Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.24224

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.24224 (renamed file extension from 24224 to exe)
Analysis ID:356541
MD5:060bd14ae501d8dae94cc73672ab195b
SHA1:e16be2044b73bfb717d92d13968eac473d64b8fc
SHA256:757c6ccb2021bb12cb15fafcd4d748ef2d347ed4cb51076162563cbfe1ea01e0

Most interesting Screenshot:

Detection

Raccoon
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe (PID: 5080 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe' MD5: 060BD14AE501D8DAE94CC73672AB195B)
    • WerFault.exe (PID: 5952 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 6048 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 4320 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 780 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 5844 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 776 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 4972 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 984 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 1284 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1196 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 5484 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 724 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 5932 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1268 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 1188 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1316 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 5156 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 964 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe PID: 5080JoeSecurity_RaccoonYara detected Raccoon StealerJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for domain / URLShow sources
    Source: yearofthepig.topVirustotal: Detection: 7%Perma Link
    Multi AV Scanner detection for submitted fileShow sources
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeVirustotal: Detection: 39%Perma Link
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeReversingLabs: Detection: 45%
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe PID: 5080, type: MEMORY
    Machine Learning detection for sampleShow sources
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeJoe Sandbox ML: detected
    Source: 35.2.WerFault.exe.5570000.8.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 6.2.WerFault.exe.51c0000.6.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 20.2.WerFault.exe.4da0000.9.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 26.2.WerFault.exe.4b50000.14.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 29.2.WerFault.exe.5280000.6.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 23.2.WerFault.exe.4c10000.9.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 3.2.WerFault.exe.5830000.9.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 11.2.WerFault.exe.4b40000.4.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 9.2.WerFault.exe.4b70000.6.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 32.2.WerFault.exe.4d00000.6.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004245C3 CryptAcquireContextA,CryptCreateHash,lstrlenW,CryptHashData,LdrInitializeThunk,CryptGetHashParam,wsprintfW,lstrcatW,wsprintfW,lstrcatW,CryptDestroyHash,CryptReleaseContext,lstrlenW,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00424796 lstrlenW,lstrlenW,LdrInitializeThunk,lstrlenW,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040A7BA GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,LdrInitializeThunk,CryptUnprotectData,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040C9A1 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,LdrInitializeThunk,LdrInitializeThunk,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040AEC3 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040B8C4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,LdrInitializeThunk,LdrInitializeThunk,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040A1F6 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,LocalAlloc,BCryptDecrypt,BCryptCloseAlgorithmProvider,BCryptDestroyKey,

    Compliance:

    barindex
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe.400000.0.unpack
    Uses 32bit PE filesShow sources
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Uses new MSVCR DllsShow sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Uses secure TLS version for HTTPS connectionsShow sources
    Source: unknownHTTPS traffic detected: 95.216.186.40:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.5:49708 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.50.15:443 -> 192.168.2.5:49716 version: TLS 1.2
    Binary contains paths to debug symbolsShow sources
    Source: Binary string: fltLib.pdb3 source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb? source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: userenv.pdb= source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb?%h source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb- source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb0D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268391034.0000000004C66000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282634329.0000000004BE6000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425556004.0000000005458000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.231387583.00000000034DF000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: upwntdll.pdbcu source: WerFault.exe, 0000000B.00000003.282325812.000000000488F000.00000004.00000001.sdmp
    Source: Binary string: crypt32.pdbk source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb1 source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb-%v source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: mCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000020.00000002.404921233.0000000002332000.00000004.00000010.sdmp
    Source: Binary string: ws2_32.pdbw source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb5 source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdbw source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: shcore.pdbW source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdbI source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbY source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdbgJ source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbq source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdbA source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbq source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdbu source: WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdbw source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb.D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbW source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb: source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb#%| source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb? source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdbe source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdbA source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdbI source: WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdb"D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb9 source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbm source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdbaR source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb:D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdbK source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb9%b source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbr source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb+ source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb9 source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb< source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb'c source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdbG source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdbf source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbO source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbN source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdbC source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb# source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb! source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: combase.pdbK source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268391034.0000000004C66000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282634329.0000000004BE6000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425556004.0000000005458000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb$D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdbQ source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdbo source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winhttp.pdbM source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb5%n source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdbO source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb7 source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb1 source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdbWR source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: nsi.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb' source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbD source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbC source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb] source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb+ source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb/ source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: upwntdll.pdb source: WerFault.exe, 00000003.00000003.231379892.00000000053DC000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.278482644.000000000488F000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.318627812.000000000478C000.00000004.00000001.sdmp
    Source: Binary string: ncryptsslp.pdbH source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb) source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb[ source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.231387583.00000000034DF000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.264539646.0000000002920000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.277504220.000000000293C000.00000004.00000001.sdmp
    Source: Binary string: webio.pdbe source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb} source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: cfgmgr32.pdbc source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb; source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbq source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbi source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdbW source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb<D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbJ source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb% source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdbM source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb! source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: webio.pdbU source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdbydu source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
    Source: unknownDNS traffic detected: queries for: tttttt.me
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518113700.000000004C230000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518113700.000000004C230000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518260751.000000004C2A4000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518113700.000000004C230000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518113700.000000004C230000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518260751.000000004C2A4000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518113700.000000004C230000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
    Source: sqlite3.dll.0.drString found in binary or memory: http://www.sqlite.org/copyright.html.
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518260751.000000004C2A4000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518260751.000000004C2A4000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0_dllZM
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0dy
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0e__
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0ueryeM
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0wi
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.htmlstatcb=0&installdataindex=empty&defaultbrowser=0_vL
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownHTTPS traffic detected: 95.216.186.40:443 -> 192.168.2.5:49705 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.5:49708 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.50.15:443 -> 192.168.2.5:49716 version: TLS 1.2
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004266C0 GdiplusStartup,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,LdrInitializeThunk,_mbstowcs,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,

    E-Banking Fraud:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe PID: 5080, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040A7BA
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042495F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042693B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040C9A1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040AEC3
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0041AE8D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043D521
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040D5AD
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040B8C4
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040DC7B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00413FD7
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0045A249
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0044824A
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0044A210
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0045A369
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0041A4E6
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004644EB
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004144A8
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042865E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004187C0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00412930
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043C990
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00436ACF
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00414B7F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00442BF0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: String function: 004102CD appears 47 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: String function: 0044EE89 appears 33 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: String function: 0043FC0D appears 47 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: String function: 004677E0 appears 90 times
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760
    Source: sqlite3.dll.0.drStatic PE information: Number of sections : 18 > 10
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506161351.0000000000C90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518373350.000000004C330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506026021.0000000000BF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506200301.0000000000CA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506232911.0000000000CB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@11/46@3/3
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00438121 LdrInitializeThunk,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,OpenProcessToken,LdrInitializeThunk,DuplicateTokenEx,CloseHandle,GetModuleFileNameA,_strlen,_mbstowcs,CreateProcessWithTokenW,CloseHandle,Process32NextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042488A CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile created: C:\Users\user\AppData\LocalLow\sqlite3.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeMutant created: \Sessions\1\BaseNamedObjects\uiabfqwfuuser
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5080
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER231.tmpJump to behavior
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: sqlite3.dll.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: sqlite3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
    Source: sqlite3.dll.0.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
    Source: sqlite3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
    Source: sqlite3.dll.0.drBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
    Source: sqlite3.dll.0.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
    Source: sqlite3.dll.0.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeVirustotal: Detection: 39%
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeReversingLabs: Detection: 45%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe'
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 780
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 776
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 984
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1196
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 724
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1268
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1316
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 964
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: Binary string: fltLib.pdb3 source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb? source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: userenv.pdb= source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb?%h source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb- source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb0D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268391034.0000000004C66000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282634329.0000000004BE6000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425556004.0000000005458000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.231387583.00000000034DF000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: upwntdll.pdbcu source: WerFault.exe, 0000000B.00000003.282325812.000000000488F000.00000004.00000001.sdmp
    Source: Binary string: crypt32.pdbk source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb1 source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb-%v source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: mCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000020.00000002.404921233.0000000002332000.00000004.00000010.sdmp
    Source: Binary string: ws2_32.pdbw source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb5 source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdbw source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: shcore.pdbW source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdbI source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbY source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdbgJ source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbq source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdbA source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbq source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdbu source: WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdbw source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb.D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbW source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb: source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb#%| source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb? source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdbe source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdbA source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdbI source: WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdb"D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb9 source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbm source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdbaR source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb:D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdbK source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb9%b source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbr source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb+ source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb9 source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb< source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000003.00000003.235253390.0000000005812000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305142521.0000000004D82000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb'c source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdbG source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdbf source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbO source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdbN source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdbC source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb# source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb! source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdbJ source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: combase.pdbK source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268391034.0000000004C66000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282634329.0000000004BE6000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425556004.0000000005458000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb$D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdbQ source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdbo source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winhttp.pdbM source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdb5%n source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdbO source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb7 source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb1 source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdbWR source: WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: nsi.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb' source: WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbD source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdbC source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb] source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb+ source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb/ source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbv source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: upwntdll.pdb source: WerFault.exe, 00000003.00000003.231379892.00000000053DC000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.278482644.000000000488F000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.318627812.000000000478C000.00000004.00000001.sdmp
    Source: Binary string: ncryptsslp.pdbH source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb) source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb[ source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.231387583.00000000034DF000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.264539646.0000000002920000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.277504220.000000000293C000.00000004.00000001.sdmp
    Source: Binary string: webio.pdbe source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb} source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: cfgmgr32.pdbc source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb; source: WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.235287111.0000000005815000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250493943.00000000051A2000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268347704.0000000004C62000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282356924.0000000004BE2000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305406396.0000000004D86000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325132272.0000000004CD2000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350740368.00000000049E1000.00000004.00000001.sdmp, WerFault.exe, 0000001D.00000003.371701639.0000000005141000.00000004.00000001.sdmp, WerFault.exe, 00000020.00000003.398096900.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000023.00000003.425355601.0000000005452000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbq source: WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbi source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdbW source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb<D source: WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdbJ source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb% source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdbM source: WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.235282719.0000000005810000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250520457.00000000051A0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268384446.0000000004C60000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282622487.0000000004BE0000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305382541.0000000004D80000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325268096.0000000004CD0000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425541698.0000000005450000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb! source: WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp
    Source: Binary string: webio.pdbU source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdbydu source: WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000003.00000003.235233643.00000000056A1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.250476468.00000000050B1000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.268334390.0000000004A81000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.282462854.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000014.00000003.305249633.0000000004C11000.00000004.00000001.sdmp, WerFault.exe, 00000017.00000003.325190194.0000000004D01000.00000004.00000001.sdmp, WerFault.exe, 0000001A.00000003.350839595.0000000004B30000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371822945.0000000005260000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398217948.0000000004DB0000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425443165.0000000005481000.00000004.00000001.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000003.00000003.235263090.0000000005818000.00000004.00000040.sdmp, WerFault.exe, 00000006.00000003.250499870.00000000051A9000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.268398330.0000000004C69000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.282495315.0000000004BE9000.00000004.00000040.sdmp, WerFault.exe, 00000014.00000003.305428637.0000000004D89000.00000004.00000040.sdmp, WerFault.exe, 00000017.00000003.325148264.0000000004CD9000.00000004.00000040.sdmp, WerFault.exe, 0000001A.00000003.350666037.0000000004B37000.00000004.00000040.sdmp, WerFault.exe, 0000001D.00000003.371639824.0000000005268000.00000004.00000040.sdmp, WerFault.exe, 00000020.00000003.398018831.0000000004DB8000.00000004.00000040.sdmp, WerFault.exe, 00000023.00000003.425380083.000000000545B000.00000004.00000040.sdmp
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation:

