Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GsrDwm0DJG.ps1

Overview

General Information

Sample name:GsrDwm0DJG.ps1
renamed because original name is a hash value
Original sample name:9dda3ea193bf9e411bee70975424487b2a6728636e9837dfac6530b44edf48af.ps1
Analysis ID:1511451
MD5:bb8b708e6cf1915492af5dcb677a2cdd
SHA1:9547df0fd4e67dd321da10359f5eb2161790df42
SHA256:9dda3ea193bf9e411bee70975424487b2a6728636e9837dfac6530b44edf48af
Tags:deadmunky-nlps1
Infos:

Detection

RHADAMANTHYS
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 7296 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 7884 cmdline: "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • khle.exe (PID: 7904 cmdline: C:\Users\Public\Documents\khle.exe MD5: EC0F07CB1F1F5B4DD1BD94958C20A5AD)
        • OpenWith.exe (PID: 7932 cmdline: "C:\Windows\system32\openwith.exe" MD5: E4A834784FA08C17D47A1E72429C5109)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
{"C2 url": "https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7"}
SourceRuleDescriptionAuthorStrings
00000009.00000003.2213215790.0000020C80000000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    0000000A.00000003.2221017960.0000016653D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
      00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
        0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            10.3.OpenWith.exe.166561b0000.5.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              10.3.OpenWith.exe.166561b0000.5.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                10.3.OpenWith.exe.16655ed0000.4.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  9.3.khle.exe.20c80b30000.5.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    9.3.khle.exe.20c80b30000.5.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 2 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Documents\khle.exe, CommandLine: C:\Users\Public\Documents\khle.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\khle.exe, NewProcessName: C:\Users\Public\Documents\khle.exe, OriginalFileName: C:\Users\Public\Documents\khle.exe, ParentCommandLine: "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe , ParentImage: C:\Windows\System32\conhost.exe, ParentProcessId: 7884, ParentProcessName: conhost.exe, ProcessCommandLine: C:\Users\Public\Documents\khle.exe, ProcessId: 7904, ProcessName: khle.exe
                      Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7296, TargetFilename: C:\Users\Public\Documents\khle.mp3
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", ProcessId: 7296, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1", ProcessId: 7296, ProcessName: powershell.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\Public\Documents\khle.mp3Avira: detection malicious, Label: TR/AVI.Rhadamanthys.xgajh
                      Source: 00000009.00000002.2228592994.00007FF79CD21000.00000020.00000001.01000000.00000008.sdmpMalware Configuration Extractor: Rhadamanthys {"C2 url": "https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7"}
                      Source: deadmunky.nlVirustotal: Detection: 12%Perma Link
                      Source: https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7Virustotal: Detection: 7%Perma Link
                      Source: C:\Users\Public\Documents\khle.exe (copy)ReversingLabs: Detection: 60%
                      Source: C:\Users\Public\Documents\khle.exe (copy)Virustotal: Detection: 78%Perma Link
                      Source: C:\Users\Public\Documents\khle.mp3ReversingLabs: Detection: 60%
                      Source: C:\Users\Public\Documents\khle.mp3Virustotal: Detection: 78%Perma Link
                      Source: GsrDwm0DJG.ps1Virustotal: Detection: 7%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
                      Source: Binary string: kernel32.pdbUGP source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdbUGP source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernel32.pdb source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdb source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeCode function: 4x nop then ret 9_3_0000020C800110BC

