Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 03:56
Behavioral task
behavioral1
Sample
d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe
Resource
win10v2004-20241007-en
General
-
Target
d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe
-
Size
8.2MB
-
MD5
bfe0d841dfadacd6b4562ee52be58440
-
SHA1
622520eb08f30a771fe385a6c22605664ec52ec1
-
SHA256
d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152e
-
SHA512
ce43fd0e20dbf25eb7fbda1d3f19ff2028282c2cdf58b8a3aa5e976ea2d2fc2c4bb7aa3c433c4c12df92bb58f39c38b44f7c7e993741af1ee4f90bacc6534ac6
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecM:V8e8e8f8e8e8l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023cb5-26.dat warzonerat behavioral2/files/0x0008000000023cb3-46.dat warzonerat behavioral2/files/0x00030000000226ed-62.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral2/files/0x0009000000023cb5-26.dat aspack_v212_v242 behavioral2/files/0x0008000000023cb3-46.dat aspack_v212_v242 behavioral2/files/0x00030000000226ed-62.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 1216 explorer.exe 5016 explorer.exe 4064 spoolsv.exe 2352 spoolsv.exe 2292 spoolsv.exe 2576 spoolsv.exe 4148 spoolsv.exe 1972 spoolsv.exe 3892 spoolsv.exe 2444 spoolsv.exe 3848 spoolsv.exe 1788 spoolsv.exe 1192 spoolsv.exe 2524 spoolsv.exe 2284 spoolsv.exe 1480 spoolsv.exe 1196 spoolsv.exe 1844 spoolsv.exe 4312 spoolsv.exe 624 spoolsv.exe 4864 spoolsv.exe 2364 spoolsv.exe 4680 spoolsv.exe 3500 spoolsv.exe 4696 spoolsv.exe 2756 spoolsv.exe 216 spoolsv.exe 1468 spoolsv.exe 3124 spoolsv.exe 2316 spoolsv.exe 1288 spoolsv.exe 788 spoolsv.exe 3368 spoolsv.exe 1020 spoolsv.exe 4148 spoolsv.exe 1516 spoolsv.exe 1344 spoolsv.exe 5024 spoolsv.exe 3048 spoolsv.exe 4936 spoolsv.exe 736 spoolsv.exe 4944 spoolsv.exe 3756 spoolsv.exe 1964 spoolsv.exe 1400 spoolsv.exe 1844 spoolsv.exe 4312 spoolsv.exe 1872 spoolsv.exe 2300 spoolsv.exe 4796 spoolsv.exe 2740 spoolsv.exe 3416 spoolsv.exe 1680 spoolsv.exe 4564 spoolsv.exe 3488 spoolsv.exe 2936 spoolsv.exe 3520 spoolsv.exe 1476 spoolsv.exe 2876 spoolsv.exe 4820 spoolsv.exe 3792 spoolsv.exe 4948 spoolsv.exe 2996 spoolsv.exe 452 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5052 set thread context of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 set thread context of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 1216 set thread context of 5016 1216 explorer.exe 95 PID 1216 set thread context of 2580 1216 explorer.exe 96 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4420 2352 WerFault.exe 98 3992 2292 WerFault.exe 102 2268 2576 WerFault.exe 105 3428 4148 WerFault.exe 108 1860 1972 WerFault.exe 111 4396 3892 WerFault.exe 114 4224 2444 WerFault.exe 117 3048 3848 WerFault.exe 120 5072 1788 WerFault.exe 123 1756 1192 WerFault.exe 126 4812 2524 WerFault.exe 129 536 2284 WerFault.exe 132 1964 1480 WerFault.exe 135 4992 1196 WerFault.exe 138 1864 1844 WerFault.exe 141 1944 4312 WerFault.exe 144 1872 624 WerFault.exe 147 2300 4864 WerFault.exe 150 4796 2364 WerFault.exe 153 5068 4680 WerFault.exe 156 2376 3500 WerFault.exe 159 4920 4696 WerFault.exe 162 5060 2756 WerFault.exe 165 3232 216 WerFault.exe 168 3916 1468 WerFault.exe 171 2256 3124 WerFault.exe 174 2236 2316 WerFault.exe 177 3420 1288 WerFault.exe 180 4340 788 WerFault.exe 183 1748 3368 WerFault.exe 186 4632 1020 WerFault.exe 189 2296 4148 WerFault.exe 192 888 1516 WerFault.exe 195 3960 1344 WerFault.exe 198 4636 5024 WerFault.exe 201 3316 3048 WerFault.exe 204 3020 4936 WerFault.exe 207 4188 736 WerFault.exe 210 752 4944 WerFault.exe 213 4896 3756 WerFault.exe 216 3608 1964 WerFault.exe 219 3200 1400 WerFault.exe 222 3044 1844 WerFault.exe 225 3588 4312 WerFault.exe 228 5096 1872 WerFault.exe 231 2908 2300 WerFault.exe 234 100 4796 WerFault.exe 237 3196 2740 WerFault.exe 240 464 3416 WerFault.exe 243 828 1680 WerFault.exe 246 2700 4564 WerFault.exe 249 320 3488 WerFault.exe 252 1216 2936 WerFault.exe 255 1540 3520 WerFault.exe 258 4040 1476 WerFault.exe 261 4340 2876 WerFault.exe 264 3944 4820 WerFault.exe 267 4008 3792 WerFault.exe 270 3964 4948 WerFault.exe 273 1972 2996 WerFault.exe 276 1096 452 WerFault.exe 279 3980 1232 WerFault.exe 282 4868 4376 WerFault.exe 285 2400 4556 WerFault.exe 288 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe 5016 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4016 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 92 PID 5052 wrote to memory of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 5052 wrote to memory of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 5052 wrote to memory of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 5052 wrote to memory of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 5052 wrote to memory of 4772 5052 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 93 PID 4016 wrote to memory of 1216 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 94 PID 4016 wrote to memory