    barindex
    Detected unpacking (changes PE section rights)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.yodoje:W;.kemafuy:W;.tls:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: section name: .yodoje
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeStatic PE information: section name: .kemafuy
    Source: sqlite3.dll.0.drStatic PE information: section name: /4
    Source: sqlite3.dll.0.drStatic PE information: section name: /19
    Source: sqlite3.dll.0.drStatic PE information: section name: /31
    Source: sqlite3.dll.0.drStatic PE information: section name: /45
    Source: sqlite3.dll.0.drStatic PE information: section name: /57
    Source: sqlite3.dll.0.drStatic PE information: section name: /70
    Source: sqlite3.dll.0.drStatic PE information: section name: /81
    Source: sqlite3.dll.0.drStatic PE information: section name: /92
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004400B4 push ecx; ret
    Source: initial sampleStatic PE information: section name: .text entropy: 7.82132041146
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile created: C:\Users\user\AppData\LocalLow\sqlite3.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0041AE8D SetCurrentDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe TID: 5788Thread sleep time: -30000s >= -30000s
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00436ACF _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518373350.000000004C330000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.241400819.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 00000006.00000002.256676281.0000000005250000.00000002.00000001.sdmp, WerFault.exe, 00000009.00000002.273258271.0000000004CF0000.00000002.00000001.sdmp, WerFault.exe, 0000000B.00000002.288669500.00000000048C0000.00000002.00000001.sdmp, WerFault.exe, 00000014.00000002.313093220.0000000004E30000.00000002.00000001.sdmp, WerFault.exe, 00000017.00000002.331531002.0000000004990000.00000002.00000001.sdmp, WerFault.exe, 0000001A.00000002.357649090.0000000004750000.00000002.00000001.sdmp, WerFault.exe, 0000001D.00000002.383795740.0000000005380000.00000002.00000001.sdmp, WerFault.exe, 00000020.00000002.406817047.0000000004E40000.00000002.00000001.sdmp, WerFault.exe, 00000023.00000002.432959118.0000000005130000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518373350.000000004C330000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.241400819.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 00000006.00000002.256676281.0000000005250000.00000002.00000001.sdmp, WerFault.exe, 00000009.00000002.273258271.0000000004CF0000.00000002.00000001.sdmp, WerFault.exe, 0000000B.00000002.288669500.00000000048C0000.00000002.00000001.sdmp, WerFault.exe, 00000014.00000002.313093220.0000000004E30000.00000002.00000001.sdmp, WerFault.exe, 00000017.00000002.331531002.0000000004990000.00000002.00000001.sdmp, WerFault.exe, 0000001A.00000002.357649090.0000000004750000.00000002.00000001.sdmp, WerFault.exe, 0000001D.00000002.383795740.0000000005380000.00000002.00000001.sdmp, WerFault.exe, 00000020.00000002.406817047.0000000004E40000.00000002.00000001.sdmp, WerFault.exe, 00000023.00000002.432959118.0000000005130000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518373350.000000004C330000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.241400819.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 00000006.00000002.256676281.0000000005250000.00000002.00000001.sdmp, WerFault.exe, 00000009.00000002.273258271.0000000004CF0000.00000002.00000001.sdmp, WerFault.exe, 0000000B.00000002.288669500.00000000048C0000.00000002.00000001.sdmp, WerFault.exe, 00000014.00000002.313093220.0000000004E30000.00000002.00000001.sdmp, WerFault.exe, 00000017.00000002.331531002.0000000004990000.00000002.00000001.sdmp, WerFault.exe, 0000001A.00000002.357649090.0000000004750000.00000002.00000001.sdmp, WerFault.exe, 0000001D.00000002.383795740.0000000005380000.00000002.00000001.sdmp, WerFault.exe, 00000020.00000002.406817047.0000000004E40000.00000002.00000001.sdmp, WerFault.exe, 00000023.00000002.432959118.0000000005130000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.518373350.000000004C330000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.241400819.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 00000006.00000002.256676281.0000000005250000.00000002.00000001.sdmp, WerFault.exe, 00000009.00000002.273258271.0000000004CF0000.00000002.00000001.sdmp, WerFault.exe, 0000000B.00000002.288669500.00000000048C0000.00000002.00000001.sdmp, WerFault.exe, 00000014.00000002.313093220.0000000004E30000.00000002.00000001.sdmp, WerFault.exe, 00000017.00000002.331531002.0000000004990000.00000002.00000001.sdmp, WerFault.exe, 0000001A.00000002.357649090.0000000004750000.00000002.00000001.sdmp, WerFault.exe, 0000001D.00000002.383795740.0000000005380000.00000002.00000001.sdmp, WerFault.exe, 00000020.00000002.406817047.0000000004E40000.00000002.00000001.sdmp, WerFault.exe, 00000023.00000002.432959118.0000000005130000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004083F2 LdrInitializeThunk,std::exception::exception,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0045C2E6 IsDebuggerPresent,OutputDebugStringW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00446991 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0040A3FB GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004402A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004463B5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00440406 SetUnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004405C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506365519.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506365519.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506365519.0000000001280000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506365519.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
    Source: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000002.506365519.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004400C8 cpuid
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,LdrInitializeThunk,LdrInitializeThunk,CreateThread,CreateThread,CreateThread,CreateThread,LdrInitializeThunk,LdrInitializeThunk,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,LdrInitializeThunk,LdrInitializeThunk,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: LdrInitializeThunk,EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: LdrInitializeThunk,EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: LdrInitializeThunk,GetLocaleInfoW,LdrInitializeThunk,GetLocaleInfoW,GetACP,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: LdrInitializeThunk,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_00440470 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042693B CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,LdrInitializeThunk,LdrInitializeThunk,CreateThread,CreateThread,CreateThread,CreateThread,LdrInitializeThunk,LdrInitializeThunk,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,LdrInitializeThunk,LdrInitializeThunk,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_004364C1 GetTimeZoneInformation,LdrInitializeThunk,std::ios_base::_Ios_base_dtor,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe PID: 5080, type: MEMORY
    Tries to harvest and steal browser information (history, passwords, etc)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
    Tries to steal Mail credentials (via file access)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook

    Remote Access Functionality:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe PID: 5080, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsNative API1Application Shimming1Process Injection2Masquerading1OS Credential Dumping1System Time Discovery2Remote ServicesScreen Capture1Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsApplication Shimming1Virtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery31Remote Desktop ProtocolEmail Collection1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSProcess Discovery2Distributed Component Object ModelData from Local System1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information3LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing23Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery26Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe39%VirustotalBrowse
    SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe46%ReversingLabsWin32.Trojan.StellarStealer
    SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\LocalLow\sqlite3.dll0%VirustotalBrowse
    C:\Users\user\AppData\LocalLow\sqlite3.dll0%MetadefenderBrowse
    C:\Users\user\AppData\LocalLow\sqlite3.dll0%ReversingLabs

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    35.2.WerFault.exe.5570000.8.unpack100%AviraTR/Patched.Ren.GenDownload File
    6.2.WerFault.exe.51c0000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
    20.2.WerFault.exe.4da0000.9.unpack100%AviraTR/Patched.Ren.GenDownload File
    26.2.WerFault.exe.4b50000.14.unpack100%AviraTR/Patched.Ren.GenDownload File
    0.2.SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe.400000.0.unpack100%AviraHEUR/AGEN.1137972Download File
    29.2.WerFault.exe.5280000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
    23.2.WerFault.exe.4c10000.9.unpack100%AviraTR/Patched.Ren.GenDownload File
    3.2.WerFault.exe.5830000.9.unpack100%AviraTR/Patched.Ren.GenDownload File
    11.2.WerFault.exe.4b40000.4.unpack100%AviraTR/Patched.Ren.GenDownload File
    9.2.WerFault.exe.4b70000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
    32.2.WerFault.exe.4d00000.6.unpack100%AviraTR/Patched.Ren.GenDownload File

    Domains

    SourceDetectionScannerLabelLink
    tttttt.me0%VirustotalBrowse
    yearofthepig.top7%VirustotalBrowse

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    tttttt.me
    95.216.186.40
    truefalseunknown
    yearofthepig.top
    172.67.199.58
    truetrueunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://ac.ecosia.org/autocomplete?q=SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
      high
      https://duckduckgo.com/chrome_newtabSecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
        high
        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
          high
          https://duckduckgo.com/ac/?q=SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
            high
            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchSecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
              high
              https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.491078139.000000004C231000.00000004.00000001.sdmpfalse
                high
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
                  high
                  http://www.sqlite.org/copyright.html.sqlite3.dll.0.drfalse
                    high
                    https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe, 00000000.00000003.409373339.000000004C24A000.00000004.00000001.sdmp, RYwTiizs2t.0.drfalse
                      high

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      95.216.186.40
                      unknownGermany
                      24940HETZNER-ASDEfalse
                      104.21.50.15
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      172.67.199.58
                      unknownUnited States
                      13335CLOUDFLARENETUStrue

                      General Information

                      Joe Sandbox Version:31.0.0 Emerald
                      Analysis ID:356541
                      Start date:23.02.2021
                      Start time:09:49:09
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 10m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.24224 (renamed file extension from 24224 to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:40
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal92.troj.spyw.evad.winEXE@11/46@3/3
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, WerFault.exe, wermgr.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 93.184.220.29, 52.147.198.201, 40.88.32.150, 13.64.90.137, 104.42.151.234, 184.30.24.56, 104.43.193.48, 67.26.83.254, 8.248.117.254, 8.248.143.254, 8.253.95.120, 8.248.119.254, 13.88.21.125, 52.255.188.83, 168.61.161.212
                      • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcoleus15.cloudapp.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenFile calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      09:50:49API Interceptor2x Sleep call for process: SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      95.216.186.40mDxyEfHSMs.exeGet hashmaliciousBrowse
                        xytEWWD2QN.exeGet hashmaliciousBrowse
                          itqFYYnm5j.exeGet hashmaliciousBrowse
                            104.21.50.15SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                              SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                tttttt.memDxyEfHSMs.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                xytEWWD2QN.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                itqFYYnm5j.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                yearofthepig.topSecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                                • 104.21.50.15
                                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                                • 104.21.50.15

