wermgr.exe boot offdmpsvc.dll lolbin
wermgr.exe通过命令行参数`-boot`触发加载特定DLL(offdmpsvc.dll),可用于执行恶意代码。 2025-6-14 23:35:7 Author: www.hexacorn.com(查看原文) 阅读量:11 收藏

Similarly as in the previous case, wermgr.exe accepts many command line arguments:

-boot
-clean
-datacollectorcreate
-nonelevated
-outproc
-purgestores
-queuereporting
-queuereporting_svc
-queuereporting_s_machine
-upload
-uploadforce
-waitforpendingreports

The -boot one is interesting as it triggers the execution of program’s path that attempts to load the following phantom DLL:

C:\Windows\System32\offdmpsvc.dll

As such, placing your payload in the aforementioned DLL will lead to its execution when you launch the following command:

wermgr -boot

文章来源: https://www.hexacorn.com/blog/2025/06/14/wermgr-exe-boot-offdmpsvc-dll-lolbin/
如有侵权请联系:admin#unsafe.sh