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7
                      Source: global trafficTCP traffic: 192.168.2.5:49725 -> 194.113.106.180:3715
                      Source: Joe Sandbox ViewASN Name: RACKTECHRU RACKTECHRU
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EDB80C WSARecv,10_2_0000016655EDB80C
                      Source: global trafficDNS traffic detected: DNS query: deadmunky.nl
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: OpenWith.exe, 0000000A.00000002.3397772991.0000002FE82AB000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                      Source: powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                      Source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_d3415766-6
                      Source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_7467e7c8-f
                      Source: Yara matchFile source: 10.3.OpenWith.exe.166561b0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.3.OpenWith.exe.166561b0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.3.OpenWith.exe.16655ed0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.khle.exe.20c80b30000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.khle.exe.20c80b30000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.khle.exe.20c80850000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.khle.exe.20c80850000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: khle.exe PID: 7904, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OpenWith.exe PID: 7932, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: Process Memory Space: powershell.exe PID: 7296, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.mp3Jump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.exe (copy)Jump to dropped file
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C800156A8 NtQuerySystemInformation,NtQuerySystemInformation,GetTokenInformation,CloseHandle,CloseHandle,9_3_0000020C800156A8
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C800151B4 NtQueryInformationProcess,9_3_0000020C800151B4
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD818D79_3_00007FF79CD818D7
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80014A549_3_0000020C80014A54
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80013CEC9_3_0000020C80013CEC
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C800115009_3_0000020C80011500
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80012F009_3_0000020C80012F00
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C8001870C9_3_0000020C8001870C
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C8001710C9_3_0000020C8001710C
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80015BC09_3_0000020C80015BC0
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80019FFC9_3_0000020C80019FFC
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80018A589_3_0000020C80018A58
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80023E959_3_0000020C80023E95
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_3_0000016653BC096710_3_0000016653BC0967
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF2E9010_2_0000016655EF2E90
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EE1A9810_2_0000016655EE1A98
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655ED361810_2_0000016655ED3618
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEF9CC10_2_0000016655EEF9CC
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF1DE010_2_0000016655EF1DE0
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655ED819410_2_0000016655ED8194
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EE556C10_2_0000016655EE556C
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF4CD810_2_0000016655EF4CD8
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEBCA810_2_0000016655EEBCA8
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EE9C5410_2_0000016655EE9C54
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEC04010_2_0000016655EEC040
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655ED943C10_2_0000016655ED943C
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF1FF810_2_0000016655EF1FF8
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEE78810_2_0000016655EEE788
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655ED978810_2_0000016655ED9788
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEC34C10_2_0000016655EEC34C
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EEBB2810_2_0000016655EEBB28
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF272010_2_0000016655EF2720
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EF22F410_2_0000016655EF22F4
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EE5AE010_2_0000016655EE5AE0
                      Source: Joe Sandbox ViewDropped File: C:\Users\Public\Documents\khle.exe (copy) 34918278F6EB6B5E3AFA8DA406EB3C5A4CC3B7C4A1CEE55320FECDBEF4E0A463
                      Source: Joe Sandbox ViewDropped File: C:\Users\Public\Documents\khle.mp3 34918278F6EB6B5E3AFA8DA406EB3C5A4CC3B7C4A1CEE55320FECDBEF4E0A463
                      Source: Process Memory Space: powershell.exe PID: 7296, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: classification engineClassification label: mal100.troj.evad.winPS1@8/7@1/1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.mp3Jump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7884:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7304:120:WilError_03
                      Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsnsq2pv.bku.ps1Jump to behavior
                      Source: C:\Windows\System32\OpenWith.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\OpenWith.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: GsrDwm0DJG.ps1Virustotal: Detection: 7%
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Users\Public\Documents\khle.exe C:\Users\Public\Documents\khle.exe
                      Source: C:\Users\Public\Documents\khle.exeProcess created: C:\Windows\System32\OpenWith.exe "C:\Windows\system32\openwith.exe"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe Jump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Users\Public\Documents\khle.exe C:\Users\Public\Documents\khle.exeJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeProcess created: C:\Windows\System32\OpenWith.exe "C:\Windows\system32\openwith.exe"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: wudfplatform.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Binary string: kernel32.pdbUGP source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdbUGP source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernel32.pdb source: khle.exe, 00000009.00000003.2217151604.0000020C80910000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2216654795.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2224906190.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2225340660.0000016655F90000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: khle.exe, 00000009.00000003.2214312830.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2215191261.0000020C80A40000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2222738514.00000166560C0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2221852667.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdb source: khle.exe, 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, khle.exe, 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp
                      Source: khle.mp3.0.drStatic PE information: section name: .textbss
                      Source: khle.mp3.0.drStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848A65CC3 push eax; iretd 0_2_00007FF848A65CD1
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD8220B push eax; iretd 9_3_00007FF79CD82224
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD86C12 push edx; retf 9_3_00007FF79CD86C26
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD859E3 push esi; retf 9_3_00007FF79CD859E6
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD835EC push esi; ret 9_3_00007FF79CD835ED
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD817D5 push cs; ret 9_3_00007FF79CD818C4
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD840F7 push eax; ret 9_3_00007FF79CD840FB
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD8430B push eax; retf 9_3_00007FF79CD8430C
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD85ED9 push esi; ret 9_3_00007FF79CD85EDD
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD862E3 push ebx; ret 9_3_00007FF79CD862E6
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD848BE push eax; retf 9_3_00007FF79CD848BF
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD84EB2 pushad ; retf 9_3_00007FF79CD84EB3
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD81865 push cs; ret 9_3_00007FF79CD818C4
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD85643 push eax; retf 9_3_00007FF79CD85645
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_00007FF79CD84427 pushad ; ret 9_3_00007FF79CD84428
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C8001C219 pushad ; retf 9_3_0000020C8001C221
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80023E95 push ebp; retf 9_3_0000020C80023E94
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C800274C6 push esi; ret 9_3_0000020C800274CA
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C8002BACB pushad ; iretd 9_3_0000020C80352EB3
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C800256D9 push ecx; ret 9_3_0000020C80025700
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80024B35 push ss; iretd 9_3_0000020C8031919F
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80028560 push ds; retf 9_3_0000020C80028577
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80025C06 push esi; ret 9_3_0000020C80025C07
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C8002B627 push ebp; iretd 9_3_0000020C8002B628
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80023E70 push ebp; retf 9_3_0000020C80023E94
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_2_00007FF79CD293E6 push 3C95CC23h; iretd 9_2_00007FF79CD293EB
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_2_00007FF79CD2A778 pushfq ; iretd 9_2_00007FF79CD2A779
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_2_00007FF79CD24918 push rsi; retf 9_2_00007FF79CD24923
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_2_00007FF79CD296B5 push FFFFFF81h; retf 9_2_00007FF79CD296B7
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_3_0000016653BC0865 push cs; ret 10_3_0000016653BC0954
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_3_0000016653BC5CA2 push edx; retf 10_3_0000016653BC5CB6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.mp3Jump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.exe (copy)Jump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\Documents\khle.mp3Jump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X32DBG.EXEOLLYDBG.EXEPROCESSHACKER.EXEIDAQ64.EXEAUTORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXEILSPY.EXELORDPE.EXEDNSPY.EXEPETOOLS.EXEAUTO
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ON.EXEREGMON.EXEWINDANR.EXEWINDBG.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDANR.EXE
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3223Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2070Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7484Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\OpenWith.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_3_0000020C80014FD4 GetSystemInfo,9_3_0000020C80014FD4
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: OpenWith.exe, 0000000A.00000002.3397925763.0000016653DD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                      Source: OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: OpenWith.exe, 0000000A.00000002.3397925763.0000016653D98000.00000004.00000020.00020000.00000000.sdmp, OpenWith.exe, 0000000A.00000002.3397925763.0000016653DD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: OpenWith.exe, 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe "C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe Jump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Users\Public\Documents\khle.exe C:\Users\Public\Documents\khle.exeJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeProcess created: C:\Windows\System32\OpenWith.exe "C:\Windows\system32\openwith.exe"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\Public\Documents\khle.exeCode function: 9_2_00007FF79CD7615C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_00007FF79CD7615C
                      Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lordpe.exe
