Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe
-
Size
394KB
-
MD5
d631173ab9e9fa327bbbea013b590c8c
-
SHA1
3dc47dd70d84de9fedd94712ff1e39af7a5f75bf
-
SHA256
54b6e8dff23773873d9e694cc20e0779bbad01859da3366ed94a68881923f738
-
SHA512
9b711bb0e4340ef045ebdf9105f49aed11bce9e6a68ded5bb4671f7331b142068d1280f3703c53e81638833cbbb8406f2c582be6e85cedbf12a7a2e0b4d734ee
-
SSDEEP
12288:1l+B4C/IqaqJncvvn4F0lcBj1vaMEpcJ:1l7WDJBcXn4DDvax
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation igfxmtv86.exe -
Deletes itself 1 IoCs
pid Process 4116 igfxmtv86.exe -
Executes dropped EXE 20 IoCs
pid Process 4116 igfxmtv86.exe 1732 igfxmtv86.exe 3772 igfxmtv86.exe 3720 igfxmtv86.exe 4896 igfxmtv86.exe 1960 igfxmtv86.exe 3968 igfxmtv86.exe 4924 igfxmtv86.exe 816 igfxmtv86.exe 3340 igfxmtv86.exe 724 igfxmtv86.exe 4940 igfxmtv86.exe 4848 igfxmtv86.exe 5036 igfxmtv86.exe 3188 igfxmtv86.exe 1168 igfxmtv86.exe 3272 igfxmtv86.exe 1960 igfxmtv86.exe 4852 igfxmtv86.exe 1908 igfxmtv86.exe -
Maps connected drives based on registry 3 TTPs 42 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxmtv86.exe -
Drops file in System32 directory 63 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxmtv86.exe d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File opened for modification C:\Windows\SysWOW64\ igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe File created C:\Windows\SysWOW64\igfxmtv86.exe igfxmtv86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 21 IoCs
pid pid_target Process procid_target 1864 3260 WerFault.exe 81 3328 4116 WerFault.exe 85 2940 1732 WerFault.exe 93 768 3772 WerFault.exe 98 4588 3720 WerFault.exe 101 856 4896 WerFault.exe 106 1144 1960 WerFault.exe 109 3096 3968 WerFault.exe 112 3600 4924 WerFault.exe 115 1760 816 WerFault.exe 118 2692 3340 WerFault.exe 121 2452 724 WerFault.exe 124 3712 4940 WerFault.exe 127 1184 4848 WerFault.exe 130 2432 5036 WerFault.exe 133 3268 3188 WerFault.exe 136 5048 1168 WerFault.exe 139 764 3272 WerFault.exe 142 1480 1960 WerFault.exe 145 1040 4852 WerFault.exe 148 4012 1908 WerFault.exe 151 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxmtv86.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxmtv86.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3260 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe 3260 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe 4116 igfxmtv86.exe 4116 igfxmtv86.exe 1732 igfxmtv86.exe 1732 igfxmtv86.exe 3772 igfxmtv86.exe 3772 igfxmtv86.exe 3720 igfxmtv86.exe 3720 igfxmtv86.exe 4896 igfxmtv86.exe 4896 igfxmtv86.exe 1960 igfxmtv86.exe 1960 igfxmtv86.exe 3968 igfxmtv86.exe 3968 igfxmtv86.exe 4924 igfxmtv86.exe 4924 igfxmtv86.exe 816 igfxmtv86.exe 816 igfxmtv86.exe 3340 igfxmtv86.exe 3340 igfxmtv86.exe 724 igfxmtv86.exe 724 igfxmtv86.exe 4940 igfxmtv86.exe 4940 igfxmtv86.exe 4848 igfxmtv86.exe 4848 igfxmtv86.exe 5036 igfxmtv86.exe 5036 igfxmtv86.exe 3188 igfxmtv86.exe 3188 igfxmtv86.exe 1168 igfxmtv86.exe 1168 igfxmtv86.exe 3272 igfxmtv86.exe 3272 igfxmtv86.exe 1960 igfxmtv86.exe 1960 igfxmtv86.exe 4852 igfxmtv86.exe 4852 igfxmtv86.exe 1908 igfxmtv86.exe 1908 igfxmtv86.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4116 3260 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe 85 PID 3260 wrote to memory of 4116 3260 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe 85 PID 3260 wrote to memory of 4116 3260 d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe 85 PID 4116 wrote to memory of 1732 4116 igfxmtv86.exe 93 PID 4116 wrote to memory of 1732 4116 igfxmtv86.exe 93 PID 4116 wrote to memory of 1732 4116 igfxmtv86.exe 93 PID 1732 wrote to memory of 3772 1732 igfxmtv86.exe 98 PID 1732 wrote to memory of 3772 1732 igfxmtv86.exe 98 PID 1732 wrote to memory of 3772 1732 igfxmtv86.exe 98 PID 3772 wrote to memory of 3720 3772 igfxmtv86.exe 101 PID 3772 wrote to memory of 3720 3772 igfxmtv86.exe 101 PID 3772 wrote to memory of 3720 3772 igfxmtv86.exe 101 PID 3720 wrote to memory of 4896 3720 igfxmtv86.exe 106 PID 3720 wrote to memory of 4896 3720 igfxmtv86.exe 106 PID 3720 wrote to memory of 4896 3720 igfxmtv86.exe 106 PID 4896 wrote to memory of 1960 4896 igfxmtv86.exe 109 PID 4896 wrote to memory of 1960 4896 igfxmtv86.exe 109 PID 4896 wrote to memory of 1960 4896 igfxmtv86.exe 109 PID 1960 wrote to memory of 3968 1960 igfxmtv86.exe 112 PID 1960 wrote to memory of 3968 1960 igfxmtv86.exe 112 PID 1960 wrote to memory of 3968 1960 igfxmtv86.exe 112 PID 3968 wrote to memory of 4924 3968 igfxmtv86.exe 115 PID 3968 wrote to memory of 4924 3968 igfxmtv86.exe 115 PID 3968 wrote to memory of 4924 3968 igfxmtv86.exe 115 PID 4924 wrote to memory of 816 4924 igfxmtv86.exe 118 PID 4924 wrote to memory of 816 4924 igfxmtv86.exe 118 PID 4924 wrote to memory of 816 4924 igfxmtv86.exe 118 PID 816 wrote to memory of 3340 816 igfxmtv86.exe 121 PID 816 wrote to memory of 3340 816 igfxmtv86.exe 121 PID 816 wrote to memory of 3340 816 igfxmtv86.exe 121 PID 3340 wrote to memory