Source: powershell.exe, 00000001.00000002.1778463096.000001832437A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1798425679.000001833290C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1798425679.0000018332A42000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000001.00000002.1778463096.0000018324206000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000001.00000002.1778463096.0000018322891000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: powershell.exe, 00000001.00000002.1778463096.0000018324206000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000001.00000002.1778463096.0000018322891000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000001.00000002.1798425679.0000018332A42000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000001.00000002.1798425679.0000018332A42000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000001.00000002.1798425679.0000018332A42000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: wscript.exe, 00000000.00000002.1809879390.000001E28B734000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1809160897.000001E28D7F5000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E39000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E1E000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E8F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe |
Source: wscript.exe, 00000000.00000002.1810546269.000001E28D804000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe/ |
Source: x.exe, 00000003.00000002.1842412077.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe/0hc11b.txt |
Source: x.exe, 00000003.00000000.1775660603.0000000000AF2000.00000002.00000001.01000000.00000008.sdmp, x.exe.1.dr | String found in binary or memory: https://files.catbox.moe/0hc11b.txt%Operation |
Source: x.exe, 00000003.00000002.1842412077.0000000002E39000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000000.1775660603.0000000000AF2000.00000002.00000001.01000000.00000008.sdmp, x.exe.1.dr | String found in binary or memory: https://files.catbox.moe/t7rwbh.txt |
Source: wscript.exe, 00000000.00000002.1810209924.000001E28B7D3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808548812.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1809879390.000001E28B740000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808125947.000001E28D5C3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1809052719.000001E28B73F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808184117.000001E28B7CD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808155576.000001E28B97B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808090724.000001E28D5C9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1809160897.000001E28D7F5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1723248018.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1723320024.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1810546269.000001E28D804000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1808695826.000001E28B765000.00000004.00000020.00020000.00000000.sdmp, TT copy.js | String found in binary or memory: https://files.catbox.moe/ugok5m.ps1 |
Source: wscript.exe, 00000000.00000003.1808548812.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1723248018.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1723320024.000001E28D5AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe/ugok5m.ps1u |
Source: wscript.exe, 00000000.00000002.1809879390.000001E28B734000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1809160897.000001E28D7F5000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E39000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E1E000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1842412077.0000000002E8F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe; |
Source: powershell.exe, 00000001.00000002.1778463096.0000018324206000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: wscript.exe, 00000000.00000002.1810546269.000001E28D804000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.comF |
Source: powershell.exe, 00000001.00000002.1778463096.000001832437A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1798425679.000001833290C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1798425679.0000018332A42000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.org |
Source: powershell.exe, 00000001.00000002.1778463096.0000018323DE5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.orgX |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0042BF13 NtClose, | 4_2_0042BF13 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C35C0 NtCreateMutant,LdrInitializeThunk, | 4_2_019C35C0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2B60 NtClose,LdrInitializeThunk, | 4_2_019C2B60 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2DF0 NtQuerySystemInformation,LdrInitializeThunk, | 4_2_019C2DF0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2C70 NtFreeVirtualMemory,LdrInitializeThunk, | 4_2_019C2C70 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C3090 NtSetValueKey, | 4_2_019C3090 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C3010 NtOpenDirectoryObject, | 4_2_019C3010 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C4340 NtSetContextThread, | 4_2_019C4340 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C4650 NtSuspendThread, | 4_2_019C4650 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C39B0 NtGetContextThread, | 4_2_019C39B0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2B80 NtQueryInformationFile, | 4_2_019C2B80 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2BA0 NtEnumerateValueKey, | 4_2_019C2BA0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2BF0 NtAllocateVirtualMemory, | 4_2_019C2BF0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2BE0 NtQueryValueKey, | 4_2_019C2BE0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2AB0 NtWaitForSingleObject, | 4_2_019C2AB0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2AD0 NtReadFile, | 4_2_019C2AD0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2AF0 NtWriteFile, | 4_2_019C2AF0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2DB0 NtEnumerateKey, | 4_2_019C2DB0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2DD0 NtDelayExecution, | 4_2_019C2DD0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C3D10 NtOpenProcessToken, | 4_2_019C3D10 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2D10 NtMapViewOfSection, | 4_2_019C2D10 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2D00 NtSetInformationFile, | 4_2_019C2D00 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2D30 NtUnmapViewOfSection, | 4_2_019C2D30 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C3D70 NtOpenThread, | 4_2_019C3D70 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2CA0 NtQueryInformationToken, | 4_2_019C2CA0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2CC0 NtQueryVirtualMemory, | 4_2_019C2CC0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2CF0 NtOpenProcess, | 4_2_019C2CF0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2C00 NtQueryInformationProcess, | 4_2_019C2C00 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2C60 NtCreateKey, | 4_2_019C2C60 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2F90 NtProtectVirtualMemory, | 4_2_019C2F90 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2FB0 NtResumeThread, | 4_2_019C2FB0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2FA0 NtQuerySection, | 4_2_019C2FA0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2FE0 NtCreateFile, | 4_2_019C2FE0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2F30 NtCreateSection, | 4_2_019C2F30 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2F60 NtCreateProcessEx, | 4_2_019C2F60 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2E80 NtReadVirtualMemory, | 4_2_019C2E80 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2EA0 NtAdjustPrivilegesToken, | 4_2_019C2EA0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2EE0 NtQueueApcThread, | 4_2_019C2EE0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C2E30 NtWriteVirtualMemory, | 4_2_019C2E30 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 3_2_01450848 | 3_2_01450848 