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: autoruns.exe
                      Source: OpenWith.exe, 0000000A.00000002.3398107509.0000016655786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000009.00000003.2213215790.0000020C80000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2221017960.0000016653D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000009.00000003.2213215790.0000020C80000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2221017960.0000016653D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\OpenWith.exeCode function: 10_2_0000016655EDB374 socket,bind,10_2_0000016655EDB374
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      11
                      Masquerading
                      21
                      Input Capture
                      1
                      System Time Discovery
                      Remote Services21
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      PowerShell
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      LSASS Memory221
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Process Injection
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDS31
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput Capture1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeylogging11
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync15
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1511451 Sample: GsrDwm0DJG.ps1 Startdate: 15/09/2024 Architecture: WINDOWS Score: 100 27 deadmunky.nl 2->27 31 Multi AV Scanner detection for domain / URL 2->31 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 8 other signatures 2->37 9 powershell.exe 16 2->9         started        signatures3 process4 file5 23 C:\Users\Public\Documents\khle.mp3, PE32+ 9->23 dropped 25 C:\Users\Public\Documents\khle.exe (copy), PE32+ 9->25 dropped 41 Powershell drops PE file 9->41 13 conhost.exe 9->13         started        15 conhost.exe 9->15         started        signatures6 process7 process8 17 khle.exe 1 13->17         started        process9 19 OpenWith.exe 17->19         started        dnsIp10 29 deadmunky.nl 194.113.106.180, 3715, 49725, 49727 RACKTECHRU Russian Federation 19->29 39 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 19->39 signatures11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      GsrDwm0DJG.ps13%ReversingLabs
                      GsrDwm0DJG.ps18%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      C:\Users\Public\Documents\khle.mp3100%AviraTR/AVI.Rhadamanthys.xgajh
                      C:\Users\Public\Documents\khle.exe (copy)61%ReversingLabsWin64.Spyware.Rhadamanthys
                      C:\Users\Public\Documents\khle.exe (copy)78%VirustotalBrowse
                      C:\Users\Public\Documents\khle.mp361%ReversingLabsWin64.Spyware.Rhadamanthys
                      C:\Users\Public\Documents\khle.mp378%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      deadmunky.nl12%VirustotalBrowse
                      fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      https://aka.ms/pscore680%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                      http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                      https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap77%VirustotalBrowse
                      http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                      https://github.com/Pester/Pester1%VirustotalBrowse
                      http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                      https://oneget.orgX0%Avira URL Cloudsafe
                      https://github.com/Pester/Pester0%Avira URL Cloudsafe
                      https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap70%Avira URL Cloudsafe
                      https://oneget.org0%Avira URL Cloudsafe
                      https://oneget.org0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      deadmunky.nl
                      194.113.106.180
                      truetrueunknown
                      fp2e7a.wpc.phicdn.net
                      192.229.221.95
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7true
                      • 7%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2179521473.0000022280CF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000000.00000002.2210475905.0000022290081000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://oneget.orgXpowershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/pscore68powershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2179521473.0000022280001000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2179521473.0000022280228000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://oneget.orgpowershell.exe, 00000000.00000002.2179521473.0000022280C28000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      194.113.106.180
                      deadmunky.nlRussian Federation
                      208861RACKTECHRUtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1511451
                      Start date and time:2024-09-15 15:01:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 50s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:GsrDwm0DJG.ps1
                      renamed because original name is a hash value
                      Original Sample Name:9dda3ea193bf9e411bee70975424487b2a6728636e9837dfac6530b44edf48af.ps1
                      Detection:MAL
                      Classification:mal100.troj.evad.winPS1@8/7@1/1
                      EGA Information:
                      • Successful, ratio: 33.3%
                      HCA Information:
                      • Successful, ratio: 60%
                      • Number of executed functions: 39
                      • Number of non-executed functions: 11
                      Cookbook Comments:
                      • Found application associated with file extension: .ps1
                      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                      • Excluded IPs from analysis (whitelisted): 20.190.159.75, 20.190.159.71, 20.190.159.0, 20.190.159.4, 20.190.159.68, 40.126.31.73, 40.126.31.67, 20.190.159.73
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ocsp.edge.digicert.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                      • Execution Graph export aborted for target khle.exe, PID 7904 because there are no executed function
                      • Execution Graph export aborted for target powershell.exe, PID 7296 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      09:02:11API Interceptor5x Sleep call for process: powershell.exe modified
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      fp2e7a.wpc.phicdn.nethttps://nnwdryn4me2.typeform.com/to/vzxAdnuI?utm_source=www.thedeepview.co&utm_medium=newsletter&utm_campaign=u-s-hospital-teams-up-with-suki-for-an-ai-assistant&_bhlid=899a446fb8590c3f4dab42c864907d7822828cadGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      file.exeGet hashmaliciousClipboard Hijacker, Raccoon Stealer v2Browse
                      • 192.229.221.95
                      http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onionGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://antai-gouv-fr.troliga.sk/3dsec.phpGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://urlz.fr/s6ZWGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://saltlakeinsider.com/wp-content/themes/travel/ghgh/red.htmlGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://antai-gouv-fr.troliga.sk/paiement.phpGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://metamisklogus.gitbook.io/Get hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://qrco.de/bfOaLJGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://lkjkqklqsd.vercel.app/Get hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      deadmunky.nlrsDymE.vbsGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      ji2OQQH0ei.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      Wg2icM1Vjd.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      mz4hWuLng5.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      3fFuN58APW.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      C6hvgnDXwW.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      drZ7xATGIg.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      zaD1vaze6V.ps1Get hashmaliciousRHADAMANTHYSBrowse
                      • 63.141.252.2
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      RACKTECHRUb2J6hgvd51.elfGet hashmaliciousUnknownBrowse
                      • 45.128.232.191
                      TbFoReHi2v.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      gmA11dfzc2.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      naoen3DFXE.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      BrKoH01YHR.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      JV1eMPUdHV.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      O1OSOtRYWN.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      EuK5PNhZyK.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      i1Z6us4dFg.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      cLtcKcdR8Q.elfGet hashmaliciousMiraiBrowse
                      • 45.128.232.235
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\Public\Documents\khle.exe (copy)zaD1vaze6V.ps1Get hashmaliciousRHADAMANTHYSBrowse
                        C:\Users\Public\Documents\khle.mp3zaD1vaze6V.ps1Get hashmaliciousRHADAMANTHYSBrowse
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):448512
                          Entropy (8bit):5.530525551421984
                          Encrypted:false
                          SSDEEP:12288:6uZZani4FaYkizhRpfX54K+uiE8XZzhzJ:6+ZIi4Z95/54K+uiE8Jd
                          MD5:EC0F07CB1F1F5B4DD1BD94958C20A5AD
                          SHA1:84718EFB03C2AE32AA2C5800BF135F97275F9A74
                          SHA-256:34918278F6EB6B5E3AFA8DA406EB3C5A4CC3B7C4A1CEE55320FECDBEF4E0A463
                          SHA-512:58AF6D13D8C43970CC9E964F8418ECB054E177D40F966D2D9E318F540370D219028C4694DAF09BA8B101206D54B482F66CE3A2B29EC4716119A21644A899F3D7
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 61%
                          • Antivirus: Virustotal, Detection: 78%, Browse
                          Joe Sandbox View:
                          • Filename: zaD1vaze6V.ps1, Detection: malicious, Browse
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........MV.y#..y#..y#...'..y#... ..y#...&..y#...&..y#...'..y#... ..y#..."..y#..y".ey#.o.'..y#..y#..y#.o....y#.o.!..y#.Rich.y#.........PE..d...^{_d.........."..................^.........@............................. ............`................................................. ...................D...............8.......................................8............................................text...P........................... ..`.textbss.................................rdata..,...........................@..@.data...............................@....pdata..D...........................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):448512
                          Entropy (8bit):5.530525551421984
                          Encrypted:false
                          SSDEEP:12288:6uZZani4FaYkizhRpfX54K+uiE8XZzhzJ:6+ZIi4Z95/54K+uiE8Jd
                          MD5:EC0F07CB1F1F5B4DD1BD94958C20A5AD
                          SHA1:84718EFB03C2AE32AA2C5800BF135F97275F9A74
                          SHA-256:34918278F6EB6B5E3AFA8DA406EB3C5A4CC3B7C4A1CEE55320FECDBEF4E0A463
                          SHA-512:58AF6D13D8C43970CC9E964F8418ECB054E177D40F966D2D9E318F540370D219028C4694DAF09BA8B101206D54B482F66CE3A2B29EC4716119A21644A899F3D7
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 61%
                          • Antivirus: Virustotal, Detection: 78%, Browse
                          Joe Sandbox View:
                          • Filename: zaD1vaze6V.ps1, Detection: malicious, Browse
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........MV.y#..y#..y#...'..y#... ..y#...&..y#...&..y#...'..y#... ..y#..."..y#..y".ey#.o.'..y#..y#..y#.o....y#.o.!..y#.Rich.y#.........PE..d...^{_d.........."..................^.........@............................. ............`................................................. ...................D...............8.......................................8............................................text...P........................... ..`.textbss.................................rdata..,...........................@..@.data...............................@....pdata..D...........................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):64
