Analysis
-
max time kernel
106s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe
Resource
win7-20241010-en
General
-
Target
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe
-
Size
62KB
-
MD5
81150067656989d2e2811d08fdcd7d80
-
SHA1
5c61ed1e8ac0c787e590067d5e0953ca499f88bd
-
SHA256
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37
-
SHA512
74e9c63cac3b60c01463e655304212255be7d0db88896225deac3ed0eb211f7977603c194937dbfb55bf1532d8b8531999b576c3f347002cf3db3c33e70a2324
-
SSDEEP
1536:b8qS+OLPjNW71rGYDAWeotvXllSTeoJ9s4hxajeNbFF2:bk+OL7NW7zEvotvX/6egu4KUbP2
Malware Config
Signatures
-
Detect XtremeRAT payload 17 IoCs
resource yara_rule behavioral2/memory/3608-8-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3608-9-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/772-10-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/772-11-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1380-21-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1380-22-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3524-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4624-29-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4624-30-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2688-37-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2688-38-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3668-45-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3668-46-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3964-53-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3964-54-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3740-61-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3740-62-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2644 set thread context of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 set thread context of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 set thread context of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 set thread context of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 set thread context of 2548 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 120 PID 2644 set thread context of 2360 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 127 PID 2644 set thread context of 5104 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 134 PID 2644 set thread context of 936 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 141 -
resource yara_rule behavioral2/memory/3608-3-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3608-5-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3608-4-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3608-7-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3608-8-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3608-9-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/772-10-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/772-11-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1380-21-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1380-22-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3524-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3524-28-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4624-29-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4624-30-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2688-37-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2688-38-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3668-45-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3668-46-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3964-53-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3964-54-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3740-61-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3740-62-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Program crash 16 IoCs
pid pid_target Process procid_target 2932 772 WerFault.exe 83 2544 772 WerFault.exe 83 3428 1380 WerFault.exe 98 4672 1380 WerFault.exe 98 3156 4624 WerFault.exe 106 3380 4624 WerFault.exe 106 1172 2688 WerFault.exe 114 2104 2688 WerFault.exe 114 1064 3668 WerFault.exe 121 4644 3668 WerFault.exe 121 976 3964 WerFault.exe 128 3184 3964 WerFault.exe 128 4496 3740 WerFault.exe 135 4848 3740 WerFault.exe 135 1304 4392 WerFault.exe 142 4736 4392 WerFault.exe 142 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 2644 wrote to memory of 3608 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 82 PID 3608 wrote to memory of 772 3608 vbc.exe 83 PID 3608 wrote to memory of 772 3608 vbc.exe 83 PID 3608 wrote to memory of 772 3608 vbc.exe 83 PID 3608 wrote to memory of 772 3608 vbc.exe 83 PID 3608 wrote to memory of 4396 3608 vbc.exe 84 PID 3608 wrote to memory of 4396 3608 vbc.exe 84 PID 3608 wrote to memory of 4396 3608 vbc.exe 84 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 2644 wrote to memory of 5112 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 97 PID 5112 wrote to memory of 1380 5112 vbc.exe 98 PID 5112 wrote to memory of 1380 5112 vbc.exe 98 PID 5112 wrote to memory of 1380 5112 vbc.exe 98 PID 5112 wrote to memory of 1380 5112 vbc.exe 98 PID 5112 wrote to memory of 3572 5112 vbc.exe 99 PID 5112 wrote to memory of 3572 5112 vbc.exe 99 PID 5112 wrote to memory of 3572 5112 vbc.exe 99 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 2644 wrote to memory of 3524 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 105 PID 3524 wrote to memory of 4624 3524 vbc.exe 106 PID 3524 wrote to memory of 4624 3524 vbc.exe 106 PID 3524 wrote to memory of 4624 3524 vbc.exe 106 PID 3524 wrote to memory of 4624 3524 vbc.exe 106 PID 3524 wrote to memory of 4836 3524 vbc.exe 107 PID 3524 wrote to memory of 4836 3524 vbc.exe 107 PID 3524 wrote to memory of 4836 3524 vbc.exe 107 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2644 wrote to memory of 2760 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 113 PID 2760 wrote to memory of 2688 2760 vbc.exe 114 PID 2760 wrote to memory of 2688 2760 vbc.exe 114 PID 2760 wrote to memory of 2688 2760 vbc.exe 114 PID 2760 wrote to memory of 2688 2760 vbc.exe 114 PID 2760 wrote to memory of 1812 2760 vbc.exe 115 PID 2760 wrote to memory of 1812 2760 vbc.exe 115 PID 2760 wrote to memory of 1812 2760 vbc.exe 115 PID 2644 wrote to memory of 2548 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 120 PID 2644 wrote to memory of 2548 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 120 PID 2644 wrote to memory of 2548 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 120 PID 2644 wrote to memory of 2548 2644 18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe"C:\Users\Admin\AppData\Local\Temp\18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 4844⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 4924⤵
- Program crash
PID:2544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4396
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 4804⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 5004⤵
- Program crash
PID:4672
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3572
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 4804⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 5044⤵
- Program crash
PID:3380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4836
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 4804⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 5044⤵
- Program crash
PID:2104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1812
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 4484⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 4804⤵
- Program crash
PID:4644
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2904
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 4804⤵
- Program crash
PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 5004⤵
- Program crash
PID:3184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:788
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 4804⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 4884⤵
- Program crash
PID:4848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2544
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 4804⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 4884⤵
- Program crash
PID:4736
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 772 -ip 7721⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 772 -ip 7721⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1380 -ip 13801⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1380 -ip 13801⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4624 -ip 46241⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4624 -ip 46241⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2688 -ip 26881⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2688 -ip 26881⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3668 -ip 36681⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3668 -ip 36681⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3964 -ip 39641⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3964 -ip 39641⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3740 -ip 37401⤵PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3740 -ip 37401⤵PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4392 -ip 43921⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4392 -ip 43921⤵PID:1188