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 3_2_01453028 | 3_2_01453028 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 3_2_0145422E | 3_2_0145422E |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0040F8F3 | 4_2_0040F8F3 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_004011D0 | 4_2_004011D0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_004161DE | 4_2_004161DE |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_004161E3 | 4_2_004161E3 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_00402188 | 4_2_00402188 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_00402190 | 4_2_00402190 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0040FB13 | 4_2_0040FB13 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0040DB93 | 4_2_0040DB93 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_00402D75 | 4_2_00402D75 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_00402510 | 4_2_00402510 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0042E513 | 4_2_0042E513 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_00402D80 | 4_2_00402D80 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A501AA | 4_2_01A501AA |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0199B1B0 | 4_2_0199B1B0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A481CC | 4_2_01A481CC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01980100 | 4_2_01980100 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A2A118 | 4_2_01A2A118 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A5B16B | 4_2_01A5B16B |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0197F172 | 4_2_0197F172 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019C516C | 4_2_019C516C |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A18158 | 4_2_01A18158 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4F0E0 | 4_2_01A4F0E0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A470E9 | 4_2_01A470E9 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019970C0 | 4_2_019970C0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A3F0CC | 4_2_01A3F0CC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019D739A | 4_2_019D739A |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A503E6 | 4_2_01A503E6 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0199E3F0 | 4_2_0199E3F0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4132D | 4_2_01A4132D |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0197D34C | 4_2_0197D34C |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4A352 | 4_2_01A4A352 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019952A0 | 4_2_019952A0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A312ED | 4_2_01A312ED |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019AB2C0 | 4_2_019AB2C0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A30274 | 4_2_01A30274 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A2D5B0 | 4_2_01A2D5B0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A50591 | 4_2_01A50591 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01990535 | 4_2_01990535 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A47571 | 4_2_01A47571 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A3E4F6 | 4_2_01A3E4F6 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4F43F | 4_2_01A4F43F |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A42446 | 4_2_01A42446 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01981460 | 4_2_01981460 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4F7B0 | 4_2_01A4F7B0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0198C7C0 | 4_2_0198C7C0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019B4750 | 4_2_019B4750 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01990770 | 4_2_01990770 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A416CC | 4_2_01A416CC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019AC6E0 | 4_2_019AC6E0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A5A9A6 | 4_2_01A5A9A6 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019929A0 | 4_2_019929A0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01999950 | 4_2_01999950 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019AB950 | 4_2_019AB950 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019A6962 | 4_2_019A6962 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019768B8 | 4_2_019768B8 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019BE8F0 | 4_2_019BE8F0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019938E0 | 4_2_019938E0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019FD800 | 4_2_019FD800 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01992840 | 4_2_01992840 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0199A840 | 4_2_0199A840 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019AFB80 | 4_2_019AFB80 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A05BF0 | 4_2_01A05BF0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019CDBF9 | 4_2_019CDBF9 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A46BD7 | 4_2_01A46BD7 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4FB76 | 4_2_01A4FB76 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4AB40 | 4_2_01A4AB40 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A2DAAC | 4_2_01A2DAAC |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0198EA80 | 4_2_0198EA80 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019D5AA0 | 4_2_019D5AA0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A3DAC6 | 4_2_01A3DAC6 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A03A6C | 4_2_01A03A6C |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A47A46 | 4_2_01A47A46 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4FA49 | 4_2_01A4FA49 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019A8DBF | 4_2_019A8DBF |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019AFDC0 | 4_2_019AFDC0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0198ADE0 | 4_2_0198ADE0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_0199AD00 | 4_2_0199AD00 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A47D73 | 4_2_01A47D73 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01993D40 | 4_2_01993D40 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A41D5A | 4_2_01A41D5A |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A30CB5 | 4_2_01A30CB5 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4FCF2 | 4_2_01A4FCF2 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01980CF2 | 4_2_01980CF2 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A09C32 | 4_2_01A09C32 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01990C00 | 4_2_01990C00 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01991F92 | 4_2_01991F92 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4FFB1 | 4_2_01A4FFB1 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01982FC8 | 4_2_01982FC8 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019B0F30 | 4_2_019B0F30 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4FF09 | 4_2_01A4FF09 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019D2F28 | 4_2_019D2F28 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A04F40 | 4_2_01A04F40 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_019A2E90 | 4_2_019A2E90 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01999EB0 | 4_2_01999EB0 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4CE93 | 4_2_01A4CE93 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4EEDB | 4_2_01A4EEDB |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01A4EE26 | 4_2_01A4EE26 |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Code function: 4_2_01990E59 | 4_2_01990E59 |
Source: 4.2.x.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 4.2.x.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000004.00000002.1951239959.00000000017F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000004.00000002.1950225873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: Process Memory Space: powershell.exe PID: 6896, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: jscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msxml3.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\x.exe | Section loaded: userenv.dll | Jump to behavior |