                          Entropy (8bit):1.1940658735648508
                          Encrypted:false
                          SSDEEP:3:Nlllul3tal/Z:NllUE
                          MD5:C155E815DDAFEDCAA0305D9D1FD4C6AF
                          SHA1:91D373895CC08546557E675D51815ACBE23CDC40
                          SHA-256:B09EA222DC02D5D1608A195DF72BC0C2A6349AC11507E8B06CF61D4B9122C3A8
                          SHA-512:CF84739C4C15C2EB66042195490DAF0E898424064E032F89F9ECE50351128342EED60E12AC2B5479E6928073A11740AF649A66155356676D0992621FAAB86B55
                          Malicious:false
                          Reputation:low
                          Preview:@...e.................................f.+............@..........
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):6222
                          Entropy (8bit):3.6897709923104456
                          Encrypted:false
                          SSDEEP:96:PlrfZC7ovkvhkvCCto0kRYEbH30kRYEwHN:NrfuMo0kRJ0kRm
                          MD5:01D090A4CE45B2B15E91514570572E3B
                          SHA1:302C9E33A645C09AC027B6DA86F1930CE9A41628
                          SHA-256:DED359BB736B7557F59771F72020F8E7DAAC844D3A9345425C864780B2B93528
                          SHA-512:A057C3692CC3978CF6F89F6BB5BFC7C00B88A6FC4DB3856243A860349B4C405F0FAADD46345D283C767E22D47469C2745839ED0672965594A61D828E97DE7303
                          Malicious:false
                          Preview:...................................FL..................F.".. ...d.......4.wo...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....n.Zso......wo.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl/Y<h....B.....................Bdg.A.p.p.D.a.t.a...B.V.1...../Y@h..Roaming.@......DWSl/Y@h....C.......................8.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl/Y<h....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW#r..Windows.@......DWSl/Y<h....E......................dX.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl/Y<h....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl/Y<h....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl/YDh....q...........
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):6222
                          Entropy (8bit):3.6897709923104456
                          Encrypted:false
                          SSDEEP:96:PlrfZC7ovkvhkvCCto0kRYEbH30kRYEwHN:NrfuMo0kRJ0kRm
                          MD5:01D090A4CE45B2B15E91514570572E3B
                          SHA1:302C9E33A645C09AC027B6DA86F1930CE9A41628
                          SHA-256:DED359BB736B7557F59771F72020F8E7DAAC844D3A9345425C864780B2B93528
                          SHA-512:A057C3692CC3978CF6F89F6BB5BFC7C00B88A6FC4DB3856243A860349B4C405F0FAADD46345D283C767E22D47469C2745839ED0672965594A61D828E97DE7303
                          Malicious:false
                          Preview:...................................FL..................F.".. ...d.......4.wo...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....n.Zso......wo.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl/Y<h....B.....................Bdg.A.p.p.D.a.t.a...B.V.1...../Y@h..Roaming.@......DWSl/Y@h....C.......................8.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl/Y<h....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW#r..Windows.@......DWSl/Y<h....E......................dX.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl/Y<h....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl/Y<h....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl/YDh....q...........
                          File type:ASCII text, with very long lines (65534), with CRLF line terminators
                          Entropy (8bit):3.219589370944477
                          TrID:
                            File name:GsrDwm0DJG.ps1
                            File size:897'543 bytes
                            MD5:bb8b708e6cf1915492af5dcb677a2cdd
                            SHA1:9547df0fd4e67dd321da10359f5eb2161790df42
                            SHA256:9dda3ea193bf9e411bee70975424487b2a6728636e9837dfac6530b44edf48af
                            SHA512:5efdc65e053e7da47acc2af1f0bf1ac68be344397bedb392d5bc171520958b3e1c46f4b0269b67353a5b70da943d7cefd0e8f29a66cce7437b2c4650bdde2818
                            SSDEEP:12288:Kem6ChShBS+75NRaX6RhwCmV1Fk2bH3rHOad8jnlz:KIhBJHRaPF1FNr2jd
                            TLSH:F715671206BF0051F99238F45D4CB7D2BCBEB8C799F28CB14A6E5B7619259E7A4F1038
                            File Content Preview:..$encodedData = '4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000000100000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0
                            Icon Hash:3270d6baae77db44
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 15, 2024 15:02:20.507742882 CEST497253715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:20.512584925 CEST371549725194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:20.512685061 CEST497253715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:20.513031960 CEST497253715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:20.520469904 CEST371549725194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:25.501147032 CEST497253715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:25.549175978 CEST371549725194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:30.497490883 CEST497273715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:30.503638029 CEST371549727194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:30.503726006 CEST497273715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:30.503931999 CEST497273715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:30.509217024 CEST371549727194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:35.516598940 CEST497273715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:35.565155029 CEST371549727194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:40.528856039 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:40.537264109 CEST371549730194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:40.537374020 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:40.537457943 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:40.542304039 CEST371549730194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:41.883660078 CEST371549725194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:41.883758068 CEST497253715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:45.550553083 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:45.856443882 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:46.465828896 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:46.528969049 CEST371549730194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:46.530338049 CEST371549730194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:50.559966087 CEST497313715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:50.564816952 CEST371549731194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:50.564909935 CEST497313715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:50.565005064 CEST497313715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:50.570031881 CEST371549731194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:51.871069908 CEST371549727194.113.106.180192.168.2.5
                            Sep 15, 2024 15:02:51.871130943 CEST497273715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:55.701136112 CEST497313715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:02:55.749113083 CEST371549731194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:00.591247082 CEST497333715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:00.596112967 CEST371549733194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:00.596188068 CEST497333715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:00.596343040 CEST497333715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:00.601190090 CEST371549733194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:01.899379015 CEST371549730194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:01.899450064 CEST497303715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:05.610332966 CEST497333715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:05.657155037 CEST371549733194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:10.622575045 CEST497363715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:10.627527952 CEST371549736194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:10.627667904 CEST497363715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:10.627759933 CEST497363715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:10.632484913 CEST371549736194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:11.945956945 CEST371549731194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:11.946058989 CEST497313715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:15.641930103 CEST497363715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:15.693388939 CEST371549736194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:20.654093027 CEST497383715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:20.658931017 CEST371549738194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:20.659003019 CEST497383715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:20.659096003 CEST497383715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:20.663861036 CEST371549738194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:22.151743889 CEST371549733194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:22.151850939 CEST497333715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:25.658314943 CEST497383715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:25.705322027 CEST371549738194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:30.669593096 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:30.674637079 CEST371549740194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:30.674750090 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:30.674858093 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:30.679857016 CEST371549740194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:31.993488073 CEST371549736194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:31.993774891 CEST497363715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:35.673023939 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:35.981698036 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:36.052244902 CEST371549740194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:40.669791937 CEST497413715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:40.675163984 CEST371549741194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:40.675405025 CEST497413715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:40.675924063 CEST497413715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:40.680927992 CEST371549741194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:42.024507999 CEST371549738194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:42.024709940 CEST497383715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:45.689238071 CEST497413715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:45.737351894 CEST371549741194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:50.685256958 CEST497423715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:50.690099955 CEST371549742194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:50.690372944 CEST497423715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:50.690606117 CEST497423715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:50.696546078 CEST371549742194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:52.057791948 CEST371549740194.113.106.180192.168.2.5
                            Sep 15, 2024 15:03:52.057861090 CEST497403715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:55.704138994 CEST497423715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:03:55.753577948 CEST371549742194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:00.716541052 CEST497443715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:00.721568108 CEST371549744194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:00.721657991 CEST497443715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:00.721750975 CEST497443715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:00.726475000 CEST371549744194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:02.058043957 CEST371549741194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:02.058092117 CEST497413715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:05.719921112 CEST497443715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:05.765671015 CEST371549744194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:10.716547012 CEST497453715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:10.721512079 CEST371549745194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:10.721671104 CEST497453715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:10.721750021 CEST497453715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:10.726550102 CEST371549745194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:12.071703911 CEST371549742194.113.106.180192.168.2.5