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                CLOUDFLARENETUSSecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                                • 104.21.50.15
                                v2.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                Purchase_order_397484658464974945648447564845.exeGet hashmaliciousBrowse
                                • 104.21.71.230
                                0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Payment_pdf.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                8WjU4jrBIr.exeGet hashmaliciousBrowse
                                • 104.23.98.190
                                RG6ws8jWUJ.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                8TD8GfTtaW.exeGet hashmaliciousBrowse
                                • 104.23.99.190
                                lpdKSOB78u.exeGet hashmaliciousBrowse
                                • 104.21.76.239
                                VIws8bzjD5.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                PURCHASE ITEMS.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Shipping Document PL&BL Draft.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Halkbank_Ekstre_20210223_082357_541079.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                FOB offer_1164087223_I0133P2100363812.PDF.exeGet hashmaliciousBrowse
                                • 104.21.19.200
                                PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                22 FEB -PROCESSING.xlsxGet hashmaliciousBrowse
                                • 172.67.160.246
                                Yao Han Industries 61007-51333893QR001U,pdf.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                PAYMENTADVICENOTE103_SWIFTCOPY0909208.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                CLOUDFLARENETUSSecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                                • 104.21.50.15
                                v2.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                Purchase_order_397484658464974945648447564845.exeGet hashmaliciousBrowse
                                • 104.21.71.230
                                0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Payment_pdf.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                8WjU4jrBIr.exeGet hashmaliciousBrowse
                                • 104.23.98.190
                                RG6ws8jWUJ.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                8TD8GfTtaW.exeGet hashmaliciousBrowse
                                • 104.23.99.190
                                lpdKSOB78u.exeGet hashmaliciousBrowse
                                • 104.21.76.239
                                VIws8bzjD5.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                PURCHASE ITEMS.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Shipping Document PL&BL Draft.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                Halkbank_Ekstre_20210223_082357_541079.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                quotation_PR # 00459182..exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                FOB offer_1164087223_I0133P2100363812.PDF.exeGet hashmaliciousBrowse
                                • 104.21.19.200
                                PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                22 FEB -PROCESSING.xlsxGet hashmaliciousBrowse
                                • 172.67.160.246
                                Yao Han Industries 61007-51333893QR001U,pdf.exeGet hashmaliciousBrowse
                                • 172.67.188.154
                                PAYMENTADVICENOTE103_SWIFTCOPY0909208.exeGet hashmaliciousBrowse
                                • 172.67.172.17
                                HETZNER-ASDESecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                                • 195.201.225.248
                                8WjU4jrBIr.exeGet hashmaliciousBrowse
                                • 94.130.165.85
                                Quotation-Project at Hor Al Anz CAIRO_012245666.pdf.exeGet hashmaliciousBrowse
                                • 188.40.67.173
                                8TD8GfTtaW.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                Order_20180218001.exeGet hashmaliciousBrowse
                                • 135.181.57.206
                                unmapped_executable_of_polyglot_duke.dllGet hashmaliciousBrowse
                                • 5.9.110.84
                                DHL eInvoice_Pdf.exeGet hashmaliciousBrowse
                                • 195.201.179.80
                                Subconract 504.xlsmGet hashmaliciousBrowse
                                • 95.216.245.130
                                ydQ0ICWj5v.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                r4yGYPyWb7.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                aif9fEvN5g.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                ProtonVPN.exeGet hashmaliciousBrowse
                                • 168.119.190.38
                                bZ9avvcHvE.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                CmJ6qDTzvM.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                RFQ for Marjan Development Program.exeGet hashmaliciousBrowse
                                • 188.40.168.204
                                RRLrVfeAXb.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                m3eJIFyc68.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                                • 195.201.225.248
                                m8kdtboA0T.exeGet hashmaliciousBrowse
                                • 88.99.66.31
                                jdAbDsECEE.exeGet hashmaliciousBrowse
                                • 88.99.66.31

                                JA3 Fingerprints

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                proposal.xlsmGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                rieuro.dllGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                ydQ0ICWj5v.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                r4yGYPyWb7.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                aif9fEvN5g.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                bZ9avvcHvE.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                proposal.xlsmGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                CmJ6qDTzvM.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                124992436.docxGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                RRLrVfeAXb.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                m3eJIFyc68.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                AswpCUetE0.docGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                EIY2otZ3r8.docGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                m8kdtboA0T.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                jdAbDsECEE.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                m8kdtboA0T.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                IVCkMokXk8.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58
                                i9WK2pIYWG.exeGet hashmaliciousBrowse
                                • 95.216.186.40
                                • 104.21.50.15
                                • 172.67.199.58

                                Dropped Files

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                C:\Users\user\AppData\LocalLow\sqlite3.dllSecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                                  mDxyEfHSMs.exeGet hashmaliciousBrowse
                                    A6Qom7We0l.exeGet hashmaliciousBrowse
                                      BHuuI8LETf.exeGet hashmaliciousBrowse
                                        m1hholPLan.exeGet hashmaliciousBrowse
                                          nyDyMJGKWD.exeGet hashmaliciousBrowse
                                            HA2a7FagC6.exeGet hashmaliciousBrowse
                                              xytEWWD2QN.exeGet hashmaliciousBrowse
                                                itqFYYnm5j.exeGet hashmaliciousBrowse
                                                  HDMInstaller.exeGet hashmaliciousBrowse
                                                    zrmbk.exeGet hashmaliciousBrowse
                                                      e7zQwqIDCO.exeGet hashmaliciousBrowse
                                                        RddH6rLRfH.exeGet hashmaliciousBrowse
                                                          4PDNbYK5fj.exeGet hashmaliciousBrowse
                                                            pmTdQ57tvM.exeGet hashmaliciousBrowse
                                                              7BtV39hziI.exeGet hashmaliciousBrowse
                                                                dc4AaqW6Aa.exeGet hashmaliciousBrowse
                                                                  lAy87VNPiL.exeGet hashmaliciousBrowse
                                                                    4GRuinub4a.exeGet hashmaliciousBrowse
                                                                      v8c1m9dW8G.exeGet hashmaliciousBrowse

