Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iFD9jPLjXC.exe

Overview

General Information

Sample name:iFD9jPLjXC.exe
renamed because original name is a hash value
Original sample name:f1d2ceaf32e6e7f864e31faafdeb308653a10fa177c55ab0af111ad6affe58e5.exe
Analysis ID:1548564
MD5:732bba29e4283036d0fce29331d71577
SHA1:c2a5ef70e605a4dd1f12f5e28511b85a357c0ea6
SHA256:f1d2ceaf32e6e7f864e31faafdeb308653a10fa177c55ab0af111ad6affe58e5
Tags:79-124-58-130exeuser-JAMESWT_MHT
Infos:

Detection

SystemBC
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected SystemBC
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Machine Learning detection for sample
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Powershell In Registry Run Keys
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • iFD9jPLjXC.exe (PID: 2428 cmdline: "C:\Users\user\Desktop\iFD9jPLjXC.exe" MD5: 732BBA29E4283036D0FCE29331D71577)
  • powershell.exe (PID: 348 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • iFD9jPLjXC.exe (PID: 3372 cmdline: "C:\Users\user\Desktop\iFD9jPLjXC.exe" MD5: 732BBA29E4283036D0FCE29331D71577)
  • powershell.exe (PID: 1352 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • iFD9jPLjXC.exe (PID: 3560 cmdline: "C:\Users\user\Desktop\iFD9jPLjXC.exe" MD5: 732BBA29E4283036D0FCE29331D71577)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SystemBCSystemBC is a proxy malware leveraging SOCKS5. Based on screenshots used in ads on a underground marketplace, Proofpoint decided to call it SystemBC.SystemBC has been observed occasionally, but more pronounced since June 2019. First samples goes back to October 2018.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.systembc
{"NDATAHOST1": "79.124.58.130", "HOST2": "79.124.58.130", "PORT1": "4378"}
SourceRuleDescriptionAuthorStrings
iFD9jPLjXC.exeJoeSecurity_SystemBCYara detected SystemBCJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SystemBCYara detected SystemBCJoe Security
      00000004.00000000.2215297855.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SystemBCYara detected SystemBCJoe Security
        00000008.00000000.2279848208.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SystemBCYara detected SystemBCJoe Security
          00000000.00000000.2068186380.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SystemBCYara detected SystemBCJoe Security
            00000004.00000002.3922921994.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SystemBCYara detected SystemBCJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.0.iFD9jPLjXC.exe.400000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
                4.2.iFD9jPLjXC.exe.400000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
                  4.0.iFD9jPLjXC.exe.400000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
                    0.2.iFD9jPLjXC.exe.400000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
                      8.2.iFD9jPLjXC.exe.400000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
                        Click to see the 1 entries
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: powershell.exe -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\iFD9jPLjXC.exe, ProcessId: 2428, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5
                        Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: powershell.exe -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\iFD9jPLjXC.exe, ProcessId: 2428, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'", ProcessId: 348, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-04T16:38:41.941211+010020229301A Network Trojan was detected20.12.23.50443192.168.2.549707TCP
                        2024-11-04T16:39:20.350354+010020229301A Network Trojan was detected20.12.23.50443192.168.2.549922TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: iFD9jPLjXC.exeAvira: detected
                        Source: iFD9jPLjXC.exeMalware Configuration Extractor: SystemBC {"NDATAHOST1": "79.124.58.130", "HOST2": "79.124.58.130", "PORT1": "4378"}
                        Source: iFD9jPLjXC.exeReversingLabs: Detection: 73%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                        Source: iFD9jPLjXC.exeJoe Sandbox ML: detected
                        Source: iFD9jPLjXC.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: 79.124.58.130
                        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 79.124.58.130:4378
                        Source: Joe Sandbox ViewASN Name: TAMATIYA-ASBG TAMATIYA-ASBG
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.5:49707
                        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.5:49922
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 79.124.58.130
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeCode function: 0_2_0040146A VirtualAlloc,CreateEventA,GetUserNameExA,GetVolumeInformationA,select,recv,LocalAlloc,socket,socket,setsockopt,CreateThread,recv,CloseHandle,VirtualFree,ExitProcess,0_2_0040146A
                        Source: iFD9jPLjXC.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        Source: classification engineClassification label: mal92.troj.winEXE@9/9@0/1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF420415.TMP
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_03
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5cd0pvp.0hv.ps1Jump to behavior
                        Source: iFD9jPLjXC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: iFD9jPLjXC.exeReversingLabs: Detection: 73%
                        Source: unknownProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: wsock32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: wsock32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: wsock32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