                            Sep 15, 2024 15:04:12.071831942 CEST497423715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:15.716557026 CEST497453715192.168.2.5194.113.106.180
                            Sep 15, 2024 15:04:15.761538029 CEST371549745194.113.106.180192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 15, 2024 15:02:20.490523100 CEST6511053192.168.2.51.1.1.1
                            Sep 15, 2024 15:02:20.504023075 CEST53651101.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 15, 2024 15:02:20.490523100 CEST192.168.2.51.1.1.10xa4eaStandard query (0)deadmunky.nlA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 15, 2024 15:02:03.005342007 CEST1.1.1.1192.168.2.50x6982No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                            Sep 15, 2024 15:02:03.005342007 CEST1.1.1.1192.168.2.50x6982No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                            Sep 15, 2024 15:02:20.504023075 CEST1.1.1.1192.168.2.50xa4eaNo error (0)deadmunky.nl194.113.106.180A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:09:02:07
                            Start date:15/09/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\GsrDwm0DJG.ps1"
                            Imagebase:0x7ff7be880000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:1
                            Start time:09:02:07
                            Start date:15/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:09:02:11
                            Start date:15/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\system32\conhost.exe" C:\Users\Public\Documents\khle.exe
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:09:02:11
                            Start date:15/09/2024
                            Path:C:\Users\Public\Documents\khle.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\Public\Documents\khle.exe
                            Imagebase:0x7ff79cd20000
                            File size:448'512 bytes
                            MD5 hash:EC0F07CB1F1F5B4DD1BD94958C20A5AD
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000009.00000003.2213215790.0000020C80000000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000003.2219039554.0000020C80B30000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000003.2217949508.0000020C80850000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:10
                            Start time:09:02:16
                            Start date:15/09/2024
                            Path:C:\Windows\System32\OpenWith.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\system32\openwith.exe"
                            Imagebase:0x7ff637050000
                            File size:123'984 bytes
                            MD5 hash:E4A834784FA08C17D47A1E72429C5109
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 0000000A.00000003.2221017960.0000016653D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000003.2229840318.00000166561B0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000003.2228942878.0000016655ED0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 447e088ec4eefd596a3adba376de17ab6ed444eb3460917c86c852975b3e84ee
                              • Instruction ID: b6dd90ea8104b93e5f203ce7879835b6ab28e4d9cc80f9eedfd130641f3f2c60
                              • Opcode Fuzzy Hash: 447e088ec4eefd596a3adba376de17ab6ed444eb3460917c86c852975b3e84ee
                              • Instruction Fuzzy Hash: 0482EE31E0DA898FEB99EA28885467877E1FF55345F5801BED00DCB282DF29EC46C745
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bae70dbdd34cae818f8c3745576aa9c4327c2799cd047fe315d43c4802ce4478
                              • Instruction ID: f98f68f76767a0b53f4de2ddbefa9362a991562ead4b7660599cba5dc6e9cd89
                              • Opcode Fuzzy Hash: bae70dbdd34cae818f8c3745576aa9c4327c2799cd047fe315d43c4802ce4478
                              • Instruction Fuzzy Hash: 1FC12531E0DA4A9FE795EA2CA4556B57BE2FF98362F0401BBC40CC3692DF24AC468745
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 98e028cb8ae880950556a938ffcf561541c8ef7346218f7afb527ab0cf14371f
                              • Instruction ID: 613384da30d5d5d16b8e89579ce530b3fc41bda177f1d95d0c52f385eebb2bf3
                              • Opcode Fuzzy Hash: 98e028cb8ae880950556a938ffcf561541c8ef7346218f7afb527ab0cf14371f
                              • Instruction Fuzzy Hash: 96813532E1DE894FE795FA2868596F57BE1EF99250F0800BBD04DC7587EE18AC06C385
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5e08788b2046c1110cc67e16ff4cf5a8439e9a561b0aececbe22fb122391b4a
                              • Instruction ID: 409cda996fef93c62392e90cc611395d191098eadc4ca81c58fe96dc60636df3
                              • Opcode Fuzzy Hash: b5e08788b2046c1110cc67e16ff4cf5a8439e9a561b0aececbe22fb122391b4a
                              • Instruction Fuzzy Hash: B241BF6284E7C20FD34397B898696A13FF09F5B220B0E40EBC4C8CF4A7D60D591AD722
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d2c087514797190f68bf8f70c58db81c963b39c50bf6ce4e150583d97653f862
                              • Instruction ID: 40d5a59a7db92e77da6785c3fc8abb717e16a633f3d607cbd6d5195a9dda35c6
                              • Opcode Fuzzy Hash: d2c087514797190f68bf8f70c58db81c963b39c50bf6ce4e150583d97653f862
                              • Instruction Fuzzy Hash: BB31C16284E7C24FD34397B898696A03FF0DF57220B0D00EBC488CF5A3D60C691AD762
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ce6798cb3c87bd00bc792a982cfd68987592c066133955fa5cc5b9b138158d5f
                              • Instruction ID: b4ea7d1925c01e06430c011143b936076e68dc485a2c86bc523c61a3a4f8ff00
                              • Opcode Fuzzy Hash: ce6798cb3c87bd00bc792a982cfd68987592c066133955fa5cc5b9b138158d5f
                              • Instruction Fuzzy Hash: 8731D462C0D7C64FD343EBB898696A07FF0EF5B250B0D04EBC489CB5A3D6086916D716
                              Memory Dump Source
                              • Source File: 00000000.00000002.2232713072.00007FF848B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848b30000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3f4cd8cf3da6fee0915267e3504f26a55fd61e23140ce3637ddc0baf1acd1e2e
                              • Instruction ID: baa4803fdceb14feb2d0f64d0ff75c002ab79275eac585984114b9400e60b92c
                              • Opcode Fuzzy Hash: 3f4cd8cf3da6fee0915267e3504f26a55fd61e23140ce3637ddc0baf1acd1e2e
                              • Instruction Fuzzy Hash: 7701F932E0D9165FE2A8F61C74471B962D1FF44361F9805F6D12DC3A87CF156C028389
                              Memory Dump Source
                              • Source File: 00000000.00000002.2231859569.00007FF848A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848A60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff848a60000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 344ae550aa189cfee030fe5dad0be6a80d281401a7062d5ced25e02183c3b3df
                              • Instruction ID: b993c3fc9fef864ab82b0db4840de8f0cffafccd29ff5a181c3da7e4d1a28f62
                              • Opcode Fuzzy Hash: 344ae550aa189cfee030fe5dad0be6a80d281401a7062d5ced25e02183c3b3df
                              • Instruction Fuzzy Hash: A901447115CB084FDB44EF0CE451AA9B7E0FB95364F10056DE58AC3655D626E881CB46
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: Information$Query$CloseHandleSystem$ProcessToken
                              • String ID:
                              • API String ID: 2024103940-0
                              • Opcode ID: b9a3c4ba72519c8822dfc57c731493710fdc37b3db7567c16f04e989f1c331f2
                              • Instruction ID: 8cff84183d2012fceddefb8a66252d275aac6937c8e844b53d796f9d3aed40bb
                              • Opcode Fuzzy Hash: b9a3c4ba72519c8822dfc57c731493710fdc37b3db7567c16f04e989f1c331f2
                              • Instruction Fuzzy Hash: D671B970218B05CBEBD6EB24985976A73D5FB94321F708729E487C7193EF34D9018786
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoSystem
                              • String ID: @
                              • API String ID: 31276548-2766056989
                              • Opcode ID: 7df665d085f366cb99ab2ed896b311d25e2371bb223fb157703b8fcce2dda1a5
                              • Instruction ID: 8c1cc1f4934353f0674ba8d183ec8aed80e7916768e1bf4bee62979e8a448ee5
                              • Opcode Fuzzy Hash: 7df665d085f366cb99ab2ed896b311d25e2371bb223fb157703b8fcce2dda1a5
                              • Instruction Fuzzy Hash: 8521567061CB088FEB96EB58D884B5A73E1FB98361F204729B087C3156DB78E94487C6
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: malloc
                              • String ID:
                              • API String ID: 2803490479-0
                              • Opcode ID: e53356f1062cacf861271dc336240a7330d37cd7133727a4fd0f385aae3edfcc
                              • Instruction ID: 78540753dbccea6797c2ca2d59d6692395cc1e3a2350492a591d53420f1f2eda
                              • Opcode Fuzzy Hash: e53356f1062cacf861271dc336240a7330d37cd7133727a4fd0f385aae3edfcc
                              • Instruction Fuzzy Hash: BA917D72608A488BE7AD9B18C8893B977D1F785315F34832EE48BC6193DB34D507C785
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: 5cd943b8ec8f82312c43e3a2f06d1ea5450dc20cd0d98dd920086ada27a54906
                              • Instruction ID: 2eb1c0855e7b16ad813ade8e4e22849946df8b9aca7ef8b983d9ede4adde1d53
                              • Opcode Fuzzy Hash: 5cd943b8ec8f82312c43e3a2f06d1ea5450dc20cd0d98dd920086ada27a54906
                              • Instruction Fuzzy Hash: BC01B171328B098FEB8AEB689858BA673E1F795311F204729E09BC2193EB78C5018745
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateOpenValue
                              • String ID: @$@
                              • API String ID: 776291540-149943524
                              • Opcode ID: d0f705a3185ad35ba5479375eab81183ddc54abaa6c67952c2e0273967de8d7a
                              • Instruction ID: 5f67b2315e496ab0a3b1527e7718bab2e154f049c268af38ca2914369db603ae
                              • Opcode Fuzzy Hash: d0f705a3185ad35ba5479375eab81183ddc54abaa6c67952c2e0273967de8d7a
                              • Instruction Fuzzy Hash: 16519071608B0C4FE755EF6898897AAB3E1F794311F204B2EE48BC3262DF7498458746
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2213313332.00007FF79CD81000.00000040.00000001.01000000.00000008.sdmp, Offset: 00007FF79CD81000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_7ff79cd81000_khle.jbxd
                              Similarity
                              • API ID: Virtual$Alloc$Free$Protect
                              • String ID: ,
                              • API String ID: 1004437363-3772416878
                              • Opcode ID: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                              • Instruction ID: 22f60d1aa4a307364d828ceab160d82705bf33250d883d653cc44cac86eeda11
                              • Opcode Fuzzy Hash: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                              • Instruction Fuzzy Hash: E051C53060CB094BDB54EF2CD886679B7E1FB88310F50563EE88EC3245DA74E8468BD1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: free$CloseHandle
                              • String ID: ,
                              • API String ID: 4080011421-3772416878
                              • Opcode ID: 5797dcfcb43276d353d1c4b34606bb2198c28a6318ae347a702950fb364732a2
                              • Instruction ID: 737c1fbbb0f9434926c76fd6fe8ab7919d13d7c6aea85ee9e471b2f9dc763120
                              • Opcode Fuzzy Hash: 5797dcfcb43276d353d1c4b34606bb2198c28a6318ae347a702950fb364732a2
                              • Instruction Fuzzy Hash: 8551C97060CB448FD795EB68D8897AA77E1FB94320F24871DE48AC3293DB74D942C785
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: calloc