                                                                        Created / dropped Files

                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_04e738ec\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):13282
                                                                        Entropy (8bit):3.7664608925907617
                                                                        Encrypted:false
                                                                        SSDEEP:192:4nZQ6bHJsAnbcAfjuSKUjx/u7saS274ItwU:4nZQ67JsAnbcAfj1/u7saX4ItwU
                                                                        MD5:597DCBFC93F6BE50B607CB16E7E07C9B
                                                                        SHA1:389BF1D5020AC76E04A95D2D93F11A38249EA5DF
                                                                        SHA-256:1862AAA1E3A4FC479C75E42AA6F87A3B0EA2644D0AD8775FFD146374A13EFD2F
                                                                        SHA-512:F78C010E37B527622382765178BC4B8708699E493939EC73CFEC0803EE9B2E3D421FD56BBA2C86D29C1925FE811ECAFDF8FD2268525F55AADC941B1C58E3AED2
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.7.6.8.0.8.4.0.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.3.e.3.8.a.8.-.1.a.c.4.-.4.5.8.9.-.8.d.0.7.-.0.f.9.4.6.2.e.2.1.7.1.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.6.2.f.1.e.9.1.-.d.b.4.f.-.4.c.e.4.-.a.8.e.a.-.2.4.a.c.0.6.a.2.b.f.f.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_0546b276\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):13024
                                                                        Entropy (8bit):3.765566523374726
                                                                        Encrypted:false
                                                                        SSDEEP:96:HY/tK/+gQQhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6T:ZZQQbH56rwjuSKUjb/u7sfS274ItwU
                                                                        MD5:538F8A5DA24B91AFE95E81E736B4E15D
                                                                        SHA1:7BB4C03FBC5AE7E7F3FEFDB22692CD5A4CFB2ED4
                                                                        SHA-256:4A6FEA51EB10BDF810374308DF044FF02DF32E8B949B15F9BEFEA906EAA17118
                                                                        SHA-512:AFBAEEE5B30711395ED937044C00CD2B021909318CEE6551FFBB4B4BB2796B5955D5978DFB8AA5DF3C2A603EC01C91EC80BF4FBF5DB3B0A7AE35EA2FE46D9945
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.4.3.3.7.0.9.4.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.6.6.2.2.5.a.-.b.0.f.7.-.4.2.b.4.-.a.7.e.8.-.d.e.5.9.9.e.e.5.d.1.8.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.2.c.a.1.f.d.-.9.a.2.a.-.4.8.a.a.-.b.9.0.d.-.e.b.e.e.a.1.8.1.1.0.a.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_10a2490e\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):12036
                                                                        Entropy (8bit):3.7673330616714815
                                                                        Encrypted:false
                                                                        SSDEEP:96:2Gf3/+gQShzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6qH:33ZQSbH56rwjuSKUZ/u7sES274ItwO
                                                                        MD5:9421D0EC1CB3D8FD8FE8A3A785D9B8F0
                                                                        SHA1:60E9FA3FE37D8402D4AB0E7FB5180E388DF7625F
                                                                        SHA-256:4E8D8517097AE3A185D7402DFEE923977CAB25CEA3B02F5704977D9ECF0A4E92
                                                                        SHA-512:DD829E6DAA80EB7117A3A7306DDB77993634916BC9506D6796A400931AF7B36EF8F3F871529D437D6E52AC171FF29B42FBB5D3F7140608F7097ABBBD49B3433D
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.1.7.9.3.3.4.5.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.7.2.1.3.d.3.b.-.4.a.9.7.-.4.0.2.e.-.8.0.7.8.-.6.a.9.e.a.e.a.8.4.3.f.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.e.5.4.2.2.f.e.-.c.a.d.2.-.4.d.3.e.-.9.1.8.6.-.4.4.f.7.6.c.8.3.e.d.f.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_132e8fac\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):12340
                                                                        Entropy (8bit):3.7696596953134307
                                                                        Encrypted:false
                                                                        SSDEEP:96:OvnaAZo/+gQHhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmC:7AZoZQHbH56rwjuSKUY/u7sfS274ItwL
                                                                        MD5:E3CEBD6D897487541036E9767D23A52A
                                                                        SHA1:A73DE99B608C96D9EE6CCADBF947F40E3E39C8BD
                                                                        SHA-256:B48B2A84F002D8D53302D57753BE2FA2F12BAE2DF12A8752079A075D4B69C939
                                                                        SHA-512:0AF8F8D4B6059F35194F0B4F7E9FA2C5025BAD5F5B66E7CE3FDDB85FA05372D05D26FCED6CB7D181E2A2BC96A68699B4DC1C61FDC348DE66CEC3462FB76EFDA6
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.3.2.7.1.4.6.9.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.0.8.8.f.4.0.1.-.5.e.d.8.-.4.d.7.5.-.b.7.c.5.-.5.b.9.8.d.e.4.a.e.a.6.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.9.0.8.c.2.9.-.0.d.c.b.-.4.3.a.1.-.9.6.c.3.-.a.4.4.c.8.6.f.c.0.0.4.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_14676a5c\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):13380
                                                                        Entropy (8bit):3.767562151505343
                                                                        Encrypted:false
                                                                        SSDEEP:96:0zt/+gQnhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6qX+:ItZQnbH56rwjuSKUjf/u7saS274ItwX
                                                                        MD5:09C3BD8DB03250EE54092F7E455938ED
                                                                        SHA1:452C2D785EA9373BF69D61D78402802574EEC69B
                                                                        SHA-256:28D5DD793A4925CF7BB0F15835A0C316F200D053EB0A8E9BC117FD920F5548AE
                                                                        SHA-512:24DEA15B016ED961799228D102350AAD1335D12D662D9CA0948D29EFF1B176596735E69999D1E5F3F1AA0367311ABEE20534D92845F1706644960CC1C0B6487D
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.8.7.7.1.4.6.4.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.1.0.5.9.e.e.6.-.4.0.a.d.-.4.5.8.3.-.b.6.7.6.-.e.2.a.7.d.b.7.0.b.0.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.5.3.8.3.f.8.-.1.c.0.2.-.4.e.7.7.-.a.3.f.7.-.7.c.5.2.b.7.6.2.0.9.6.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_152ee212\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):13158
                                                                        Entropy (8bit):3.7690823135002263
                                                                        Encrypted:false
                                                                        SSDEEP:192:5BSYZQMbH56rwjuSKUjS/u7sfS274Itwu:5EYZQM756rwj2/u7sfX4Itwu
                                                                        MD5:617CD2F62E85C2D7FE0533F0CFACAD2B
                                                                        SHA1:7C2E81084AE50EB62FB0425B21F0D13F9767AF37
                                                                        SHA-256:7A48D4F48771D64F25A8880815761FF39EC52F1B3378C1D346CF885B5A2E9724
                                                                        SHA-512:699DEEF3D8B3D4AB2BD7653B250239225C8A195CF21047DE8F285274351C3FD0E74BEEBC9E8129431B24B769EE344967F35685E57F324F2E3CDE96E220A8DE5D
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.5.4.8.5.5.2.9.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.e.e.c.2.d.0.-.a.6.a.9.-.4.8.2.3.-.9.7.8.2.-.4.6.3.5.2.c.7.7.f.b.c.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.4.a.9.f.9.3.-.0.4.c.2.-.4.1.3.9.-.8.a.f.f.-.9.3.4.9.3.1.3.f.b.c.8.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_169664b4\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):12134
                                                                        Entropy (8bit):3.7697535598895118
                                                                        Encrypted:false
                                                                        SSDEEP:96:jvKh/+gQuhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6qX:uhZQubH56rwjuSKUU/u7sfS274Itwq
                                                                        MD5:E167539260588E12AD95875AA8705407
                                                                        SHA1:5225083DE2A74EF5047655989505ED43D3129F73
                                                                        SHA-256:D507B3C7AB59168EC93910761B7439CAAE0B099ADCEA462EF5704FB139EFE7A5
                                                                        SHA-512:039541C396F379DE9F5FCE2AD51212D79AF351CC0CA24AFB6AC561F63537017BBBF1C8F8F09669ABB81B24128535AFF2EA8003E669530F6AD36C90B0FD77BEC0
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.2.4.1.6.7.8.2.4.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.f.7.4.b.a.6.e.-.0.7.6.c.-.4.d.b.f.-.b.1.0.0.-.5.c.8.e.b.f.c.c.4.a.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.9.f.d.1.f.6.-.8.b.8.b.-.4.0.9.e.-.8.0.d.c.-.e.4.6.6.3.f.d.8.6.d.8.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_17020d1e\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):12038
                                                                        Entropy (8bit):3.7679019511605545
                                                                        Encrypted:false
                                                                        SSDEEP:96:XTk/+gQUhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6qX3:jkZQUbH56rwjuSKUZ/u7sES274ItwO
                                                                        MD5:A1B72E44326BA108B89C133B13D9A513
                                                                        SHA1:56C71A688E36A27F8CD9C933403D867B7B42A7A9
                                                                        SHA-256:4632367363E65BCEE8D2FDC699017940856FF7BC041C71486B3722D72D2FB8E5
                                                                        SHA-512:ACB72625E38656064D5B6F46088313ED1A73608F52569826EE18B47269D7234896139620A8EDA754C3DEDFFFC61461DB91771D7A98D298CDA402D983605FEA4C
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.0.2.4.0.2.2.2.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.2.6.a.f.0.2.-.3.8.4.5.-.4.5.3.3.-.b.c.c.3.-.d.4.b.4.6.1.0.9.2.f.4.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.d.a.d.7.4.5.-.b.3.2.3.-.4.3.b.5.-.b.0.4.e.-.d.8.d.4.b.2.2.0.1.d.a.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_176f0ba2\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):13156
                                                                        Entropy (8bit):3.768937218120977
                                                                        Encrypted:false
                                                                        SSDEEP:96:zfjoz/+gQIhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6X:HMZQIbH56rwjuSKUjS/u7sfS274Itwr
                                                                        MD5:682A08DD25F9AC692347DC72729CDA04
                                                                        SHA1:70E9E3B42EC2AC5F620135F3CE065105A990967B
                                                                        SHA-256:0FEC8DDF235B0DB903699316B8659B363A4401135A12B5EB5FAA576B1A123463
                                                                        SHA-512:EDB1D23514CFC04B0CC90957DB643557B900F17BBEECB2FD40FD654038A98152E53D5FB4AA7532CDD6C67DE44A4D97DAA5F865168B4B78A4A21198022A774041
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.6.4.7.6.1.5.3.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.0.f.1.5.2.1.d.-.7.f.d.2.-.4.8.6.4.-.9.8.a.e.-.9.5.5.f.2.0.b.4.c.5.1.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.a.9.6.c.3.f.7.-.d.a.2.8.-.4.7.5.2.-.b.b.7.1.-.a.a.9.7.6.1.6.c.7.2.5.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9fe727ffec23a1e62b3316da7384a08015d607f_bd6d4f40_17e228f3\Report.wer
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):12036
                                                                        Entropy (8bit):3.7667745125980505
                                                                        Encrypted:false
                                                                        SSDEEP:96:8kW/+gQGhzwdGDVfdpXIQcQnc6rCcEhcw3rb+HbHg/8BRTf3Oy1oVazWbSmf6qX/:nWZQGbH56rwjuSKUZ/u7sES274ItwW
                                                                        MD5:51D30B9990069F95C9B1BAEA285EA7B8
                                                                        SHA1:6B524010D2E679495968DB18DDD26D436B4B665A
                                                                        SHA-256:8EF2F96BF19A95F27EF8EDB6C6DF171BAB94166094D122FB2B9C1A29E785E9ED
                                                                        SHA-512:63526AF2039542A8A2405D56C1D855DE1A089DC7F280051936C4CFFA8705840EC87DD6EA8DE5858E9FC47AB648CFCA3EF305BACD6DBDB2F243F1AFCD2BC8380B
                                                                        Malicious:false
                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.6.2.0.9.7.7.7.2.1.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.c.f.d.7.f.7.-.e.0.c.9.-.4.b.0.0.-.a.3.e.b.-.1.1.8.7.d.d.a.e.1.3.a.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.4.5.d.a.d.4.-.a.e.2.7.-.4.f.7.d.-.8.2.8.6.-.f.d.5.1.e.2.c.3.9.0.e.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...1.9.1.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.d.8.-.0.0.0.1.-.0.0.1.6.-.1.0.9.9.-.a.0.4.d.0.c.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.f.4.4.1.b.2.a.e.c.3.9.6.5.a.6.c.b.d.1.b.3.6.9.a.6.1.3.c.c.a.5.0.0.0.0.0.9.0.4.!.0.0.0.0.e.1.6.b.e.2.0.4.4.b.7.3.b.f.b.7.1.7.d.9.2.d.1.3.9.6.8.e.a.c.4.7.3.d.6.4.b.8.f.c.!.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D.Z...7.3.1.2.4...
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F00.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:10 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):75044
                                                                        Entropy (8bit):2.3443832124736192
                                                                        Encrypted:false
                                                                        SSDEEP:384:CtRHAFhxOjGg7BZepFOnvdSGkzsvSkhLhdMh6xDyOBzS5edj:HxdFOn9vPhEh6xDlUet
                                                                        MD5:27161BB34C114927E1B92C22458CD414
                                                                        SHA1:866F8C10712BBF26B67FB3387E5B860D1C014B5D
                                                                        SHA-256:7657EA3E19B569314A57196496253DF1D8B9D755D6B262BCD72D98E9A93EBA8F
                                                                        SHA-512:7DAB90D3C61CFA7B3B46F4ED916968AB67725A6A6958B401158EFEB64030F308EB86D51135F208B1BF72AB52084693463A5C75472945E07C5BC3406944159939
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......R@5`...................U...........B..............GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER231.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:03 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):61550
                                                                        Entropy (8bit):2.531799361806424
                                                                        Encrypted:false
                                                                        SSDEEP:384:LjFRgphv8OOnvdSGkCsvSkhLuMsrbmTl+mnbn:LkvTOnivPhdsrbKz
                                                                        MD5:9715393B4AD261A974CE8E70FFD25874
                                                                        SHA1:C81857D2060B386064A3DC37C5A7D670A8381669
                                                                        SHA-256:0772B8DD03DB02AE260A93DD4A22ED357717749252027A409EDCE0EBD48005BA
                                                                        SHA-512:E49E45765E5687294491F81FA99B85B5CBDE67891E12F18BBAC4200ED86CE1EBEA26DC166572B369E591F4D9251F69765C940774C019C1BBBA74FDE7C3BBD1BF
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......K@5`...................U...........B..............GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER2376.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8440
                                                                        Entropy (8bit):3.69992564986495
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiid6cF6YI3SUdLgmflnSbCpBe89bLGfsfAI5m:RrlsNig6e6Y4SUdLgmflnSWLGEf6
                                                                        MD5:64DF1AE4ED771CE215E1A01D724AE540
                                                                        SHA1:5A49585BF1C87010694C08E62A25142B92E21696
                                                                        SHA-256:88A14162B9FE0DDFE7E3D73C1AC5574896AE92C30EC632E88FD56476581102CA
                                                                        SHA-512:5C338FE0F0C90C517AD7A1E848CD9F8FD09DD9E33536105F6DC403E9CCEBD19FF6EB686C0A9070FE148C0D806AE689624E23BDF525179172B1107C546F62EB17
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER24D7.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:51:19 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):154660
                                                                        Entropy (8bit):1.9490437019891882
                                                                        Encrypted:false
                                                                        SSDEEP:384:rRCrOJsaoNh+hsiElKrs815Bdt54kZyvCnWdSGZn8Hbhr+gy0MlX+jYrWKf4fI1S:XC+Znt5vZmCnlHbhOlOjYlf4fo9WqG
                                                                        MD5:419EB4A71B076EDC85D234F15BB34CC5
                                                                        SHA1:E6D114CCB443B17F8E339EEF32F0DE00091C23DE