                        Data Obfuscation

                        barindex
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run socks5 powershell.exe -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run socks5Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run socks5Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2042Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1282Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 962
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 529
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-388
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exe TID: 4448Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exe TID: 4448Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6656Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exe TID: 1848Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2300Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exe TID: 3920Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeThread delayed: delay time: 180000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                        Source: iFD9jPLjXC.exe, 00000000.00000002.3923120423.000000000073E000.00000004.00000020.00020000.00000000.sdmp, iFD9jPLjXC.exe, 00000004.00000002.3923145473.0000000000758000.00000004.00000020.00020000.00000000.sdmp, iFD9jPLjXC.exe, 00000008.00000002.3923080951.0000000000508000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeAPI call chain: ExitProcess graph end nodegraph_0-387
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeAPI call chain: ExitProcess graph end nodegraph_0-480
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\iFD9jPLjXC.exe "C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\iFD9jPLjXC.exeCode function: 0_2_0040146A VirtualAlloc,CreateEventA,GetUserNameExA,GetVolumeInformationA,select,recv,LocalAlloc,socket,socket,setsockopt,CreateThread,recv,CloseHandle,VirtualFree,ExitProcess,0_2_0040146A

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: iFD9jPLjXC.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.2215297855.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.2279848208.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2068186380.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3922921994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.3922944930.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: iFD9jPLjXC.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.iFD9jPLjXC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.2215297855.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.2279848208.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2068186380.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3922921994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.3922944930.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        PowerShell
                        11
                        Registry Run Keys / Startup Folder
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping1
                        Security Software Discovery
                        Remote ServicesData from Local System1
                        Non-Standard Port
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        11
                        Registry Run Keys / Startup Folder
                        21
                        Virtualization/Sandbox Evasion
                        LSASS Memory1
                        Process Discovery
                        Remote Desktop ProtocolData from Removable Media1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        11
                        Process Injection
                        Security Account Manager21
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        DLL Side-Loading
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                        Account Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                        System Owner/User Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
                        File and Directory Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem11
                        System Information Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1548564 Sample: iFD9jPLjXC.exe Startdate: 04/11/2024 Architecture: WINDOWS Score: 92 24 Found malware configuration 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 5 other signatures 2->30 6 iFD9jPLjXC.exe 1 2->6         started        10 powershell.exe 11 2->10         started        12 powershell.exe 2->12         started        process3 dnsIp4 22 79.124.58.130, 4378, 49704, 49705 TAMATIYA-ASBG Bulgaria 6->22 32 Creates autostart registry keys with suspicious values (likely registry only malware) 6->32 14 conhost.exe 10->14         started        16 iFD9jPLjXC.exe 10->16         started        18 conhost.exe 12->18         started        20 iFD9jPLjXC.exe 12->20         started        signatures5 process6