of 1216 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 94 PID 4016 wrote to memory of 1216 4016 d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe 94 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 5016 1216 explorer.exe 95 PID 1216 wrote to memory of 2580 1216 explorer.exe 96 PID 1216 wrote to memory of 2580 1216 explorer.exe 96 PID 1216 wrote to memory of 2580 1216 explorer.exe 96 PID 1216 wrote to memory of 2580 1216 explorer.exe 96 PID 1216 wrote to memory of 2580 1216 explorer.exe 96 PID 5016 wrote to memory of 4064 5016 explorer.exe 97 PID 5016 wrote to memory of 4064 5016 explorer.exe 97 PID 5016 wrote to memory of 4064 5016 explorer.exe 97 PID 5016 wrote to memory of 2352 5016 explorer.exe 98 PID 5016 wrote to memory of 2352 5016 explorer.exe 98 PID 5016 wrote to memory of 2352 5016 explorer.exe 98 PID 5016 wrote to memory of 2292 5016 explorer.exe 102 PID 5016 wrote to memory of 2292 5016 explorer.exe 102 PID 5016 wrote to memory of 2292 5016 explorer.exe 102 PID 5016 wrote to memory of 2576 5016 explorer.exe 105 PID 5016 wrote to memory of 2576 5016 explorer.exe 105 PID 5016 wrote to memory of 2576 5016 explorer.exe 105 PID 5016 wrote to memory of 4148 5016 explorer.exe 108 PID 5016 wrote to memory of 4148 5016 explorer.exe 108 PID 5016 wrote to memory of 4148 5016 explorer.exe 108 PID 5016 wrote to memory of 1972 5016 explorer.exe 111 PID 5016 wrote to memory of 1972 5016 explorer.exe 111 PID 5016 wrote to memory of 1972 5016 explorer.exe 111 PID 5016 wrote to memory of 3892 5016 explorer.exe 114 PID 5016 wrote to memory of 3892 5016 explorer.exe 114 PID 5016 wrote to memory of 3892 5016 explorer.exe 114 PID 5016 wrote to memory of 2444 5016 explorer.exe 117 PID 5016 wrote to memory of 2444 5016 explorer.exe 117 PID 5016 wrote to memory of 2444 5016 explorer.exe 117 PID 5016 wrote to memory of 3848 5016 explorer.exe 120 PID 5016 wrote to memory of 3848 5016 explorer.exe 120 PID 5016 wrote to memory of 3848 5016 explorer.exe 120 PID 5016 wrote to memory of 1788 5016 explorer.exe 123 PID 5016 wrote to memory of 1788 5016 explorer.exe 123 PID 5016 wrote to memory of 1788 5016 explorer.exe 123 PID 5016 wrote to memory of 1192 5016 explorer.exe 126 PID 5016 wrote to memory of 1192 5016 explorer.exe 126 PID 5016 wrote to memory of 1192 5016 explorer.exe 126 PID 5016 wrote to memory of 2524 5016 explorer.exe 129 PID 5016 wrote to memory of 2524 5016 explorer.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 2006⤵
- Program crash
PID:4420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1926⤵
- Program crash
PID:3992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1926⤵
- Program crash
PID:2268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1926⤵
- Program crash
PID:3428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 1926⤵
- Program crash
PID:1860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 1926⤵
- Program crash
PID:4396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 1926⤵
- Program crash
PID:4224
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 1926⤵
- Program crash
PID:3048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1926⤵
- Program crash
PID:5072
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 1926⤵
- Program crash
PID:1756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 1926⤵
- Program crash
PID:4812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 1926⤵
- Program crash
PID:536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 1926⤵
- Program crash
PID:1964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 1926⤵
- Program crash
PID:4992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 1926⤵
- Program crash
PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 1926⤵
- Program crash
PID:1944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 1926⤵
- Program crash
PID:1872
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 1926⤵
- Program crash
PID:2300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 1926⤵
- Program crash
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 1926⤵
- Program crash
PID:5068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 1926⤵
- Program crash
PID:2376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 1926⤵
- Program crash
PID:4920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 1926⤵
- Program crash
PID:5060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 1926⤵
- Program crash
PID:3232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 1926⤵
- Program crash
PID:3916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 1926⤵
- Program crash
PID:2256
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 1926⤵
- Program crash
PID:2236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1926⤵
- Program crash
PID:3420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 1926⤵
- Program crash
PID:4340
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 1926⤵
- Program crash
