8726⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8726⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 9606⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 8487⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 8447⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 9487⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 9847⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 9887⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 8408⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 8408⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 9528⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 9928⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 9648⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 8769⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9129⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9249⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9649⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9129⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 81610⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 86010⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 92810⤵
- Program crash
PID:568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 92810⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 89210⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 85611⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 90411⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 93611⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 89611⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 98811⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 85612⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 84012⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 92812⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 93612⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 94012⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 80013⤵PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 90013⤵PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 80813⤵PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 99213⤵PID:2256
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 55614⤵PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 82414⤵PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 90014⤵PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 97214⤵PID:1768
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 80015⤵PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 88815⤵PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 94815⤵PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 98815⤵PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 94815⤵PID:1808
-
-
C:\Windows\SysWOW64\igfxcv32.exe"C:\Windows\system32\igfxcv32.exe" C:\Windows\SysWOW64\igfxcv32.exe15⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 14015⤵PID:660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 14014⤵PID:3076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 14413⤵PID:4648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 14012⤵
- Program crash
PID:4972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 14011⤵
- Program crash
PID:984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 14010⤵
- Program crash
PID:3452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 1409⤵
- Program crash
PID:3192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 1408⤵
- Program crash
PID:1656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 1407⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1406⤵
- Program crash
PID:3144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 1405⤵
- Program crash
PID:4988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 1404⤵
- Program crash
PID:1656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 1403⤵
- Program crash
PID:4944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1522⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 936 -ip 9361⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 936 -ip 9361⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 936 -ip 9361⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 936 -ip 9361⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 936 -ip 9361⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 936 -ip 9361⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2240 -ip 22401⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2240 -ip 22401⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2240 -ip 22401⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2240 -ip 22401⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2240 -ip 22401⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2240 -ip 22401⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 888 -ip 8881⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 888 -ip 8881⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 888 -ip 8881⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 888 -ip 8881⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 888 -ip 8881⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 888 -ip 8881⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2784 -ip 27841⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2784 -ip 27841⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2784 -ip 27841⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2784 -ip 27841⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2784 -ip 27841⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3524 -ip 35241⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3524 -ip 35241⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3524 -ip 35241⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3524 -ip 35241⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3524 -ip 35241⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2188 -ip 21881⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2188 -ip 21881⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2188 -ip 21881⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2188 -ip 21881⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2188 -ip 21881⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2188 -ip 21881⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1996 -ip 19961⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1996 -ip 19961⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1996 -ip 19961⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1996 -ip 19961⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1996 -ip 19961⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1996 -ip 19961⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2000 -ip 20001⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2000 -ip 20001⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2000 -ip 20001⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2000 -ip 20001⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2000 -ip 20001⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2000 -ip 20001⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5080 -ip 50801⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5080 -ip 50801⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5080 -ip 50801⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5080 -ip 50801⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5080 -ip 50801⤵PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5080 -ip 50801⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1812 -ip 18121⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1812 -ip 18121⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1812 -ip 18121⤵PID:488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1812 -ip 18121⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1812 -ip 18121⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1812 -ip 18121⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4236 -ip 42361⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4236 -ip 42361⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4236 -ip 42361⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4236 -ip 42361⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4236 -ip 42361⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4236 -ip 42361⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1644 -ip 16441⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1644 -ip 16441⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1644 -ip 16441⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1644 -ip 16441⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1644 -ip 16441⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4020 -ip 40201⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4020 -ip 40201⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4020 -ip 40201⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4020 -ip 40201⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4020 -ip 40201⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5044 -ip 50441⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5044 -ip 50441⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 5044 -ip 50441⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 5044 -ip 50441⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 5044 -ip 50441⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 5044 -ip 50441⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD596e7a97c1faea19584f8500c5380013b
SHA1bea0e51f31e0832bb448c411b88f6f4f6d51a244
SHA2564ef2624b6deb1c7e1c0b3f26ee6e30a567a645aa3681e73028da13c62be14a94
SHA512904931f5e07d67ee4ca906e9b41be8bd730c05827a892c907fe251a3218b6d8b8bcac55c3cdc65322a18df955c6e97babdc4e531bf16cd0a10eb83fe606f4f00