                                                                        SHA-256:225B8B63A4A5CA0C013CBBB14156395ECFB9DAA0C73D8D6EDCA0C6B7662E9F30
                                                                        SHA-512:752FC633FFB1B532A8C728A5D63CAA0C4F7B14456382F1CCC9ADA2B3D2E02448FE118BB4245B462BD4BA58232DA15C87EEB4784B7908E575A8F8ACB6ACF12F26
                                                                        Malicious:false
                                                                        Preview: MDMP....... ........@5`...................U...........B......0%......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER257A.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.542043606302158
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/7JgtWI9uwWSC8B98fm8M4JTbFf+q8Z9TUKUUvFd:uITf99JSN4JV7KUUvFd
                                                                        MD5:78EAB0A29A3A37D1108E02286A940BEF
                                                                        SHA1:A0361F3D324B170A12050412DD8C932886879E37
                                                                        SHA-256:FD51DDC90CF04A6EA417918368BB2DF7070483B3B411876A23B19ACE6EF956F7
                                                                        SHA-512:AEE15B8BFBE3F60110C983958B86D8F65CDB7ECDF84C04BE889554C44F14DDAFD908964374993B993708EEA06769D9C4C9092711DC885C28DC6AE8657CEA2C90
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874260" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER30EE.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8474
                                                                        Entropy (8bit):3.7019233901274506
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiip6Y6YIHmSUb+gmflnSFAjANCpB689bgGfsfmHgm:RrlsNik6Y6YJSUb+gmflnSFAjAEgGEfo
                                                                        MD5:649AA8088DB62673929949731DC74EAB
                                                                        SHA1:3DD1A4C26E1069D121E0B69A08DB9181B3DB2B59
                                                                        SHA-256:EED886C0669439CBD7A91D1D98CE8FCE5C4D49E06C077E2BEC158ACD46423E78
                                                                        SHA-512:85AF44A09D419B9BB59669590A617C745CBECF4801D25B8EC0B6D08816DE4C85985EA5F4F5F43D920336FDD4C727C67F110DAA215CF6950AC8F1F841F4D3C9B7
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER34D7.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.541208453320023
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8B18fm8M4JTbFH+q8Z9TUKUUvFd:uITf69JSNUJx7KUUvFd
                                                                        MD5:0E031784BED5100403EDCCC0AAFF0577
                                                                        SHA1:3F5DA57DBCEA5A1C66B47FC2AC40BB3549BDC70B
                                                                        SHA-256:2105813D428049E0340270FD7DDAD0BFA00B6A8B1AE55B6180FA15FE4DDB61B5
                                                                        SHA-512:2564C14A2B11CDF83C37F4E0CDC1DCE54F1FA53754E3153AC4411293483494176ED7D213CB8B1D2EC217BFBD16CF32847BFDAD74ADB72683AB84ECFF370A29C4
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EDC.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:19 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):93412
                                                                        Entropy (8bit):2.383899619992723
                                                                        Encrypted:false
                                                                        SSDEEP:384:Q0RlZ8bdXy9EhDcWQfz9AwI8Z/P/7OnvdSGkzsvSkhL3JMbxLEzbqnMlfiPqZvOK:sxDyxAJcH7On9vPhKbxLEPS36z
                                                                        MD5:A6966904A641364CA65F27EE6429D4A4
                                                                        SHA1:45737B37306E278BFF8226D1515E3690CD487CCB
                                                                        SHA-256:34EF6ABCA97C3305B7C4D80EC9BABA8F28B0F381188029A0FBDC204115EB6628
                                                                        SHA-512:B42422F84AF351A717A617652183E2DBC348BB0A90A10A09E94B7E0ACB0A886A84288F07C8AA86CA925E2F3C2B1555168BC2F5BD77770EDE95E6BD3549B28795
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......[@5`...................U...........B......(.......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER442D.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8444
                                                                        Entropy (8bit):3.701310540146226
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiis6I40Q/O6YIpSUd/gmflnSbCpBU89bDGfsfmhm:RrlsNiR6I4q6YmSUd/gmflnSwDGEfx
                                                                        MD5:436AB7C0DDC59DB6EE221DC1CAA48F00
                                                                        SHA1:6B217CD578C5CD9736177846C9DBC52846531FE0
                                                                        SHA-256:AE85F1A982674052E09F7520E795E20F04A6BB57D98218EEADA2842247345711
                                                                        SHA-512:679AD3DCF4681036752ABB26F35B75FBA616841FE49D5358279171BE9928B4488310807BD35EF9F2DCAA06A84A8CE1B5245ABC4C317B82A20F8B4392E54CEB1F
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER45F3.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.54318183807292
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/7JgtWI9uwWSC8BCb8fm8M4JTbFlUB+q8Z9TUKUUvFd:uITf99JSN/J3a7KUUvFd
                                                                        MD5:C8E437ED4F0262796CB2A2F2F3771B70
                                                                        SHA1:8C00282D5E498978A1A2AA8957DE643ABCDB2DE7
                                                                        SHA-256:A61700E3541EACD444415C411C90206308466FBA38DC0F5D916D15AB084124A4
                                                                        SHA-512:E65EF6C868DE04FA0CDFBD61F037864547A71A2DC58CC49CD6DB34AB75BEDD4049768070EC1A17DF4EF8C7E05825F382D7D6C322EC78838E3183F24F1656989D
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874260" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER4CE.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.543637929174041
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8Bp8fm8M4JTbFrZ+q8Z9TUKUUvFd:uITf69JSNoJL7KUUvFd
                                                                        MD5:44935C9B728A8828F926C7E8F2B8F338
                                                                        SHA1:773626463673E71918A86BE3FF1906B131D1B91B
                                                                        SHA-256:C842675C9D9427048A957F90C54CE46FE2154ECD16128F636F4C754E044275DB
                                                                        SHA-512:BE42B07D5AF3D639F9BA33C07507480CB57FAC3157751A4F95D5D1EF9B22F91E7A1A01B35536AD48E9B422AB657300F80ABA399FD39AC0E015521B7B2B8E3665
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F72.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:51:32 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):143678
                                                                        Entropy (8bit):1.9645818854466153
                                                                        Encrypted:false
                                                                        SSDEEP:384:bROIJrqyVk5h8hCiLKKweDdYnWdSGZn8HX2vKeoMC5APVOJ2GV3kqQ3+PG9g4X:Ho8enlHXmCGPVC26hQ3if4X
                                                                        MD5:62125AC02115E55502246B77A60A0F89
                                                                        SHA1:C975DB7E93531156833F886EA3B091F08FF79C40
                                                                        SHA-256:B1BA58650FFD1A02FA28CEC6F49BF02B0817AC5F3C7773988CE074CB1BC86903
                                                                        SHA-512:8F66409364197F5C844D6C9463F77937AD1F4ACDD7FD229118D8E10478C8012E7F3BFE74D50235719369975C7632A464F9472EACCB324954E356210670C61BE5
                                                                        Malicious:false
                                                                        Preview: MDMP....... ........@5`...................U...........B......l%......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER5737.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:25 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):87230
                                                                        Entropy (8bit):2.397100324495299
                                                                        Encrypted:false
                                                                        SSDEEP:384:I4RNehVhRo0oyls4F2sOnvdSGkzsvSkhL8sTVMfKqf2Bxj5/Caro5D:6Ro/iOn9vPhgsWfKqfACAWD
                                                                        MD5:50AE0C4A608C11E166F470520149C3D1
                                                                        SHA1:B73834F1088352BF4616923C38C90BE62A2FD166
                                                                        SHA-256:EB3E98439AF1F3F46346BACD56D1107B075037BE8E548EE68A3A03CAE051DAB3
                                                                        SHA-512:7EC597D9673F815C301A28ACE39D687BAB9C65A1DDBC284E8FFD2E2B41F2E70AB0188EB5F7D49703A7B437FB068EC4BBAE37847397202261CC3F832D11A15582
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......a@5`...................U...........B..............GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E0E.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8444
                                                                        Entropy (8bit):3.7023460804722585
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiil6Ije/p6YIamSUu2gmflnSbCpBr89bnGfsf+Nm:RrlsNiY6IjG6Y0SUu2gmflnS9nGEf1
                                                                        MD5:82B2DB1FA700DAF321234CE9193EB55E
                                                                        SHA1:C0DAB4464D2C87D4F2E4FFE9CF7D3CB47FC153D2
                                                                        SHA-256:FCE19899AD3A3B7AEE0BA2C86DA41E03F2E02F76A187DBD6F72CCC16BF3B3143
                                                                        SHA-512:5C1514B5B70228223617249ADA3288F2D1ECD678EB48DF9D1B1A81C7AC5DC00FE7AE78E9573252BC0451007FD19941B5A130526B29EDA3CEFFEA39DEB6F64389
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER60FD.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.54338234737354
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8BN8fm8M4JTbFEU+q8Z9TUKUUvFd:uITf69JSNEJaU7KUUvFd
                                                                        MD5:841DAF875D44F7A68B17682CE450E45C
                                                                        SHA1:A5A27F239E1C16E9D2527C9B616D63511B4DE268
                                                                        SHA-256:C2BAF3C8519CCAACBC4CDA9C80FE47655CC9612D72B770F275961664C4E7366E
                                                                        SHA-512:9B542CFE70524CEE7FC5E361939107DF13E2FBF53D9E8F219EB59F9C46D7A629321C4EB9F31142163B4E1A194CBEEFA9ADB3AEC075BBA7CED08D1033C89A598F
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER62BC.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8474
                                                                        Entropy (8bit):3.7025173336914494
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiY6t6YIaSU/VgmflnSbCpBj89bDGfsfqBm:RrlsNil6t6YVSU/VgmflnSlDGEf1
                                                                        MD5:2F67F3949F04BE621AF88007471F3891
                                                                        SHA1:C823C4845C13319B5E1DF90D75AD06DE3FA9157C
                                                                        SHA-256:40AF33D595445CAC8265A053371839C4C25A124F040B2C3AF636634E77CA04CD
                                                                        SHA-512:C42CB5F2C04D1302D01FFA7D84A39B5E281A58331E5B849FE29706A4BC93EE9ABEC7B8193E2AF155E55A15E2A94E4482DE0BFBA755D47C9ADA749A2308779141
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER66A5.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.544417239248232
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/9JgtWI9uwWSC8BtJ8fm8M4JTbFy5+q8Z9TUKUUvFd:uITf/9JSNfuJw57KUUvFd
                                                                        MD5:11D21AF40F800F7E1B41807CD8C8AF43
                                                                        SHA1:C01FC2BB9B87FA57E5A50BE4AA153A73173B47FB
                                                                        SHA-256:49B5D7B7CF05ECC3D331085502851B5F6F294496A95B95DADC157599944D9449
                                                                        SHA-512:6B3E8D8A38DA39F3E4830281DD6AC999E878EEBD2CE0D3AD06C4793DC20AA4ED0B9358FF0CC8F11CDA6D8DBAB0873B402B448FAEDAFD1F16D1CCB90CAB9A7264
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER789A.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:36 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):93322
                                                                        Entropy (8bit):2.359288557140752
                                                                        Encrypted:false
                                                                        SSDEEP:384:fURbiw8GhqtsziF1dVTPDOnvdCGkzsvSkhL9xMqCJqeGgC+X3WvujcFOdAkCecXT:uqt3dhOntvPhoqCJqeGIX4T
                                                                        MD5:36A912E187CDC15AF367921784CA553A
                                                                        SHA1:BCF4F94E9E434F8AC0332F7D8DB2FEC88EB220F1
                                                                        SHA-256:DA0F17F72737ED48CFEFE57C5283A037D0414606125784FC7577FE61EC1DB87C
                                                                        SHA-512:50976FE92DBE1B6DF420804780FBBCEAD71B1E0E90C6E8EFC2BF61FE9CC1AA67B4F278155802BDB568946DBF6DBCA323FB65071456E28BC9210EF6FA3127D414
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......l@5`...................U...........B..............GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D0.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8440
                                                                        Entropy (8bit):3.7033651957431144
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiyA6jP36YIhSUd8agmflnSbCpB189b4Gfsf/vIm:RrlsNiI6r6YeSUd8agmflnSj4GEf9
                                                                        MD5:D02610F74CBB2576CE7C19EAC35BF729
                                                                        SHA1:9C2335DDC39CD9F182428F46D93F40D087190DA7
                                                                        SHA-256:9A3EDD0DFBD9D36F74A706B74C83E59544C73916B70B2F0D962D43C0D04BD5C9
                                                                        SHA-512:B3F8135804A1EDDAB3F4A586087BF64AE016BA61E3CF4F54793E975082AAA66E5A25B219B021030E07ED2DA193ED18B0444CD3FA730D8477E777C99A11E54F1D
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER87AE.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8444
                                                                        Entropy (8bit):3.7025549701476583
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiY6IDP6YIzSUjagmflnSbCpBm89b2GfsfuAHSm:RrlsNiF6IDP6YsSUjagmflnSu2GEfuAj
                                                                        MD5:E2FD312F9C9C694BFA91ADE8A8B6A69B
                                                                        SHA1:2C57BC32523C8632A6D3A5AEBBCFBB66E2D20CC6
                                                                        SHA-256:803BDF75D7CBEC7113D72AF0FD2ED7C3C064EFCD95564CE726647B0BCBF9FAE9
                                                                        SHA-512:2DE392940E34932399D5FDCEAA649EB00B2B641F14CACC64A77DAF703D7ED79F18E04A4C2FCA49585775C885331F8CD1553A88A0EB19EA8F01965CBA615A7BE9
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B2A.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.540474706877088
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8Bf8fm8M4JTbFM+q8Z9TUKUUvFd:uITf69JSNSJK7KUUvFd
                                                                        MD5:1FC60FD0B5CEF9782AB591A5C98380CB
                                                                        SHA1:D8D5B65A196D3CB9B56B5648FD7A0FD05C5494F0
                                                                        SHA-256:91BFBD5D8CD5454A0E257FAC81CEBD22970C3AC2E531F8109EA6AD2B230F9899
                                                                        SHA-512:ECE4C2CB745A614FE655B9A25E53CC8700B6FFA647C547798A4D6367CED3D88A6D06DBD6BB856B57D3148D3CE39E58696614241FED99FEC18AEBAF09043381E3
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER967.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.54213726016435
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/7JgtWI9uwWSC8BJ8fm8M4JTbFy+q8Z9TUKUUvFd:uITf99JSN4Jc7KUUvFd
                                                                        MD5:965C08690E7D0F68A64E546B6846A47D
                                                                        SHA1:1F318A87353695B9198D01FF3BEF1A2E0FCCF0F3
                                                                        SHA-256:3D58BA0F09AB3350A15DB0C0788F755E1B5BBB52D2C52FC652B408120A8CF5BC
                                                                        SHA-512:11FB145F0A90F9F620B3DF9A56519A6FB3FB9642BCAF0AFB9945294652F62B1CDC79C906BE7606EF5E35690B91B656E9559304D02AC8F6015EA033A9D86062B8
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874260" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERA23A.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:45 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):99670
                                                                        Entropy (8bit):2.2903017322271446
                                                                        Encrypted:false
                                                                        SSDEEP:384:HdRGa5DchahTc9ZRbOnfdSGky8HEkhlyMQpkqlBz2/85zneD+JcnoUV4Oa+nWiT:HHZTGOneHthvQpVl1hVt+n
                                                                        MD5:D6A6BC46C3493B1B0760174C2917071D
                                                                        SHA1:DF3E69B3DFC01C9147CA2F8AAA4B3D46EB3D28AE