                              • String ID: 0$@
                              • API String ID: 2635317215-1545510068
                              • Opcode ID: 594431a24205e52c40ea0963e4db5182c8664f3d2c16e5dd9bfc22cb73e7d0d0
                              • Instruction ID: 2a385d929597cf0e914dc892d2c42981d80a71910031be452048e1341da4d3bb
                              • Opcode Fuzzy Hash: 594431a24205e52c40ea0963e4db5182c8664f3d2c16e5dd9bfc22cb73e7d0d0
                              • Instruction Fuzzy Hash: 8F51F67061CB084FEB95EB28D49D7AA77D1FB98351F20872DD48AC3292EF74C8458782
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: NJI@
                              • API String ID: 0-1894075864
                              • Opcode ID: b44a22c076ccd1acb9e2f8e5ba2d76a45960d7bbffd51b82d392d0dff46be180
                              • Instruction ID: 977768276129bb90ab2fea6ecdb2fe00ca3b04b4eeb38d6192fc18fa5b19483f
                              • Opcode Fuzzy Hash: b44a22c076ccd1acb9e2f8e5ba2d76a45960d7bbffd51b82d392d0dff46be180
                              • Instruction Fuzzy Hash: 49E1417051C7D48BD7769B2598953EBBBE0FB89702F108A2EE4CBC2252DB349501DB83
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateMappingView
                              • String ID:
                              • API String ID: 3452162329-0
                              • Opcode ID: 5fec29907ddb1701cf10de724f589e78f00012b775457189f3dd736ffc916fed
                              • Instruction ID: 8e703bb71b3f377323bb9e92b14da9eb436544d644563cd36b33b5a9aedda701
                              • Opcode Fuzzy Hash: 5fec29907ddb1701cf10de724f589e78f00012b775457189f3dd736ffc916fed
                              • Instruction Fuzzy Hash: 61C19470618B084FDB9AEF6898897EA73D1EB94311F20872DE44BC3297EF34D5468785
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: Virtual$ErrorFreeFunctionModeProtectTable
                              • String ID:
                              • API String ID: 3431440644-0
                              • Opcode ID: b9fa2546218daecafac8371862f5133473872b13f594cfe74a88cb58fc4cacee
                              • Instruction ID: ef6ada675f89dcba031c126740821522f2fbf8917905be1a4d2bd7edd9bc4257
                              • Opcode Fuzzy Hash: b9fa2546218daecafac8371862f5133473872b13f594cfe74a88cb58fc4cacee
                              • Instruction Fuzzy Hash: 09317270218B484FEB8AFB68D889BAA73D5EB94311F704719B44BC7193DF24DA418749
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationToken
                              • String ID:
                              • API String ID: 4114910276-0
                              • Opcode ID: f2a1e79b7b26677e822afdf5a4e6683d0756c7f32a7c3fa8149006c40cea31b1
                              • Instruction ID: a087e39c42794a0c245018a93c1bb5b1cd167ff7fb8a7b22461c63e22db76081
                              • Opcode Fuzzy Hash: f2a1e79b7b26677e822afdf5a4e6683d0756c7f32a7c3fa8149006c40cea31b1
                              • Instruction Fuzzy Hash: 8511B4342086499FDB85EF64D8D8A6A77E2FB98305F204A29E847C7261DB78E944CB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2213313332.00007FF79CD81000.00000040.00000001.01000000.00000008.sdmp, Offset: 00007FF79CD81000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_7ff79cd81000_khle.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                              • Instruction ID: e87f29f08954a852e30c78c8f70d20385d07e75640c53fd901a686c0cd8d9864
                              • Opcode Fuzzy Hash: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                              • Instruction Fuzzy Hash: 3D91B07061C7828FD7A0DB28C581B2ABBF0FF8A308F54193EF589C7291D635E8449B16
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: c382783190e2699510103071945f14469c23df6a9e14ed2142866911cb1ccdc2
                              • Instruction ID: 8f38fcd9b526c0a6f25053100a2d11f0ef10b767ceac62116bb509c999dedad8
                              • Opcode Fuzzy Hash: c382783190e2699510103071945f14469c23df6a9e14ed2142866911cb1ccdc2
                              • Instruction Fuzzy Hash: D131B3B1608B4C8FF7A6EF28D44879BB7E1FB94315F604A2DA18AC3152DB348544CB86
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: fd13a936f88e8be3d3c1b5e1ebd4b6078f4080b08cf0cb1db8c120c48f9afd6e
                              • Instruction ID: abe6092001185098652f8424a48657f7cdc58dd888076b78c1f3717195af57ed
                              • Opcode Fuzzy Hash: fd13a936f88e8be3d3c1b5e1ebd4b6078f4080b08cf0cb1db8c120c48f9afd6e
                              • Instruction Fuzzy Hash: BB01A460224B484BE795E72884897BA73D9FB54315F708729E48BC3193EF24C6448747
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: FunctionTable
                              • String ID:
                              • API String ID: 1252446317-0
                              • Opcode ID: bc689134c4cfe8144a64a4e0970b0539573de333fb4e1730050f8c92ab09a126
                              • Instruction ID: 9c7b3e000e8e8cd7b41bcbb5f8156e1f967effbe99272255ce8140de1b6f5426
                              • Opcode Fuzzy Hash: bc689134c4cfe8144a64a4e0970b0539573de333fb4e1730050f8c92ab09a126
                              • Instruction Fuzzy Hash: C9E012741109055BEBA8D71DC81D3A036D0E76831AF74836DA401C6292CB7DC497CE42
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 1c01f51b02100d5787d3c740cd9cf9adac7cf30a888cb21a2aefd7a5d9ca2737
                              • Instruction ID: f8fc97274ffe29934821be141a78bc4c626c19fe8df8e5b8784327c9e7dfe54c
                              • Opcode Fuzzy Hash: 1c01f51b02100d5787d3c740cd9cf9adac7cf30a888cb21a2aefd7a5d9ca2737
                              • Instruction Fuzzy Hash: 87318370214A094FFB89EF29D499B7673E5FB98351F218269E81AC72A7DB34D841CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcmpi
                              • String ID:
                              • API String ID: 1586166983-0
                              • Opcode ID: 227dcba3b2cb73bb29811a929ed74bd779d041a6fbe6ede9585de0365d398b59
                              • Instruction ID: 471ebe16174f34f6fec284ba17dd8f9973fee488354e9245a3b6f71fbc604433
                              • Opcode Fuzzy Hash: 227dcba3b2cb73bb29811a929ed74bd779d041a6fbe6ede9585de0365d398b59
                              • Instruction Fuzzy Hash: 52213270714A098FFBEBA778A95E3A636D1FB94221F74C3659047C71ABEF24C9048744
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID: ,$,
                              • API String ID: 1778838933-220654547
                              • Opcode ID: a0299abcad1f0eeb53ce8430316abf2ed11eb634f56fbeef89e460d6d348ee9f
                              • Instruction ID: 7ae9a4440ff3c391f06810fda382e7fa1bfbc4be66ab9518b2e4248f76f8e4e9
                              • Opcode Fuzzy Hash: a0299abcad1f0eeb53ce8430316abf2ed11eb634f56fbeef89e460d6d348ee9f
                              • Instruction Fuzzy Hash: F0827270618B088FD7AAEF64988979A73D1FB98311F20872DD49BC3293DF34D9458B85
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000003.2213313332.00007FF79CD81000.00000040.00000001.01000000.00000008.sdmp, Offset: 00007FF79CD81000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_7ff79cd81000_khle.jbxd
                              Similarity
                              • API ID:
                              • String ID: +Y0+
                              • API String ID: 0-1189096879
                              • Opcode ID: 700d9b7284bfbab16c442717931a76e877bd874bda736dc46fcea473d1972563
                              • Instruction ID: e0d31dd33efd7fe12e200a721431a6a19798a02f0500b3b65c3c78917e3a819f
                              • Opcode Fuzzy Hash: 700d9b7284bfbab16c442717931a76e877bd874bda736dc46fcea473d1972563
                              • Instruction Fuzzy Hash: BD31472580C6C68FDB276B3489651E1BFB0EF2736474D22FDC8D55F8A3CA146589C741
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 96607074e16f4868b5be774e877e5912d3aaae97ba57364b39b2a72336f57c8b
                              • Instruction ID: 58ac177b776485b371a5874644189c0c1dc9b001381070387281a73ac3ec71c1
                              • Opcode Fuzzy Hash: 96607074e16f4868b5be774e877e5912d3aaae97ba57364b39b2a72336f57c8b
                              • Instruction Fuzzy Hash: B22246A01183558EFBAF8B6880A93F13BC1EB56726F38A35DC9E7871C3D71984078759
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7508843e0d615cd037e1ec8aa7846b8b8c4448116137d463d462d581942205d
                              • Instruction ID: c31774bc59e939b2f78d650e67f31fca5948dba2b7429ebe022c3dc7f1813150
                              • Opcode Fuzzy Hash: f7508843e0d615cd037e1ec8aa7846b8b8c4448116137d463d462d581942205d
                              • Instruction Fuzzy Hash: 4512D260358A2407EB5E5A2C999F37832C2E385326F34933DDDC7C15CBE928D5A385CA
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80022000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80022000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80022000_khle.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 31879db383ebb8d5dde9c040e419a0f231d7ef384da0a7eea47c253b5ee4a878
                              • Instruction ID: f44a30486c767db3e09b12a4da2ce9e6eddfda4ab4efa971aedc6772a41b00c4
                              • Opcode Fuzzy Hash: 31879db383ebb8d5dde9c040e419a0f231d7ef384da0a7eea47c253b5ee4a878
                              • Instruction Fuzzy Hash: 2F62689284E7C29FD7138B344CBA284BFB06E23214B6D86DFC4C14B4E3E249955AD767
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 11f99f4912cc1f7b5290a762f61ca7177c15b4b468f00e92ea1a3a253ec1089c
                              • Instruction ID: 3b92a833984696aef6fac6f38834fc80f7e5222d84c76a0836dfd9a41a5e6a7d
                              • Opcode Fuzzy Hash: 11f99f4912cc1f7b5290a762f61ca7177c15b4b468f00e92ea1a3a253ec1089c
                              • Instruction Fuzzy Hash: C79181B1A6C3444BD35CCE189C861BAB3D5F7C6215F24953DE9CBC3302EA31E5078A8A
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a97ef2a92983f2fd7f4c0e136ef4c983bbffc174d00ebbc24951b3730f05a3cb
                              • Instruction ID: b4567796fd33695ba9687d6d32588d322c0b1d555ee228d1a898d887f36773d6
                              • Opcode Fuzzy Hash: a97ef2a92983f2fd7f4c0e136ef4c983bbffc174d00ebbc24951b3730f05a3cb
                              • Instruction Fuzzy Hash: 63A18FB26687448BD35CDE1CDC82666B3D5FB8A319F14457DE4CBC3242DA34E8478A86
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ef0da2dc336cb695c55fe7557c083638bce03003c3af981621f0897e44abfbe7
                              • Instruction ID: 015f4afd605f5d9870bc06dbcbbd565906004c0a7b49f90de311cbe7ae4c87e0
                              • Opcode Fuzzy Hash: ef0da2dc336cb695c55fe7557c083638bce03003c3af981621f0897e44abfbe7
                              • Instruction Fuzzy Hash: D661273011CB884FE76BE72884997EAB7E1FB95310F74876DE48BC31C3CA2585068786
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 442b0520738e8f0b26db511281fac152362a0c0e853cfc2e2b038376264e2d07
                              • Instruction ID: deaf14328648b22888cebcb385940640b83346a6dda6ca2be32c69e73a751e7e
                              • Opcode Fuzzy Hash: 442b0520738e8f0b26db511281fac152362a0c0e853cfc2e2b038376264e2d07
                              • Instruction Fuzzy Hash: A541D970719A494BEB49DB2C48C975477D1EB9A220F6443AAEC46CB287CA14D985C3D1
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6b7480ddab4bcce6f18969b185a19d6807d5f220cd067d20dfcfaf6ebbcfae67
                              • Instruction ID: 6300347f79594979333ab494b5635e83848432fb27311e865bef73749de1bcd8
                              • Opcode Fuzzy Hash: 6b7480ddab4bcce6f18969b185a19d6807d5f220cd067d20dfcfaf6ebbcfae67
                              • Instruction Fuzzy Hash: 88418E1521DAC59EC70ACF6C4490095FFB0EBAA100B1C83DEE8D9CB747C204E65AC7B6
                              Memory Dump Source
                              • Source File: 00000009.00000003.2220822901.0000020C80011000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C80011000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_3_20c80011000_khle.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6b50c900da5022cad283dbc281507a62b1ab019ef7b026ae36db7c57b1c850c6
                              • Instruction ID: 029fcb978df3219ad2c740e6e2b4b54a2f40df6ea8edb9ba315ed67093adb35b
                              • Opcode Fuzzy Hash: 6b50c900da5022cad283dbc281507a62b1ab019ef7b026ae36db7c57b1c850c6
                              • Instruction Fuzzy Hash: 1F11B9E584E7C15FD39787789C247A17FF16F13226F2E41EAC4C14E0A3E2684846CBA6

