Hello, now 2 times via extended threat detection a PS ****** was stopped. Dont now the real origin/executer, but virustotal said 0 found malicious, also their sandboxes, even Bitdefender…
Then I only could screencopy the finding, no text copy/rightklick, no button to a logfile. :/ so I used chatgpt for OCR. Later I found only under notification I can mark text and copy via rightclick. Seems like a hidden feature..
Finding (copy then has no line breaks :/ like in GUI):
Funktion:Erweiterte GefahrenabwehrDie Anwendung powershell.exe wurde als potenziell schädlich erkannt und blockiert.Anwendungspfad: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeBefehlszeilenparameter: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Restricted -Command                     $isBroken = 0                    # Define the root registry path                    $ShellRegRoot = 'HKCU:\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell'                    $bagMRURoot =  $ShellRegRoot + '\BagMRU'                    $bagRoot = $ShellRegRoot + '\Bags'                    # Define the target GUID tail for MSGraphHome                    $HomeFolderGuid = '14001F400E3174F8B7B6DC47BC84B9E6B38F59030000'                    $properties = Get-ItemProperty -Path $bagMRURoot                    foreach ($property in $properties.PSObject.Properties) {                        if ($property.TypeNameOfValue -eq 'System.Byte[]') {                            $hexString = ($property.Value | ForEach-Object { $_.ToString('X2') }) -join ''                            if ($hexString -eq $HomeFolderGuid) {                                $subkey = $property.Name                                $nodeSlot = Get-ItemPropertyValue -Path ($bagMRURoot + '\' + $subkey) -Name 'NodeSlot'                                $isBroken = if ((Get-ItemPropertyValue -Path ($bagRoot + '\' + $nodeSlot + '\Shell\*') -Name 'GroupView') -eq 0) { 1 } else { 0 }                                break                            }                        }                    }                    Write-Host 'Final result:',$isBrokenErkennungs-ID: SuspiciousBehavior.2304F2F54F048A90