Source: | Binary string: System.Configuration.Install.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: rsaenh.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: anagement.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: System.Data.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.ni.pdb% source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: System.ni.pdb" source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.741455991.0000000005270000.00000004.00000040.sdmp |
Source: | Binary string: bcrypt.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: umerics.pdb" source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 0000000D.00000003.741455991.0000000005270000.00000004.00000040.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: System.Numerics.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.741455991.0000000005270000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000005.00000000.702983219.00000000077F8000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: winnsi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.ni.pdbTR source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: clr.pdb source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: CLBCatQ.pdb! source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: cryptsp.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: .textn.pdb ` source: powershell.exe, 00000005.00000000.702935630.00000000077BB000.00000004.00000001.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: CLBCatQ.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: System.Configuration.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: urlmon.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: gpapi.pdbG source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.DirectoryServices.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: anagement.pdb&& source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.741455991.0000000005270000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: onfiguration.Install.pdbLL source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: mscorlib.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: atl.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: System.Xml.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: mscoree.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: MpOAV.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.ni.pdb\ source: WerFault.exe, 0000000D.00000003.738499813.00000000052BD000.00000004.00000001.sdmp |
Source: | Binary string: onfiguration.Install.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.DirectoryServices.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: nsi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.PowerShell.ConsoleHost.pdb@ source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: Microsoft.PowerShell.Commands.Utility.pdb""F` source: WerFault.exe, 0000000D.00000003.738761846.00000000052A6000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.pdb4 source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: clrjit.pdb9 source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: System.Configuration.Install.pdbH source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: gpapi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: msvcr120_clr0400.i386.pdb% source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.Configuration.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: ole32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: ore.pdb{{ source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: iertutil.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.Transactions.pdb% source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: mscorlib.ni.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: System.Configuration.Install.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: System.Management.Automation.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: msasn1.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: mscorlib.pdb source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: mscorlib.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.PowerShell.Commands.Utility.pdbf source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.Management.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.Configuration.ni.pdbRSDSO* source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: dpapi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: secur32.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: powershell.pdb source: WerFault.exe, 0000000D.00000003.741455991.0000000005270000.00000004.00000040.sdmp |
Source: | Binary string: winhttp.pdbo source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: version.pdb/ source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: System.Xml.ni.pdbRSDS source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.Numerics.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: t.PowerShell.ConsoleHost.pdb" source: WerFault.exe, 0000000D.00000003.738761846.00000000052A6000.00000004.00000001.sdmp |
Source: | Binary string: wininet.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.Management.Automation.pdb" source: WerFault.exe, 0000000D.00000003.738761846.00000000052A6000.00000004.00000001.sdmp |
Source: | Binary string: System.Core.ni.pdbRSDSD source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: MpOAV.pdbs source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.Management.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: nsi.pdb_ source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: mscorlib.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: shlwapi.pdb5 source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb- source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.PowerShell.Security.pdbD source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: dpapi.pdbQ source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: MpClient.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.Core.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: shell32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: wininet.pdb_ source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: userenv.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: System.Xml.ni.pdbT source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: diasymreader.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: irectoryServices.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: System.Data.pdbu source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: winhttp.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: mscorlib.ni.pdb% source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: System.Transactions.pdb\ source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: OnDemandConnRouteHelper.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: t.PowerShell.ConsoleHost.pdb source: WerFault.exe, 0000000D.00000003.738761846.00000000052A6000.00000004.00000001.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.PowerShell.Security.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.Xml.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: WLDP.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: System.ni.pdbRSDS source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: clrjit.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS)m source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: ll.Commands.Utility.pdb^ source: powershell.exe, 00000005.00000000.706645322.0000000008789000.00000004.00000001.sdmp |