                              Execution Graph

                              Execution Coverage:2.8%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:10.2%
                              Total number of Nodes:206
                              Total number of Limit Nodes:6
                              execution_graph 11140 16655edb374 11141 16655edb419 bind 11140->11141 11142 16655edb398 socket 11140->11142 11146 16655edb3b0 11141->11146 11143 16655edb3cb 11142->11143 11142->11146 11143->11146 11147 16655edaf84 ioctlsocket 11143->11147 11145 16655edb415 11145->11141 11145->11146 11148 16655edafd9 CreateIoCompletionPort 11147->11148 11151 16655edafc1 11147->11151 11149 16655edaff1 11148->11149 11150 16655edb026 SetFileCompletionNotificationModes 11149->11150 11149->11151 11150->11151 11151->11145 11152 16655ed46d4 11154 16655ed46ff 11152->11154 11153 16655ed4872 11154->11153 11158 16655ed4464 11154->11158 11156 16655ed47aa 11156->11153 11167 16655edaa00 11156->11167 11159 16655ed4492 11158->11159 11160 16655ed44a0 RegOpenKeyExW 11159->11160 11161 16655ed44d2 RegQueryValueExW 11160->11161 11162 16655ed452f 11160->11162 11163 16655ed4524 RegCloseKey 11161->11163 11164 16655ed450d 11161->11164 11165 16655ed4546 GetVolumeInformationW 11162->11165 11166 16655ed4597 11162->11166 11163->11162 11164->11163 11165->11166 11166->11156 11170 16655edaa1d 11167->11170 11168 16655edaa2c 11168->11153 11170->11168 11172 16655edc5bc 11170->11172 11176 16655edc078 11170->11176 11173 16655edc5d3 11172->11173 11174 16655edc613 setsockopt 11173->11174 11175 16655edc63a 11173->11175 11174->11175 11175->11170 11178 16655edc0a5 11176->11178 11179 16655edc147 11176->11179 11178->11170 11179->11178 11180 16655edb80c 11179->11180 11181 16655edb831 11180->11181 11182 16655edb86b WSARecv 11181->11182 11183 16655edb8b5 11182->11183 11183->11178 11184 16655edc770 11185 16655edc78b 11184->11185 11187 16655edc7a4 11184->11187 11186 16655edc792 shutdown 11185->11186 11185->11187 11186->11187 11188 16655edc87e closesocket 11187->11188 11189 16655edc890 11187->11189 11188->11189 11190 16655edae50 11191 16655edae73 11190->11191 11193 16655edae62 11190->11193 11191->11193 11194 16655edbe14 11191->11194 11195 16655edbe5c 11194->11195 11196 16655edbe9b WSASend 11195->11196 11197 16655edbed9 11196->11197 11197->11193 11310 16655ed1f70 11311 16655ed1f8d 11310->11311 11312 16655ed203b 11311->11312 11313 16655ed2011 11311->11313 11316 16655ed1f92 11311->11316 11325 16655ed1de0 11312->11325 11313->11316 11317 16655ed1ca8 11313->11317 11318 16655ed1cbe 11317->11318 11319 16655ed1ccc 11317->11319 11318->11319 11321 16655ed5930 4 API calls 11318->11321 11320 16655ed1cee 11319->11320 11322 16655ed5930 4 API calls 11319->11322 11324 16655ed1d07 11320->11324 11329 16655ed6b00 11320->11329 11321->11319 11322->11320 11326 16655ed1e1e 11325->11326 11327 16655ed1e02 11325->11327 11326->11327 11333 16655ed5a9c 11326->11333 11327->11316 11330 16655ed9f44 11329->11330 11331 16655ed9f92 11330->11331 11332 16655edc770 2 API calls 11330->11332 11331->11324 11332->11331 11335 16655ed5aab 11333->11335 11334 16655edaddf 11334->11327 11335->11334 11337 16655edb9e4 11335->11337 11339 16655edba0f 11337->11339 11338 16655edba5d 11338->11334 11339->11338 11340 16655edb80c WSARecv 11339->11340 11340->11338 11205 16655edb80c 11206 16655edb831 11205->11206 11207 16655edb86b WSARecv 11206->11207 11208 16655edb8b5 11207->11208 11213 16655ed4628 11214 16655ed4638 11213->11214 11216 16655ed465a 11214->11216 11226 16655ed42b8 11214->11226 11217 16655ed4658 11216->11217 11222 16655ed31d4 11216->11222 11218 16655ed464c 11218->11216 11219 16655ed4650 11218->11219 11230 16655ed3b7c 11219->11230 11223 16655ed31f6 11222->11223 11234 16655ed5b84 11223->11234 11225 16655ed32f5 11225->11217 11227 16655ed42f3 11226->11227 11228 16655ed4335 getaddrinfo 11227->11228 11229 16655ed4359 11228->11229 11229->11218 11231 16655ed3ba4 11230->11231 11232 16655ed9f44 2 API calls 11231->11232 11233 16655ed3c2e 11231->11233 11232->11233 11233->11217 11235 16655ed5baa 11234->11235 11236 16655ed5bc1 11235->11236 11237 16655ed5c18 11235->11237 11242 16655ed5bb2 11235->11242 11236->11242 11251 16655edcad4 11236->11251 11243 16655edca84 11237->11243 11240 16655ed5c16 11240->11242 11247 16655ed5930 11240->11247 11242->11225 11244 16655edca8e 11243->11244 11245 16655edcaaa 11243->11245 11244->11245 11255 16655edba68 11244->11255 11245->11240 11249 16655ed5942 11247->11249 11250 16655ed595b 11249->11250 11273 16655ed588c 11249->11273 11250->11242 11252 16655edcaeb 11251->11252 11253 16655edcb18 11251->11253 11252->11253 11295 16655edbc38 11252->11295 11253->11240 11256 16655edbaa6 11255->11256 11258 16655edba8e 11255->11258 11256->11258 11259 16655edc9d8 11256->11259 11258->11245 11260 16655edc9e2 11259->11260 11261 16655edc9fc 11259->11261 11260->11261 11263 16655edb464 11260->11263 11261->11258 11266 16655edb374 11263->11266 11265 16655edb495 11265->11261 11267 16655edb419 bind 11266->11267 11268 16655edb398 socket 11266->11268 11272 16655edb3b0 11267->11272 11269 16655edb3cb 11268->11269 11268->11272 11270 16655edaf84 3 API calls 11269->11270 11269->11272 11271 16655edb415 11270->11271 11271->11267 11271->11272 11272->11265 11274 16655ed58a8 11273->11274 11278 16655ed58b9 11274->11278 11279 16655edf1ec 11274->11279 11277 16655ed591d 11277->11250 11285 16655ed9f44 11278->11285 11280 16655edf1f5 11279->11280 11282 16655edf290 11279->11282 11281 16655edf236 free 11280->11281 11283 16655edf243 11280->11283 11281->11283 11282->11278 11283->11282 11284 16655edf27c free 11283->11284 11284->11282 11286 16655ed9f62 11285->11286 11288 16655ed9f92 11285->11288 11286->11288 11289 16655edc770 11286->11289 11288->11277 11290 16655edc78b 11289->11290 11292 16655edc7a4 11289->11292 11291 16655edc792 shutdown 11290->11291 11290->11292 11291->11292 11293 16655edc87e closesocket 11292->11293 11294 16655edc890 11292->11294 11293->11294 11294->11288 11296 16655edbc76 11295->11296 11298 16655edbc5e 11295->11298 11296->11298 11299 16655edca28 11296->11299 11298->11253 11300 16655edca5a 11299->11300 11301 16655edca37 11299->11301 11300->11298 11301->11300 11303 16655edb4a8 11301->11303 11304 16655edb374 5 API calls 11303->11304 11305 16655edb4f1 11304->11305 11305->11300 11198 16655eda940 SetErrorMode 11199 16655eda954 11198->11199 11200 16655eddcce socket 11199->11200 11201 16655eddd12 getsockopt 11200->11201 11202 16655eddd5b socket 11200->11202 11201->11202 11204 16655eddd7b 11202->11204 11380 16655ed1ee0 11381 16655ed1efd 11380->11381 11382 16655ed1f02 11381->11382 11383 16655ed1f4f 11381->11383 11386 16655ed1f24 11381->11386 11384 16655ed1ca8 4 API calls 11382->11384 11382->11386 11385 16655ed1de0 WSARecv 11383->11385 11384->11386 11385->11386 11209 16655ed42fc 11210 16655ed4359 11209->11210 11211 16655ed4311 11209->11211 11212 16655ed4335 getaddrinfo 11211->11212 11212->11210 11306 16655ed2a9c 11307 16655ed2ab2 11306->11307 11309 16655ed2ab7 11306->11309 11308 16655ed5930 4 API calls 11307->11308 11308->11309 11341 16655ed315c 11342 16655ed3179 11341->11342 11343 16655ed31bd 11342->11343 11345 16655ed318b 11342->11345 11348 16655ed2fa8 11343->11348 11347 16655ed1ca8 4 API calls 11345->11347 11346 16655ed31bb 11347->11346 11349 16655ed3033 11348->11349 11350 16655ed30f0 11349->11350 11351 16655ed30f7 11349->11351 11352 16655ed1ca8 4 API calls 11350->11352 11355 16655ed2e4c 11351->11355 11354 16655ed30f5 11352->11354 11354->11346 11356 16655ed2eaf 11355->11356 11357 16655ed5a9c WSARecv 11356->11357 11358 16655ed2f99 11357->11358 11358->11354 11370 16655ed2afc 11371 16655ed2b13 11370->11371 11374 16655ed2b3d 11370->11374 11372 16655ed5930 4 API calls 11371->11372 11373 16655ed2b18 11372->11373 11374->11373 11376 16655ed5ad0 11374->11376 11377 16655ed5ae3 11376->11377 11378 16655ed5a9c WSARecv 11377->11378 11379 16655ed5aec 11377->11379 11378->11379 11379->11373 11366 16655ed2739 11367 16655ed2761 11366->11367 11368 16655ed2766 11367->11368 11369 16655ed1ca8 4 API calls 11367->11369 11369->11368

                              Control-flow Graph

                              APIs
                              • socket.WS2_32(?,?,?,?,?,?,?,?,0000006B,0000006A,-00000002,0000016655EDB495), ref: 0000016655EDB3A1
                                • Part of subcall function 0000016655EDAF84: ioctlsocket.WS2_32 ref: 0000016655EDAFB0
                              • bind.WS2_32(?,?,?,?,?,?,?,?,0000006B,0000006A,-00000002,0000016655EDB495), ref: 0000016655EDB426
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: bindioctlsocketsocket
                              • String ID:
                              • API String ID: 3555158474-0
                              • Opcode ID: 7bf22dbbf28290d007348e7a12ca3bc168bbabb4c51e94198c4e520b8ad4573a
                              • Instruction ID: 81870bf59410112695991ac16542a3efa36836f2b44623489a04a5708e13a5d7
                              • Opcode Fuzzy Hash: 7bf22dbbf28290d007348e7a12ca3bc168bbabb4c51e94198c4e520b8ad4573a
                              • Instruction Fuzzy Hash: B321A3307049044FEB58AF78AC8E3A573D5EB99366F20467DE82BC62D1EF258C458652

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: Recv
                              • String ID:
                              • API String ID: 4192927123-0
                              • Opcode ID: 932363085a07e36dce123b02b0fe941d250780e13aa2ee6933dafb70be2f9976
                              • Instruction ID: 7f0e2af5794a270d4b3583bf8a399933e4897b6c39fd65bf9e04380da6fbb181
                              • Opcode Fuzzy Hash: 932363085a07e36dce123b02b0fe941d250780e13aa2ee6933dafb70be2f9976
                              • Instruction Fuzzy Hash: 2E517B70204A898FEBA4EF2DC8897D6B7E4FB98354F50065ED44BC31A1EB36E944CB41
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000003.2221158708.0000016653BC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016653BC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_3_16653bc0000_OpenWith.jbxd
                              Similarity
                              • API ID: Virtual$Alloc$Free$CloseFileHandleProtectView
                              • String ID:
                              • API String ID: 3867569247-0
                              • Opcode ID: ff9d2ba7a0c9f70c7bdc5bf2a784896198b97f8e626e79ac36cfea1478692e2c
                              • Instruction ID: 91781e79c25b2b607787cf778d430f8c1b75c75f5365c2b067db62a4abf2aa16
                              • Opcode Fuzzy Hash: ff9d2ba7a0c9f70c7bdc5bf2a784896198b97f8e626e79ac36cfea1478692e2c
                              • Instruction Fuzzy Hash: E2716731618F0E5BD768EF28D8457AAB7D1FB94750F10462EE58BD3281EB35E8418BC1

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: CloseInformationOpenQueryValueVolume
                              • String ID:
                              • API String ID: 4069062851-0
                              • Opcode ID: b8ed43a9571b0f7ebccdd3b637c35a9fe59a110f66f9ab18e4e522b35e9dadd7
                              • Instruction ID: 261b979d822b275f2d41601c45e514506687031421cc209d85b4a706c01dc4d6
                              • Opcode Fuzzy Hash: b8ed43a9571b0f7ebccdd3b637c35a9fe59a110f66f9ab18e4e522b35e9dadd7
                              • Instruction Fuzzy Hash: 7B413D312187888BE765EF64C899BDBB7E1FBE8340F404A2DA48BC3190DF759505CB82