of 724 3340 igfxmtv86.exe 124 PID 3340 wrote to memory of 724 3340 igfxmtv86.exe 124 PID 3340 wrote to memory of 724 3340 igfxmtv86.exe 124 PID 724 wrote to memory of 4940 724 igfxmtv86.exe 127 PID 724 wrote to memory of 4940 724 igfxmtv86.exe 127 PID 724 wrote to memory of 4940 724 igfxmtv86.exe 127 PID 4940 wrote to memory of 4848 4940 igfxmtv86.exe 130 PID 4940 wrote to memory of 4848 4940 igfxmtv86.exe 130 PID 4940 wrote to memory of 4848 4940 igfxmtv86.exe 130 PID 4848 wrote to memory of 5036 4848 igfxmtv86.exe 133 PID 4848 wrote to memory of 5036 4848 igfxmtv86.exe 133 PID 4848 wrote to memory of 5036 4848 igfxmtv86.exe 133 PID 5036 wrote to memory of 3188 5036 igfxmtv86.exe 136 PID 5036 wrote to memory of 3188 5036 igfxmtv86.exe 136 PID 5036 wrote to memory of 3188 5036 igfxmtv86.exe 136 PID 3188 wrote to memory of 1168 3188 igfxmtv86.exe 139 PID 3188 wrote to memory of 1168 3188 igfxmtv86.exe 139 PID 3188 wrote to memory of 1168 3188 igfxmtv86.exe 139 PID 1168 wrote to memory of 3272 1168 igfxmtv86.exe 142 PID 1168 wrote to memory of 3272 1168 igfxmtv86.exe 142 PID 1168 wrote to memory of 3272 1168 igfxmtv86.exe 142 PID 3272 wrote to memory of 1960 3272 igfxmtv86.exe 145 PID 3272 wrote to memory of 1960 3272 igfxmtv86.exe 145 PID 3272 wrote to memory of 1960 3272 igfxmtv86.exe 145 PID 1960 wrote to memory of 4852 1960 igfxmtv86.exe 148 PID 1960 wrote to memory of 4852 1960 igfxmtv86.exe 148 PID 1960 wrote to memory of 4852 1960 igfxmtv86.exe 148 PID 4852 wrote to memory of 1908 4852 igfxmtv86.exe 151 PID 4852 wrote to memory of 1908 4852 igfxmtv86.exe 151 PID 4852 wrote to memory of 1908 4852 igfxmtv86.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 3362⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Users\Admin\AppData\Local\Temp\D63117~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 3363⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 3084⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 3045⤵
- Program crash
PID:768
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 3046⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 3047⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 3048⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 3089⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 30410⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 30411⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 31212⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 30813⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 30414⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 22015⤵
- Program crash
PID:1184
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 31216⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 30417⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 30418⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 22819⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 30820⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 30421⤵
- Program crash
PID:1040
-
-
C:\Windows\SysWOW64\igfxmtv86.exe"C:\Windows\system32\igfxmtv86.exe" C:\Windows\SysWOW64\IGFXMT~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 30422⤵
- Program crash
PID:4012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 124 -p 3260 -ip 32601⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4116 -ip 41161⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1732 -ip 17321⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3772 -ip 37721⤵PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3720 -ip 37201⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4896 -ip 48961⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1960 -ip 19601⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3968 -ip 39681⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4924 -ip 49241⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 816 -ip 8161⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3340 -ip 33401⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 724 -ip 7241⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4940 -ip 49401⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4848 -ip 48481⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5036 -ip 50361⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3188 -ip 31881⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1168 -ip 11681⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3272 -ip 32721⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1960 -ip 19601⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4852 -ip 48521⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1908 -ip 19081⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5d631173ab9e9fa327bbbea013b590c8c
SHA13dc47dd70d84de9fedd94712ff1e39af7a5f75bf
SHA25654b6e8dff23773873d9e694cc20e0779bbad01859da3366ed94a68881923f738
SHA5129b711bb0e4340ef045ebdf9105f49aed11bce9e6a68ded5bb4671f7331b142068d1280f3703c53e81638833cbbb8406f2c582be6e85cedbf12a7a2e0b4d734ee