Source: | Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 0000000D.00000003.739523880.0000000005284000.00000004.00000001.sdmp |
Source: | Binary string: System.Configuration.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: mscoree.pdb3 source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: ransactions.pdbnn source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: wmswsock.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: version.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: wintrust.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: | Binary string: System.Xml.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: System.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: ore.ni.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: System.Management.Automation.pdb@ source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: ore.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: psapi.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb2 source: powershell.exe, 00000005.00000000.702935630.00000000077BB000.00000004.00000001.sdmp |
Source: | Binary string: System.ni.pdbT3yk source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: System.Core.pdbx source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp |
Source: | Binary string: mscoreei.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: Amsi.pdb source: WerFault.exe, 0000000D.00000003.738348119.000000000527B000.00000004.00000040.sdmp |
Source: | Binary string: umerics.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: System.Core.pdb source: powershell.exe, 00000005.00000000.702983219.00000000077F8000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: ransactions.pdb source: WerFault.exe, 0000000D.00000003.740241261.00000000052C0000.00000004.00000001.sdmp |
Source: | Binary string: System.Transactions.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: oleaut32.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.738072111.00000000052A1000.00000004.00000001.sdmp |
Source: | Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000000.702983219.00000000077F8000.00000004.00000001.sdmp |
Source: | Binary string: System.ni.pdb source: WerFault.exe, 0000000D.00000003.727793944.0000000006210000.00000004.00000001.sdmp, WER4735.tmp.dmp.13.dr |
Source: | Binary string: Microsoft.PowerShell.Security.pdbp source: WER4735.tmp.dmp.13.dr |
Source: | Binary string: crypt32.pdb source: WerFault.exe, 0000000D.00000003.739556026.0000000005288000.00000004.00000001.sdmp |
Source: powershell.exe, 00000005.00000000.706645322.0000000008789000.00000004.00000001.sdmp | String found in binary or memory: http://206.189.69.35/x1Fm |
Source: powershell.exe, 00000000.00000002.772023665.000001CDB7E38000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: WerFault.exe, 0000000D.00000002.762935904.0000000004CE4000.00000004.00000001.sdmp | String found in binary or memory: http://crl.m |
Source: powershell.exe, 00000000.00000002.772612102.000001CDB8137000.00000004.00000001.sdmp | String found in binary or memory: http://crl.osofts/Microt0 |
Source: WerFault.exe, 0000000D.00000003.730419455.0000000005770000.00000004.00000001.sdmp | String found in binary or memory: http://localhost/wsman:Microsoft.PowerShell.Workflow |
Source: powershell.exe, 00000000.00000002.770588360.000001CDAFDB8000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000000.00000002.755463812.000001CD9FE21000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005 |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200 |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone |
Source: powershell.exe, 00000000.00000002.754811598.000001CD9FC11000.00000004.00000001.sdmp, powershell.exe, 00000005.00000000.710315225.00000000049C1000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/ |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20 |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/ |
Source: WerFault.exe, 0000000D.00000003.731559206.0000000005480000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o |
Source: powershell.exe, 00000000.00000002.755463812.000001CD9FE21000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.770588360.000001CDAFDB8000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.770588360.000001CDAFDB8000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.770588360.000001CDAFDB8000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000000.00000002.755463812.000001CD9FE21000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.767490494.000001CDA1709000.00000004.00000001.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000000.00000002.770588360.000001CDAFDB8000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: a.ps1, type: SAMPLE | Matched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 |
Source: 00000005.00000000.702983219.00000000077F8000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000005.00000000.702983219.00000000077F8000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: 00000000.00000002.756668339.000001CDA0120000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.756668339.000001CDA0120000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: 00000005.00000000.710638243.0000000004B40000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000005.00000000.710638243.0000000004B40000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: 00000005.00000000.699444803.0000000004B40000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000005.00000000.699444803.0000000004B40000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: 00000000.00000002.758338125.000001CDA06AB000.00000004.00000001.sdmp, type: MEMORY | Matched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 |
Source: 00000000.00000002.772859194.000001CDB8350000.00000004.00000001.sdmp, type: MEMORY | Matched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 |
Source: 00000000.00000002.755463812.000001CD9FE21000.00000004.00000001.sdmp, type: MEMORY | Matched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 |
Source: Process Memory Space: powershell.exe PID: 7144, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: Process Memory Space: powershell.exe PID: 7144, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: Process Memory Space: powershell.exe PID: 5964, type: MEMORY | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: Process Memory Space: powershell.exe PID: 5964, type: MEMORY | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |
Source: C:\Users\user\Documents\20210706\PowerShell_transcript.745773.TjwFMGya.20210706115904.txt, type: DROPPED | Matched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Users\user\Documents\20210706\PowerShell_transcript.745773.TjwFMGya.20210706115904.txt, type: DROPPED | Matched rule: Base64_PS1_Shellcode date = 2018-11-14, author = Nick Carr, David Ledbetter, description = Detects Base64 encoded PS1 Shellcode, reference = https://twitter.com/ItsReallyNick/status/1062601684566843392, score = |