W
Medium RiskWindows
WerFault.exeEXECUTABLE

WerFault.exe - Windows Error Reporting Analysis [2026]

WerFault.exe is the Windows Error Reporting process for crash handling. Can be abused for LSASS dumping, process injection, and may indicate exploitation attempts.

0viewsLast verified: Jan 18, 2025

Risk Summary

## Risk Summary | Factor | Assessment | |--------|------------| | Detection Difficulty | Medium | | Abuse Potential | High | | Prevalence | Universal | | Risk Score | 60/100 | WerFault.exe can be abused for credential dumping via crash handling and has been used in advanced attacks.

Overview

What is WerFault.exe?

WerFault.exe (Windows Error Reporting Fault) is the Windows component responsible for handling application crashes and reporting errors to Microsoft.

Key Characteristics

AttributeValue
File NameWerFault.exe
DeveloperMicrosoft Corporation
Digital SignatureMicrosoft Windows
ServiceWindows Error Reporting
TypeError Handler

Technical Details

PropertyDescription
Process TypeUser Application
Parent ProcessCrashing application or svchost
PurposeCrash handling and reporting
Memory AccessFull access to crashed process

WerFault has special permissions to access crashed process memory for dump creation.

Normal Behavior

Normal Behavior

Legitimate Characteristics

Process: WerFault.exe
Parent: Crashing process or svchost.exe
Location: C:\Windows\System32\WerFault.exe
Arguments: -p <PID> -s <flags>

Expected Characteristics

AspectExpected Behavior
TriggerApplication crash
LocationC:\Windows\System32\
ArgumentsProcess ID of crashed app
DurationBrief (during crash handling)
InstancesOne per crash

Normal Arguments

ArgumentPurpose
-pProcess ID
-sFlags
-uUser mode
-eEvent handle

Common Locations

C:\Windows\System32\WerFault.exeC:\Windows\SysWOW64\WerFault.exe

Suspicious Indicators

Suspicious Indicators

Red Flags

IndicatorConcern LevelDescription
Targeting lsass.exeCriticalCredential dumping
Manual executionHighNot from crash
Wrong locationCriticalNot in System32
Repeated crashesMediumPotential exploitation
Memory dumps createdMediumMay contain credentials

LSASS Dump Abuse

Credential Dumping Pattern:
- WerFault.exe -p <lsass_pid>
- Creates memory dump of LSASS
- Attacker extracts credentials
- Legitimate-looking activity

Attack Indicators

PatternConcern
WerFault → lsassCredential dumping
Manual invocationIntentional abuse
Dump file creationEvidence extraction

Abuse Techniques

Abuse Techniques

LSASS Memory Dump

Credential Dumping via WerFault:
1. Attacker causes LSASS to "crash"
2. Or manually invokes WerFault for LSASS
3. WerFault creates memory dump
4. Dump contains credential material
5. Extract with Mimikatz offline

Silent Crash Reporting

# Abuse WerFault for memory dump
# WerFault has special privileges to read process memory
WerFault.exe -p <lsass_pid> -u -s

Defense Evasion

TechniqueImplementation
Legitimate binaryUses signed Microsoft tool
Normal behaviorLooks like crash handling
Memory accessBuilt-in capability
EDR bypassOften whitelisted

Exploitation Detection

Exploitation may trigger WerFault:
- Heap corruption exploits
- Buffer overflow attempts
- Use-after-free attacks
- Crash as exploitation side-effect

Remediation Steps

Remediation Steps

Dump File Cleanup

# Find WER dump files
Get-ChildItem -Path "$env:LOCALAPPDATA\CrashDumps" -Filter "*.dmp"
Get-ChildItem -Path "C:\ProgramData\Microsoft\Windows\WER" -Recurse -Filter "*.dmp"

# Remove sensitive dumps
# After investigation, securely delete

Restrict Dump Creation

# Disable user-mode dumps
$regPath = "HKLM:\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps"
Set-ItemProperty -Path $regPath -Name DumpType -Value 0

# Or disable WER entirely (not recommended)
Set-Service -Name WerSvc -StartupType Disabled

Monitoring

ControlImplementation
LSASS protectionEnable Credential Guard
Dump monitoringAlert on .dmp creation
WerFault auditLog all invocations

Investigation Checklist

Investigation Checklist

Process Analysis

  • What triggered WerFault?
  • What process ID was targeted?
  • Was it LSASS?
  • Is this a legitimate crash?

Dump File Check

  • Were dump files created?
  • What process was dumped?
  • Where are dumps stored?
  • Were dumps accessed/copied?

Exploitation Check

  • Was this part of an attack?
  • Evidence of exploitation?
  • Credential theft indicators?

Timeline

  • When did WerFault run?
  • Correlation with other events?
  • Prior suspicious activity?

MITRE ATT&CK Techniques