PID:1748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 1926⤵
- Program crash
PID:4632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1926⤵
- Program crash
PID:2296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 1926⤵
- Program crash
PID:888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 1926⤵
- Program crash
PID:3960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 1926⤵
- Program crash
PID:4636
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 1926⤵
- Program crash
PID:3316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1926⤵
- Program crash
PID:3020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 1926⤵
- Program crash
PID:4188
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 1926⤵
- Program crash
PID:752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1926⤵
- Program crash
PID:4896
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1926⤵
- Program crash
PID:3608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1926⤵
- Program crash
PID:3200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 1926⤵
- Program crash
PID:3044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 1926⤵
- Program crash
PID:3588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 1926⤵
- Program crash
PID:5096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1926⤵
- Program crash
PID:2908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 1926⤵
- Program crash
PID:100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 1926⤵
- Program crash
PID:3196
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1926⤵
- Program crash
PID:464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 1926⤵
- Program crash
PID:828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 1926⤵
- Program crash
PID:2700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 1926⤵
- Program crash
PID:320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1926⤵
- Program crash
PID:1216
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 1926⤵
- Program crash
PID:1540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 1926⤵
- Program crash
PID:4040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1926⤵
- Program crash
PID:4340
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 1926⤵
- Program crash
PID:3944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 1926⤵
- Program crash
PID:4008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1926⤵
- Program crash
PID:3964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 1926⤵
- Program crash
PID:1972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 1926⤵
- Program crash
PID:1096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1926⤵
- Program crash
PID:3980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1926⤵
- Program crash
PID:4868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 1926⤵
- Program crash
PID:2400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 1926⤵PID:932
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 1926⤵PID:752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1926⤵PID:1824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 1926⤵PID:4252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 1926⤵PID:820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 1926⤵PID:1944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 1926⤵PID:3252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1926⤵PID:5096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 1926⤵PID:2908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 1926⤵PID:380
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 1926⤵PID:2740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1926⤵PID:636
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2580
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2352 -ip 23521⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2292 -ip 22921⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2576 -ip 25761⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4148 -ip 41481⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1972 -ip 19721⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3892 -ip 38921⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2444 -ip 24441⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3848 -ip 38481⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1788 -ip 17881⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1192 -ip 11921⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2524 -ip 25241⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2284 -ip 22841⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1480 -ip 14801⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1196 -ip 11961⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1844 -ip 18441⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4312 -ip 43121⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 624 -ip 6241⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4864 -ip 48641⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2364 -ip 23641⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4680 -ip 46801⤵PID:100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3500 -ip 35001⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4696 -ip 46961⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2756 -ip 27561⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 216 -ip 2161⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1468 -ip 14681⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3124 -ip 31241⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2316 -ip 23161⤵PID:2516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1288 -ip 12881⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 788 -ip 7881⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3368 -ip 33681⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1020 -ip 10201⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4148 -ip 41481⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1516 -ip 15161⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1344 -ip 13441⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5024 -ip 50241⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3048 -ip 30481⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4936 -ip 49361⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 736 -ip 7361⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4944 -ip 49441⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3756 -ip 37561⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1964 -ip 19641⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1400 -ip 14001⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1844 -ip 18441⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4312 -ip 43121⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1872 -ip 18721⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2300 -ip 23001⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4796 -ip 47961⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2740 -ip 27401⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3416 -ip 34161⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1680 -ip 16801⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4564 -ip 45641⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3488 -ip 34881⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2936 -ip 29361⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3520 -ip 35201⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1476 -ip 14761⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2876 -ip 28761⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4820 -ip 48201⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3792 -ip 37921⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4948 -ip 49481⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2996 -ip 29961⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 452 -ip 4521⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1232 -ip 12321⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4376 -ip 43761⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4556 -ip 45561⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3392 -ip 33921⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1804 -ip 18041⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4888 -ip 48881⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 368 -ip 3681⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3128 -ip 31281⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3640 -ip 36401⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3956 -ip 39561⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2920 -ip 29201⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4864 -ip 48641⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3516 -ip 35161⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4568 -ip 45681⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2372 -ip 23721⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5bfe0d841dfadacd6b4562ee52be58440
SHA1622520eb08f30a771fe385a6c22605664ec52ec1
SHA256d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152e
SHA512ce43fd0e20dbf25eb7fbda1d3f19ff2028282c2cdf58b8a3aa5e976ea2d2fc2c4bb7aa3c433c4c12df92bb58f39c38b44f7c7e993741af1ee4f90bacc6534ac6
-
Filesize
8.2MB
MD511967e3a1f9c433f1b1d3f02dbb25486
SHA1fe6abd81edb7e3e17a073065e826792e8cf13beb
SHA256e80f8ac9f2ad4dc97374ec727846dd11f4a62e9e0d5e2d55bd7478fa5f9b79e6
SHA512726123ca6b0151fab2192b7a06ee8a6b9868d0f513f73abd25fe43f94c804bd7cca7bd88301433d87679a560b9c8c100ac2c24fb22a25c4d75b985fdd4c91293
-
Filesize
8.2MB
MD5c88971182a65ab810f627d13a611d8ef
SHA101c0ea75df214ace12cf249081559d5cbad8f587
SHA256aca7793012eaea80f5cf8871ff7b634e41ef6f32a6b7e893c19fdc45cb5e6b49
SHA5129c0ac9a21da78a4c7ae88a33fe01e458bd44c098d12c65cb8d21aa3813e8df2454724af6e764f38c6d56db4d8817b0fa9681dd62630d638cafd68deba61d0a17