Analyzing an attack with powershell