                                                                        SHA-256:6C23D00F8F4DF3D9504BE4655553B4617020A5B21B0D28B8A97EDA90586FD5F8
                                                                        SHA-512:7F245213717BC8F962D537CA1EF4DEBAAD5E94BCF108C303363CD459779B31868A2A55B0D45BE3925C44194FA90942A292E0F61B792748810F42220F30ECD36F
                                                                        Malicious:false
                                                                        Preview: MDMP....... .......u@5`...................U...........B......."......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERABD0.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8448
                                                                        Entropy (8bit):3.700854059833174
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiG6IYW+86YIWSUZSKGgmflnSbCpB889bhGfsfNrm:RrlsNib6IYW+86Y5SUZmgmflnSYhGEf8
                                                                        MD5:0045D1C5BA8D37ED4921204F242C4B25
                                                                        SHA1:019869A1DBDD2DCABC7460FDF704B47F50E2F8BD
                                                                        SHA-256:9A5FFB7F6778FF0B445F8A38BE87EE5F7D6FFA65BE5FCDA2B2D8EE0D8E344849
                                                                        SHA-512:B863DF26F430C8A3CDAB9F2AF3C8245959D4892BCB7ADB2FA74A54798388468D03A6097450EB1FF411F23CFF7F81670C948B56E3ADDD5B8E986E43EF870EFBFB
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF2C.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.538625904270947
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8BF8fm8M4JTbFAF+q8Z9TUKUUvFd:uITf69JSNUJCF7KUUvFd
                                                                        MD5:4543A0727CD705C19CB7A7E66CB7137E
                                                                        SHA1:8B4CEA62914AE8284D8C9856ABE5F33F37871CD1
                                                                        SHA-256:977EFF7C891560E65AF3A26BAA442ECE4426DF78F364B69851CD1D096E66C8F1
                                                                        SHA-512:3F25B8AB24D3E752633851F688A69C6A9042D5449E8FA11780892F54D6E93E20B9982B0CD04FD53DB8F886BF949BDD4D7605D0B7F6FC14CCDF9276D2782B13A3
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8474
                                                                        Entropy (8bit):3.704184369284531
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiM6r6YIASUb+gmflnSbCpBSd89bxbGfsfc0arjm:RrlsNiR6r6YfSUb+gmflnSLaxbGEfcB6
                                                                        MD5:3D5A1690F46DC08A2C7962632787AA40
                                                                        SHA1:A1A89FD2F69F83C013A4E5B644412D752AC60EF4
                                                                        SHA-256:56D38BF0B0F582E18DEF7887FEEDDEDA051BC59943915ED6EBFDC04A641B76C3
                                                                        SHA-512:F7D5C6BD78411FE126DD69FF59AB2943F21ADF9A47C11AEFA935E891C7A156180CAB5E81A1EB76855C2EE9A49251C26B7BB013B8C6B1A82A1B67A1121C623310
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF16.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:50:57 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):148160
                                                                        Entropy (8bit):1.8806486489234047
                                                                        Encrypted:false
                                                                        SSDEEP:768:1UU4Dn4HbhAM3n4MzaQo8wo4YKAngIromK8Vf:afn4H1AMvC8wo4YKAngIromK8N
                                                                        MD5:628C1E61AA7333735A2D0EEB3C1F774E
                                                                        SHA1:D0F69E0F6E8F5ECDF668268231AB92577B27FD10
                                                                        SHA-256:D8FAD5E2CDE381A02D1CFC0AC965A27C6B1C5673640491454B50D6737697D2E3
                                                                        SHA-512:E7400D53D4207C5A2E428DAA85030EE7E54FCFD35A2B72A868EF898D1F70942B5F72C4E906507A9314226E1B48208E61B95D174812B642B6DA593D6E524C01E3
                                                                        Malicious:false
                                                                        Preview: MDMP....... ........@5`...................U...........B.......$......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAA0.tmp.WERInternalMetadata.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):8464
                                                                        Entropy (8bit):3.702779359433372
                                                                        Encrypted:false
                                                                        SSDEEP:192:Rrl7r3GLNiiC6L6YIESUcN7lgmflnSbCpB189b+GfsfiBSBKm:RrlsNiv6L6Y7SUs7lgmflnSj+GEfiEt
                                                                        MD5:FD8075D61119F4307DB3A2E2FBEE0DC4
                                                                        SHA1:BC6DFEEC18F473AB7A2160BD58B816E56D27AB7D
                                                                        SHA-256:A879A157EBF6638AAD219E0A591988B76DF69010286E32D4D677370D291E5D12
                                                                        SHA-512:601D2AD81E60691013C9E189A72A3EF95CD7E91C4CB3C7631BCDDE174FA5BEA2B2101D56F9F0DFB5E40EA6FEDD97F2D58A3DD5AAC2048B5489D38BD13B12392F
                                                                        Malicious:false
                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.8.0.<./.P.i.d.>.......
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE2C.tmp.xml
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):4750
                                                                        Entropy (8bit):4.544698893628192
                                                                        Encrypted:false
                                                                        SSDEEP:48:cvIwSD8zs/UJgtWI9uwWSC8Bz8fm8M4JTbFgNP+q8Z9TUKUUvFd:uITf69JSNeJqp7KUUvFd
                                                                        MD5:DC1F7AB1D29CB0415093F7FF25C5E073
                                                                        SHA1:0FD48627C525FA83051209319CA8CE8A1E066B75
                                                                        SHA-256:EAE1EF1F04C99FDFB5C1056CCB56C683AB93C19FA6B1E66C8384726C75D167D5
                                                                        SHA-512:E2225BD428451A1A4D9967FDAE88CE8B8E593855564184960F6A5F0E6BE08F9EEE19BFBD6EB6425028FA831BEFD0B8E1D173BEB45DB6116B35DA1043C062662A
                                                                        Malicious:false
                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5C8.tmp.dmp
                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                        File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 17:51:07 2021, 0x1205a4 type
                                                                        Category:dropped
                                                                        Size (bytes):146676
                                                                        Entropy (8bit):1.8940710541744497
                                                                        Encrypted:false
                                                                        SSDEEP:768:aRuQaEfWnlHbhYV8y2VVoyDWCnxXK1bVP5DNKIwy:GutnlH1YVTAWCnxXK1bVP5DNKIwy
                                                                        MD5:1DF4C1DCD122045F6440BCC60BC4C372
                                                                        SHA1:703557B537614AF9EE1D86F02142448083C1E1AF
                                                                        SHA-256:5EB364E8862E42900C2898B8C3E3A5DDC3285A1FF82E47B1C86F3A2F9A6BCF05
                                                                        SHA-512:2E7BD9B04C8404081D868E90C7E09CFE3C0E552BA6421BE9417771AC692D8FEF1BE29FFC3E968C87CFBCBB5F6923D12A05B415578E194B02E43E0AE242253268
                                                                        Malicious:false
                                                                        Preview: MDMP....... ........@5`...................U...........B.......$......GenuineIntelW...........T...........F@5`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\1xVPfvJcrg
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                        Category:dropped
                                                                        Size (bytes):73728
                                                                        Entropy (8bit):1.1874185457069584
                                                                        Encrypted:false
                                                                        SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                        MD5:72A43D390E478BA9664F03951692D109
                                                                        SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                        SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                        SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                        Malicious:false
                                                                        Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\3v08oN27yL
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                        Category:dropped
                                                                        Size (bytes):118784
                                                                        Entropy (8bit):0.4507667042986948
                                                                        Encrypted:false
                                                                        SSDEEP:96:V/WU+bDoYysX0uhnydVjN9DLjGQLBE3u:V/l+bDo3irhnydVj3XBBE3u
                                                                        MD5:8D1E4EF2C47505BE17244F97D8591000
                                                                        SHA1:09EC63BD44834AC76F888D87C0A358532665D8B6
                                                                        SHA-256:A395EB3FFB419984F33F2AC9EE04A6257730A4600580812A5518957F50BB6D88
                                                                        SHA-512:B7EB3FE94FF62DD8D6BFEF55C0D79ABB2DAC65E30757E016B37CF78F29C27BDE89D0798CD21357B438EE4007D917AD830A11521DA3DC5C1988D73CBD9990FCD1
                                                                        Malicious:false
                                                                        Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\RYwTiizs2t
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                        Category:dropped
                                                                        Size (bytes):73728
                                                                        Entropy (8bit):1.1874185457069584
                                                                        Encrypted:false
                                                                        SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                        MD5:72A43D390E478BA9664F03951692D109
                                                                        SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                        SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                        SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                        Malicious:false
                                                                        Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\frAQBc8Wsa
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                        Category:dropped
                                                                        Size (bytes):40960
                                                                        Entropy (8bit):0.792852251086831
                                                                        Encrypted:false
                                                                        SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                        MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                        SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                        SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                        SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                        Malicious:false
                                                                        Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\rQF69AzBla
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                        Category:dropped
                                                                        Size (bytes):20480
                                                                        Entropy (8bit):0.698304057893793
                                                                        Encrypted:false
                                                                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                                                                        MD5:3806E8153A55C1A2DA0B09461A9C882A
                                                                        SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                                                                        SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                                                                        SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                                                                        Malicious:false
                                                                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        C:\Users\user\AppData\LocalLow\sqlite3.dll
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):916735
                                                                        Entropy (8bit):6.514932604208782
                                                                        Encrypted:false
                                                                        SSDEEP:24576:BJDwWdxW2SBNTjlY24eJoyGttl3+FZVpsq/2W:BJDvx0BY24eJoyctl3+FTX
                                                                        MD5:F964811B68F9F1487C2B41E1AEF576CE
                                                                        SHA1:B423959793F14B1416BC3B7051BED58A1034025F
                                                                        SHA-256:83BC57DCF282264F2B00C21CE0339EAC20FCB7401F7C5472C0CD0C014844E5F7
                                                                        SHA-512:565B1A7291C6FCB63205907FCD9E72FC2E11CA945AFC4468C378EDBA882E2F314C2AC21A7263880FF7D4B84C2A1678024C1AC9971AC1C1DE2BFA4248EC0F98C4
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exe, Detection: malicious, Browse
                                                                        • Filename: mDxyEfHSMs.exe, Detection: malicious, Browse
                                                                        • Filename: A6Qom7We0l.exe, Detection: malicious, Browse
                                                                        • Filename: BHuuI8LETf.exe, Detection: malicious, Browse
                                                                        • Filename: m1hholPLan.exe, Detection: malicious, Browse
                                                                        • Filename: nyDyMJGKWD.exe, Detection: malicious, Browse
                                                                        • Filename: HA2a7FagC6.exe, Detection: malicious, Browse
                                                                        • Filename: xytEWWD2QN.exe, Detection: malicious, Browse
                                                                        • Filename: itqFYYnm5j.exe, Detection: malicious, Browse
                                                                        • Filename: HDMInstaller.exe, Detection: malicious, Browse
                                                                        • Filename: zrmbk.exe, Detection: malicious, Browse
                                                                        • Filename: e7zQwqIDCO.exe, Detection: malicious, Browse
                                                                        • Filename: RddH6rLRfH.exe, Detection: malicious, Browse
                                                                        • Filename: 4PDNbYK5fj.exe, Detection: malicious, Browse
                                                                        • Filename: pmTdQ57tvM.exe, Detection: malicious, Browse
                                                                        • Filename: 7BtV39hziI.exe, Detection: malicious, Browse
                                                                        • Filename: dc4AaqW6Aa.exe, Detection: malicious, Browse
                                                                        • Filename: lAy87VNPiL.exe, Detection: malicious, Browse
                                                                        • Filename: 4GRuinub4a.exe, Detection: malicious, Browse
                                                                        • Filename: v8c1m9dW8G.exe, Detection: malicious, Browse
                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....t\...........!.....Z...................p.....a.......................................... .......................... ......H.... .......................0...3...................................................................................text...XX.......Z..................`.P`.data........p.......`..............@.`..rdata........... ...|..............@.`@.bss....(.............................`..edata... ......."..................@.0@.idata..H...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc...3...0...4..................@.0B/4...........p......................@.@B/19................................@..B/31.......... ......................@..B/45..........@......................@..B/57..........`......................@.0B/70.....i....p..........

