Source: powershell.exe, 00000006.00000002.2722957905.0000000007AF4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.microXz |
Source: powershell.exe, 00000006.00000002.2683246502.0000000003561000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.microsoft |
Source: powershell.exe, 00000004.00000002.1759303262.0000000005E7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2688123535.00000000063DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000006.00000002.2688123535.00000000054C8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000004.00000002.1756039105.0000000004E11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2688123535.0000000005371000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000006.00000002.2688123535.00000000054C8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000004.00000002.1756039105.0000000004E11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2688123535.0000000005371000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: powershell.exe, 00000004.00000002.1756039105.00000000050A5000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://atsuka.thri |
Source: powershell.exe, 00000006.00000002.2688123535.00000000054C8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://atsuka.thrivezest.org |
Source: powershell.exe, 00000006.00000002.2722957905.0000000007AD3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsuka.thrivezest.org/hubus.xlm |
Source: powershell.exe, 00000004.00000002.1752567349.0000000000DC3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaMicrosoft.PowerShell.Utility.psd1 |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/ |
Source: mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/5 |
Source: mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/= |
Source: mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/A |
Source: mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1772347259.000000000A689000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json |
Source: mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json$ |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json. |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769853728.0000000002851000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json... |
Source: mshta.exe, 00000002.00000002.1780566253.0000000002851000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json...# |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.json..z |
Source: mshta.exe, 00000002.00000003.1771480219.0000000006022000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1781742973.0000000006024000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778187959.0000000006024000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonLMEMh |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonetCookiesx |
Source: mshta.exe, 00000002.00000003.1778635657.0000000009484000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsoneval(GbaEXk.replace(/(..)./g |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonf |
Source: mshta.exe, 00000002.00000003.1778635657.0000000009475000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.json |
Source: mshta.exe, 00000002.00000003.1778635657.0000000009484000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonhttps://atsukaa.thrivezest.org/winwidgetshp.jsonhttp |
Source: mshta.exe, 00000002.00000003.1778044565.000000000286D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769853728.000000000286D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780645994.000000000286D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonnC: |
Source: mshta.exe, 00000002.00000003.1777514381.000000000282C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780491808.000000000282C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonstoryHistory.IE5x |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsont |
Source: mshta.exe, 00000002.00000003.1771739310.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1778219952.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780742700.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769456285.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1693843540.000000000288D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777417643.000000000288D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://atsukaa.thrivezest.org/winwidgetshp.jsonz |
Source: powershell.exe, 00000006.00000002.2688123535.00000000063DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000006.00000002.2688123535.00000000063DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000006.00000002.2688123535.00000000063DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000006.00000002.2688123535.00000000054C8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: powershell.exe, 00000004.00000002.1756039105.000000000577C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: mshta.exe, 00000002.00000003.1769853728.0000000002844000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780566253.0000000002846000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.live.comt |
Source: powershell.exe, 00000004.00000002.1759303262.0000000005E7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2688123535.00000000063DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: mshta.exe, 00000002.00000003.1777514381.000000000282C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780491808.000000000282C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/ |
Source: mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769853728.0000000002844000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780177793.0000000000680000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780491808.000000000282C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780566253.0000000002846000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captcha |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captcha& |
Source: mshta.exe, 00000002.00000002.1780566253.0000000002851000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1769853728.0000000002851000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captcha... |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captcha0 |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captcha1 |
Source: mshta.exe, 00000002.00000002.1780100750.0000000000670000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captchaDmG |
Source: mshta.exe, 00000002.00000003.1777514381.000000000282C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780491808.000000000282C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captchaP |
Source: mshta.exe, 00000002.00000002.1780385458.00000000027D0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.1780177793.0000000000680000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captchaWinSta0 |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captchad |
Source: mshta.exe, 00000002.00000002.1780491808.0000000002802000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.1777514381.0000000002801000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://solve.fizq.net/awjxs.captchai |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: powershell.exe, 00000006.00000002.2728791502.0000000008FA0000.00000004.08000000.00040000.00000000.sdmp |
String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_0342E268 |
6_2_0342E268 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_03429268 |
6_2_03429268 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_03429278 |
6_2_03429278 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_03425091 |
6_2_03425091 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_034250A0 |
6_2_034250A0 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_03425A20 |
6_2_03425A20 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_03425A30 |
6_2_03425A30 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_075287D0 |
6_2_075287D0 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_075287E0 |
6_2_075287E0 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_0752D218 |
6_2_0752D218 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_0752D1F9 |
6_2_0752D1F9 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077FA450 |
6_2_077FA450 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077FC73F |
6_2_077FC73F |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077FE7F0 |
6_2_077FE7F0 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077F9BC8 |
6_2_077F9BC8 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077F9BB9 |
6_2_077F9BB9 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077FA440 |
6_2_077FA440 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 6_2_077FE800 |
6_2_077FE800 |