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: socket$ErrorModegetsockopt
                              • String ID:
                              • API String ID: 552242919-0
                              • Opcode ID: ee64cecfa65e257842176328bb5ab6283e8bc2b376064c12f5c8ade0442f0951
                              • Instruction ID: 4007454f61865fcb5698099c43afe545c4ed9c3056127bd511fa0f19f9f8fa8e
                              • Opcode Fuzzy Hash: ee64cecfa65e257842176328bb5ab6283e8bc2b376064c12f5c8ade0442f0951
                              • Instruction Fuzzy Hash: AF418370618B498FE758EF28DC9D6AA77E1FB99300F50862DE05BC32A1DF388645CB41

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: Completion$CreateFileModesNotificationPortioctlsocket
                              • String ID:
                              • API String ID: 1455841399-0
                              • Opcode ID: 65ed2c9e0bfc7037adb16992d663b78e44cbe33570810552ad04d6a2963fe0a5
                              • Instruction ID: c2db220c03a25dfd6cd18da20a62c94db8101a00487c5e2c4859c717c7c78fca
                              • Opcode Fuzzy Hash: 65ed2c9e0bfc7037adb16992d663b78e44cbe33570810552ad04d6a2963fe0a5
                              • Instruction Fuzzy Hash: EC3194303045588FFBA89F289C8F3B572D9F798395F60106DE857C21D2EB27CD818A95

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: closesocketshutdown
                              • String ID:
                              • API String ID: 572888783-0
                              • Opcode ID: 10782efffb6bb4c42faa2620b59e14120107728f6cfe316cb657f0d951cab143
                              • Instruction ID: 684a23f4f9e6da7b767f2daab15fe193833aeb20fe466e554dea43244c6ef428
                              • Opcode Fuzzy Hash: 10782efffb6bb4c42faa2620b59e14120107728f6cfe316cb657f0d951cab143
                              • Instruction Fuzzy Hash: 1B518D755106858FEB98CF18C8CABA03795FB943E4F5012D9D86BEA1C6D726E881CB80
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000003.2221158708.0000016653BC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016653BC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_3_16653bc0000_OpenWith.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                              • Instruction ID: f2b636883fa7399ae11ebc5cce8c91c73e66e325e14a65ea6db9f7987d7d7ea1
                              • Opcode Fuzzy Hash: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                              • Instruction Fuzzy Hash: 3291CE70618B858FE3A0DB18C481B6ABBF0FB99748F54092DF1CAD7291E736D940DB06

                              Control-flow Graph

                              APIs
                              • free.MSVCRT(?,?,?,?,?,?,?,0000016655ED58B9,?,?,?,?,?,?,?,0000016655ED595B), ref: 0000016655EDF23D
                              • free.MSVCRT(?,?,?,?,?,?,?,0000016655ED58B9), ref: 0000016655EDF280
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: ed78e059cc3bfed3b258e1737c439938a1c021539ed4627a6dbabb7bd182a94a
                              • Instruction ID: 3979d1c08101a1e3aff40c51533cb7b2be8527c261bc6b38daf964980bad7c84
                              • Opcode Fuzzy Hash: ed78e059cc3bfed3b258e1737c439938a1c021539ed4627a6dbabb7bd182a94a
                              • Instruction Fuzzy Hash: 0E31CC342149468BEF88EB69DCAA7E93391FF95341F44407C581BCA6DBCE26DC45CB40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 172 16655edbe14-16655edbe6f call 16655ed6b2e * 2 177 16655edbe71-16655edbe98 172->177 178 16655edbe9b-16655edbed3 WSASend 172->178 177->178 179 16655edbf60-16655edbf6b 178->179 180 16655edbed9-16655edbede 178->180 183 16655edbf87-16655edbf94 179->183 192 16655edbf6d-16655edbf82 call 16655edc900 179->192 182 16655edbee4-16655edbf02 180->182 180->183 187 16655edbf04-16655edbf09 182->187 188 16655edbf1d-16655edbf45 182->188 185 16655edbfa6-16655edbfc0 183->185 186 16655edbf96-16655edbfa4 183->186 193 16655edbfc2-16655edbfc7 185->193 194 16655edbfdb-16655edc001 185->194 186->185 186->186 187->188 189 16655edbf0b-16655edbf13 187->189 190 16655edc060-16655edc061 188->190 191 16655edbf4b-16655edbf5b 188->191 189->188 196 16655edbf15-16655edbf19 189->196 197 16655edc064-16655edc065 190->197 191->197 201 16655edc06a-16655edc074 192->201 193->194 195 16655edbfc9-16655edbfd1 193->195 198 16655edc003-16655edc033 194->198 199 16655edc068 194->199 195->194 200 16655edbfd3-16655edbfd7 195->200 196->188 197->199 198->199 205 16655edc035-16655edc03d 198->205 199->201 200->194 208 16655edc03f-16655edc045 205->208 209 16655edc047-16655edc050 205->209 212 16655edc055-16655edc058 208->212 209->212 212->190
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: Send
                              • String ID:
                              • API String ID: 121738739-0
                              • Opcode ID: afd922a78396e696f6d15eef1fd042df83d9ab22cc0fc1654582db5b6017f80d
                              • Instruction ID: 483c4d6591db568aff975ee0b4fbe5500565eec90d9e389cf31fc80c4d5e14a3
                              • Opcode Fuzzy Hash: afd922a78396e696f6d15eef1fd042df83d9ab22cc0fc1654582db5b6017f80d
                              • Instruction Fuzzy Hash: CD818D70604B498FEB98DF28C889BA5B7E4FB98354F10426DD84EC7691EB32D854CF81

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: getaddrinfo
                              • String ID:
                              • API String ID: 300660673-0
                              • Opcode ID: a500b73e25499eaa65d5b84535ebddc4b37412dbff4cd7b7c791b878b57fc104
                              • Instruction ID: bb24db3d5d23229aee1efa8dc208ad8b54191d24fde589b4cf6ab56039fa9091
                              • Opcode Fuzzy Hash: a500b73e25499eaa65d5b84535ebddc4b37412dbff4cd7b7c791b878b57fc104
                              • Instruction Fuzzy Hash: D841B5302149488FDB68EF2CDC896E9B3E1FBA8350F50835EE84BCB195DA71D985C781

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 278 16655edc5bc-16655edc5d1 279 16655edc5d3-16655edc5d8 278->279 280 16655edc5f0-16655edc60d 278->280 279->280 281 16655edc5da-16655edc5dc 279->281 282 16655edc613-16655edc638 setsockopt 280->282 283 16655edc699 call 16655eddde8 280->283 281->280 284 16655edc5de-16655edc5e6 281->284 285 16655edc691-16655edc697 282->285 286 16655edc63a-16655edc68f 282->286 290 16655edc69e-16655edc6a8 call 16655edc900 283->290 284->280 288 16655edc5e8-16655edc5ec 284->288 285->290 289 16655edc6ad-16655edc6bc 286->289 288->280 295 16655edc6be-16655edc6c2 289->295 296 16655edc6da-16655edc6e1 289->296 290->289 295->296 297 16655edc6c4-16655edc6c6 295->297 297->296 298 16655edc6c8-16655edc6d7 297->298 298->296
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: setsockopt
                              • String ID:
                              • API String ID: 3981526788-0
                              • Opcode ID: 6ee79d1b67084b77555383ea072f899fd601fabc88a06dee2947375c0305650d
                              • Instruction ID: 7ff24bce5833cefe2fa9fb82df1204299c15d1042b0d0c3b36f5f85a82abef67
                              • Opcode Fuzzy Hash: 6ee79d1b67084b77555383ea072f899fd601fabc88a06dee2947375c0305650d
                              • Instruction Fuzzy Hash: 0C3160705046458FEB98DF18C48979077E0FB983A8F2412ADD86EDB2D6DB31C881CB41

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 299 16655ed42fc-16655ed430f 300 16655ed4311-16655ed4353 call 16655ed1000 call 16655ed6b2e getaddrinfo 299->300 301 16655ed4359-16655ed435b 299->301 300->301 303 16655ed4361-16655ed436b 301->303 304 16655ed43e6-16655ed4405 call 16655ed6bd0 301->304 307 16655ed436d-16655ed4371 303->307 308 16655ed437c-16655ed4382 303->308 311 16655ed4373-16655ed437a 307->311 312 16655ed4395-16655ed43b8 call 16655ed1000 307->312 313 16655ed4384-16655ed4388 308->313 314 16655ed43e0 308->314 311->307 311->308 320 16655ed43c2-16655ed43c6 312->320 321 16655ed43ba-16655ed43c0 312->321 313->312 317 16655ed438a-16655ed4391 313->317 314->304 317->313 319 16655ed4393 317->319 319->314 322 16655ed43ca-16655ed43d9 320->322 321->322 322->314
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.3398178483.0000016655ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000016655ED1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_16655ed1000_OpenWith.jbxd
                              Similarity
                              • API ID: getaddrinfo
                              • String ID:
                              • API String ID: 300660673-0
                              • Opcode ID: cd81e3bf29ab49c02dca13648c0c9cc34c5d817db0fb04804eda45a9c7d0a72f
                              • Instruction ID: cce335c06f6fe173b0300d20abf2fd01a4c70bf44f83284c1f85701ed2693e68
                              • Opcode Fuzzy Hash: cd81e3bf29ab49c02dca13648c0c9cc34c5d817db0fb04804eda45a9c7d0a72f
                              • Instruction Fuzzy Hash: A821B33021458D8BDF64EF18DC8A6E977D2FBE8390F54822DD80BCB146D671C945C781