                                                                        Static File Info

                                                                        General

                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.398265311987017
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                        • Clipper DOS Executable (2020/12) 0.02%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        • VXD Driver (31/22) 0.00%
                                                                        File name:SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        File size:555520
                                                                        MD5:060bd14ae501d8dae94cc73672ab195b
                                                                        SHA1:e16be2044b73bfb717d92d13968eac473d64b8fc
                                                                        SHA256:757c6ccb2021bb12cb15fafcd4d748ef2d347ed4cb51076162563cbfe1ea01e0
                                                                        SHA512:4c39ee69a9e1f8511c8c37a714cd2e9a44f5223fa9c356a8c0d466d273caeba2c391107822111de63ebfbca53b4a4601e90f03d5317914dc53192ef8fef28704
                                                                        SSDEEP:12288:v0R651v0Rkfohu9i0w1UP/e9GjvMe1i+BF4O:v0asRkA7lUu9mMe1Vf4O
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L......^...........

                                                                        File Icon

                                                                        Icon Hash:709c28c4c4e4b8d4

                                                                        Static PE Info

                                                                        General

                                                                        Entrypoint:0x403740
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x5E80AE8B [Sun Mar 29 14:19:55 2020 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:5
                                                                        OS Version Minor:1
                                                                        File Version Major:5
                                                                        File Version Minor:1
                                                                        Subsystem Version Major:5
                                                                        Subsystem Version Minor:1
                                                                        Import Hash:113ab027842a74f801bdc92a0f80850f

                                                                        Entrypoint Preview

                                                                        Instruction
                                                                        mov edi, edi
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        call 00007FF994AF0C8Bh
                                                                        call 00007FF994AE8CA6h
                                                                        pop ebp
                                                                        ret
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        mov edi, edi
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push FFFFFFFEh
                                                                        push 00474168h
                                                                        push 0040B2A0h
                                                                        mov eax, dword ptr fs:[00000000h]
                                                                        push eax
                                                                        add esp, FFFFFF98h
                                                                        push ebx
                                                                        push esi
                                                                        push edi
                                                                        mov eax, dword ptr [00476090h]
                                                                        xor dword ptr [ebp-08h], eax
                                                                        xor eax, ebp
                                                                        push eax
                                                                        lea eax, dword ptr [ebp-10h]
                                                                        mov dword ptr fs:[00000000h], eax
                                                                        mov dword ptr [ebp-18h], esp
                                                                        mov dword ptr [ebp-70h], 00000000h
                                                                        lea eax, dword ptr [ebp-60h]
                                                                        push eax
                                                                        call dword ptr [0046D0A0h]
                                                                        cmp dword ptr [0086CF60h], 00000000h
                                                                        jne 00007FF994AE8CA0h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000001h
                                                                        push 00000000h
                                                                        call dword ptr [0046D09Ch]
                                                                        call 00007FF994AE8E23h
                                                                        mov dword ptr [ebp-6Ch], eax
                                                                        call 00007FF994AF28BBh
                                                                        test eax, eax
                                                                        jne 00007FF994AE8C9Ch
                                                                        push 0000001Ch
                                                                        call 00007FF994AE8DE0h
                                                                        add esp, 04h
                                                                        call 00007FF994AF2218h
                                                                        test eax, eax
                                                                        jne 00007FF994AE8C9Ch
                                                                        push 00000010h
                                                                        call 00007FF994AE8DCDh
                                                                        add esp, 04h
                                                                        push 00000001h
                                                                        call 00007FF994AEDFA3h
                                                                        add esp, 04h
                                                                        call 00007FF994AF212Bh
                                                                        mov dword ptr [ebp-04h], 00000000h
                                                                        call 00007FF994AF1D0Fh
                                                                        test eax, eax

                                                                        Data Directories

                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x74af00x28.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4700000xa620.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x47b0000x1938.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x73e180x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x73dd00x40.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x6d0000x184.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                        Sections

                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x6ba710x6bc00False0.860591737964data7.82132041146IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x6d0000x83ce0x8400False0.273822206439data4.56486072359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x760000x3f6f640x2800unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                        .yodoje0x46d0000x4010x600False0.0130208333333data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                        .kemafuy0x46e0000x1790x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                        .tls0x46f0000x90x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x4700000xa6200xa800False0.557942708333data5.74216282025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x47b0000x5b4c0x5c00False0.228855298913data2.60911160945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                        Resources

                                                                        NameRVASizeTypeLanguageCountry
                                                                        PUS0x476d380xbf7ASCII text, with very long lines, with no line terminatorsTatarRussia
                                                                        RT_CURSOR0x4779680x134dataTatarRussia
                                                                        RT_ICON0x4705000xea8data
                                                                        RT_ICON0x4713a80x8a8data
                                                                        RT_ICON0x471c500x6c8data
                                                                        RT_ICON0x4723180x568GLS_BINARY_LSB_FIRST
                                                                        RT_ICON0x4728800x25a8data
                                                                        RT_ICON0x474e280x10a8data
                                                                        RT_ICON0x475ed00x988data
                                                                        RT_ICON0x4768580x468GLS_BINARY_LSB_FIRST
                                                                        RT_STRING0x477c900x134dataTatarRussia
                                                                        RT_STRING0x477dc80x374dataTatarRussia
                                                                        RT_STRING0x4781400x286dataTatarRussia
                                                                        RT_STRING0x4783c80x812dataTatarRussia
                                                                        RT_STRING0x478be00x6f2dataTatarRussia
                                                                        RT_STRING0x4792d80x668dataTatarRussia
                                                                        RT_STRING0x4799400x70adataTatarRussia
                                                                        RT_STRING0x47a0500x5d0dataTatarRussia
                                                                        RT_ACCELERATOR0x4779300x38dataTatarRussia
                                                                        RT_GROUP_CURSOR0x477aa00x14Lotus unknown worksheet or configuration, revision 0x1TatarRussia
                                                                        RT_GROUP_ICON0x476cc00x76data
                                                                        RT_VERSION0x477ab80x1d4dataTatarRussia

                                                                        Imports

                                                                        DLLImport
                                                                        KERNEL32.dllGetModuleHandleExA, SetEndOfFile, FindResourceW, MapUserPhysicalPages, LoadResource, HeapAlloc, LoadLibraryExW, InterlockedIncrement, ZombifyActCtx, CreateDirectoryW, LockFile, GetModuleHandleW, GetTickCount, GenerateConsoleCtrlEvent, GetConsoleAliasesA, ReadConsoleOutputA, GetLocaleInfoW, GetFileAttributesA, GetTimeFormatW, HeapValidate, SetConsoleCursorPosition, GetFileAttributesW, GetAtomNameW, GetCompressedFileSizeA, lstrcatA, ExitThread, FindNextVolumeMountPointW, CreateJobObjectA, GetProcAddress, CreateTimerQueueTimer, LocalAlloc, SetConsoleOutputCP, VirtualLock, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetModuleFileNameW, RaiseException, EncodePointer, DecodePointer, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, IsBadReadPtr, InitializeCriticalSectionAndSpinCount, QueryPerformanceCounter, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetLastError, HeapCreate, WriteFile, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, LoadLibraryW, SetFilePointer, GetConsoleCP, GetConsoleMode, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, HeapReAlloc, HeapSize, HeapQueryInformation, HeapFree, MultiByteToWideChar, RtlUnwind, SetStdHandle, GetStringTypeW, LCMapStringW, CreateFileW, CloseHandle, FlushFileBuffers

                                                                        Version Infos

                                                                        DescriptionData
                                                                        InternalNamecalinilimodumator.exe
                                                                        FileVersions7.0.0.23
                                                                        LegalCopyrightsVsekdag
                                                                        ProductVersions67.0.20.45
                                                                        Translation0x0409 0x22fc

                                                                        Possible Origin

                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        TatarRussia

                                                                        Network Behavior

                                                                        Network Port Distribution

                                                                        TCP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Feb 23, 2021 09:50:41.591856956 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.658446074 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.659002066 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.666049957 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.731311083 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.733447075 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.733474970 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.733505964 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.735893011 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.740586042 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.806468010 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:41.861279964 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:41.894270897 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:42.003715992 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069010973 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069111109 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069133043 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069152117 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069171906 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:50:42.069312096 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:42.157777071 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:50:50.118433952 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.171574116 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.171720028 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.172435045 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.225472927 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.229520082 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.229598999 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.229638100 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.229942083 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.244688034 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.297810078 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.297947884 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.320957899 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.321022987 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.374100924 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.374130964 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.959449053 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.959510088 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.959533930 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.959553003 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:50:50.959667921 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:50:50.959688902 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.069726944 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:51:02.069772959 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:51:02.069850922 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:51:02.070734978 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:51:02.070796967 CET49705443192.168.2.595.216.186.40
                                                                        Feb 23, 2021 09:51:02.136039972 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:51:02.136090994 CET4434970595.216.186.40192.168.2.5
                                                                        Feb 23, 2021 09:51:02.448165894 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.501295090 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.791354895 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.791404963 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.791577101 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.791631937 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.791652918 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.792258024 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.792295933 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.792301893 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.793323994 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.793540001 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.793663979 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.794787884 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.794914007 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.795099020 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.795994997 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.796041012 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.796166897 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.797184944 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.797224998 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.797339916 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.798439980 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.798472881 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.798636913 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.799696922 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.799737930 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.800923109 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.800956964 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.800971985 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.802180052 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.802215099 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.802216053 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.803081036 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.803389072 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.803425074 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.804594040 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.804662943 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.804693937 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.804797888 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.805888891 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.805921078 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.807084084 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.811342001 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.811378002 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.811685085 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.811726093 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.811727047 CET49708443192.168.2.5172.67.199.58
                                                                        Feb 23, 2021 09:51:02.812309027 CET44349708172.67.199.58192.168.2.5
                                                                        Feb 23, 2021 09:51:02.812344074 CET49708443192.168.2.5172.67.199.58

                                                                        UDP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Feb 23, 2021 09:49:53.072398901 CET5248053192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:49:53.121045113 CET53524808.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:49:53.263113976 CET5116553192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:49:53.311850071 CET53511658.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:49:59.572102070 CET5318353192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:49:59.621140957 CET53531838.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:00.630239964 CET5758753192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:00.678927898 CET53575878.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:03.483525038 CET5543253192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:03.543621063 CET53554328.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:04.824055910 CET6493653192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:04.883882999 CET53649368.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:05.853485107 CET5270453192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:05.904921055 CET53527048.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:06.816780090 CET5221253192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:06.868295908 CET53522128.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:08.202692986 CET5430253192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:08.251185894 CET53543028.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:09.460633993 CET5378453192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:09.511080980 CET53537848.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:13.718662977 CET6530753192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:13.780936956 CET53653078.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:15.182138920 CET6434453192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:15.231034994 CET53643448.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:18.548449993 CET6206053192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:18.597100973 CET53620608.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:19.902447939 CET6180553192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:19.951160908 CET53618058.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:20.478673935 CET5479553192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:20.537493944 CET53547958.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:21.474536896 CET4955753192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:21.531749964 CET53495578.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:22.819078922 CET6173353192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:22.867913008 CET53617338.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:32.580759048 CET6544753192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:32.632639885 CET53654478.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:40.966895103 CET5244153192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:41.015678883 CET53524418.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:41.396085978 CET6217653192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:41.572918892 CET53621768.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:48.636456013 CET5959653192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:48.689676046 CET53595968.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:49.868020058 CET6529653192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:49.919756889 CET53652968.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:50:50.057427883 CET6318353192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:50:50.116586924 CET53631838.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:51:02.193861961 CET6015153192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:51:02.256514072 CET53601518.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:51:14.084739923 CET5696953192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:51:14.136301994 CET53569698.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:51:24.492079973 CET5516153192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:51:24.543564081 CET53551618.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:51:36.987519979 CET5475753192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:51:37.039026022 CET53547578.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:51:39.654997110 CET4999253192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:51:39.703627110 CET53499928.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:02.856551886 CET6007553192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:02.906472921 CET53600758.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:03.832042933 CET5501653192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:03.881895065 CET53550168.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:04.416414976 CET6434553192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:04.476588011 CET53643458.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:08.626816988 CET5712853192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:08.675478935 CET53571288.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:09.616751909 CET5479153192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:09.668942928 CET53547918.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:11.027956963 CET5046353192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:11.079694986 CET53504638.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:11.966301918 CET5039453192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:12.014877081 CET53503948.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:16.606461048 CET5853053192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:16.663418055 CET53585308.8.8.8192.168.2.5
                                                                        Feb 23, 2021 09:52:18.860440969 CET5381353192.168.2.58.8.8.8
                                                                        Feb 23, 2021 09:52:18.909151077 CET53538138.8.8.8192.168.2.5

                                                                        DNS Queries

                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        Feb 23, 2021 09:50:41.396085978 CET192.168.2.58.8.8.80xd90bStandard query (0)tttttt.meA (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:50:50.057427883 CET192.168.2.58.8.8.80x262aStandard query (0)yearofthepig.topA (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:52:04.416414976 CET192.168.2.58.8.8.80x472eStandard query (0)yearofthepig.topA (IP address)IN (0x0001)

                                                                        DNS Answers

                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        Feb 23, 2021 09:50:41.572918892 CET8.8.8.8192.168.2.50xd90bNo error (0)tttttt.me95.216.186.40A (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:50:50.116586924 CET8.8.8.8192.168.2.50x262aNo error (0)yearofthepig.top172.67.199.58A (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:50:50.116586924 CET8.8.8.8192.168.2.50x262aNo error (0)yearofthepig.top104.21.50.15A (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:52:04.476588011 CET8.8.8.8192.168.2.50x472eNo error (0)yearofthepig.top104.21.50.15A (IP address)IN (0x0001)
                                                                        Feb 23, 2021 09:52:04.476588011 CET8.8.8.8192.168.2.50x472eNo error (0)yearofthepig.top172.67.199.58A (IP address)IN (0x0001)

                                                                        HTTPS Packets

                                                                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                        Feb 23, 2021 09:50:41.733474970 CET95.216.186.40443192.168.2.549705CN=tttttt.me CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Fri Jan 01 09:37:32 CET 2021 Wed Oct 07 21:21:40 CEST 2020Thu Apr 01 10:37:32 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                                                                        Feb 23, 2021 09:50:50.229598999 CET172.67.199.58443192.168.2.549708CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Feb 11 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Feb 11 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                        CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                                                                        Feb 23, 2021 09:52:04.567430019 CET104.21.50.15443192.168.2.549716CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Feb 11 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Feb 11 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                        CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                                                                        Code Manipulations

                                                                        Statistics

                                                                        Behavior

                                                                        Click to jump to process

                                                                        System Behavior

                                                                        General

                                                                        Start time:09:49:58
                                                                        Start date:23/02/2021
                                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exe'
                                                                        Imagebase:0x400000
                                                                        File size:555520 bytes
                                                                        MD5 hash:060BD14AE501D8DAE94CC73672AB195B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low

                                                                        General

                                                                        Start time:09:50:00
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:07
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 760
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:16
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 780
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:22
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 776
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:30
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 984
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:41
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1196
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:50:50
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 724
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:51:02
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1268
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:51:14
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1316
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:09:51:25
                                                                        Start date:23/02/2021
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 964
                                                                        Imagebase:0x290000
                                                                        File size:434592 bytes
                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Disassembly

                                                                        Code Analysis

                                                                        Reset < >