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        iFD9jPLjXC.exe74%ReversingLabsWin32.Trojan.InfostealerTinba
                        iFD9jPLjXC.exe100%AviraTR/Coroxy.gafen
                        iFD9jPLjXC.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        79.124.58.1300%Avira URL Cloudsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        79.124.58.130true
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        79.124.58.130
                        unknownBulgaria
                        50360TAMATIYA-ASBGtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1548564
                        Start date and time:2024-11-04 16:37:29 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 10s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:iFD9jPLjXC.exe
                        renamed because original name is a hash value
                        Original Sample Name:f1d2ceaf32e6e7f864e31faafdeb308653a10fa177c55ab0af111ad6affe58e5.exe
                        Detection:MAL
                        Classification:mal92.troj.winEXE@9/9@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 8
                        • Number of non-executed functions: 1
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: iFD9jPLjXC.exe
                        TimeTypeDescription
                        16:38:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run socks5 powershell.exe -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        16:38:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run socks5 powershell.exe -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        79.124.58.130report.pdf.lnkGet hashmaliciousUnknownBrowse
                        • 79.124.58.130:443/VisitorLevy.exe
                        2HSalvXIJE.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                        • 79.124.58.130:7698/en_US/all.js
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        TAMATIYA-ASBGreport.pdf.lnkGet hashmaliciousUnknownBrowse
                        • 79.124.58.130
                        2HSalvXIJE.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                        • 79.124.58.130
                        https://bastionesan.gay/teleforser51/Get hashmaliciousUnknownBrowse
                        • 79.124.49.200
                        http://condenast-hub-okta-emea-7d5ea512.aibels.com/Get hashmaliciousUnknownBrowse
                        • 78.128.114.103
                        https://click.snapchat.com/aVHG?pid=snapchat_download_page&af_dp=http://gwf.ebay.com&af_web_dp=http%3A%2F%2Fdsena3.web.app%2FlH05rnad0TrainQ3b07xgwfd0TR3wH05nZ1d0TauGet hashmaliciousHTMLPhisherBrowse
                        • 78.128.114.103
                        https://click.snapchat.com/aVHG?pid=snapchat_download_page&af_dp=http://davidson-tech.ebay.com&af_web_dp=http%3A%2F%2Fdsena3.web.app%2FjH05hnhH05lly07xdavid5kZH05n-tQ3bR3whd0TR3wH05nZ1Get hashmaliciousHTMLPhisherBrowse
                        • 78.128.114.103
                        hmsLm3zv4eGet hashmaliciousMiraiBrowse
                        • 78.128.114.66
                        WDPKg5l9gbGet hashmaliciousMiraiBrowse
                        • 78.128.114.66
                        x86Get hashmaliciousMiraiBrowse
                        • 78.128.114.66
                        No context
                        No context
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):0.34726597513537405
                        Encrypted:false
                        SSDEEP:3:Nlll:Nll
                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:@...e...........................................................
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6222
                        Entropy (8bit):3.7128075028666707
                        Encrypted:false
                        SSDEEP:96:zUGCePFckvhkvCCt15Z2OVwHG5Z2OVwHP:zUAK15Zt5ZO
                        MD5:FAACF9343D5800B5469FF9BBECE3EC9C
                        SHA1:1AB4E7435E5507C29D87AA82DCCC486A86FA5131
                        SHA-256:0764CA8C29A9923CF1F5E98ABEC167FBE7F1215B1624648AB9E3A66C9F2BCA2A
                        SHA-512:2DE0C56F04921B2E79942C2FC34C6DFE2EA1F31D508BC0B89F96D64017307871F363F72CEBB46DA0FE2E487EE5FB559860DED9C08F727C7ED1197D342CAA1B53
                        Malicious:false
                        Preview:...................................FL..................F.".. ...d..............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......~........u.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSldY.|....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....dY.|..Roaming.@......DWSldY.|....C.....................{...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSldY.|....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSldY.|....E.....................e[..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSldY.|....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSldY.|....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSldY.|....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSldY.|....q...........
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6222
                        Entropy (8bit):3.711676589499161
                        Encrypted:false
                        SSDEEP:96:4UGCeoFckvhkvCCt15Z2O2wHG5Z2OVwHP:4UAB15ZA5ZO
                        MD5:5D2DFED3DEA4C33383D35199376BBD73
                        SHA1:C2FFA536DEF56BF8544680CFD1BCCBFC4EDC818D
                        SHA-256:330E644755D5847FE95D5305D7C43EECBE900FE17F138D593CBB948DA6FC55CD
                        SHA-512:7044C1295FAFBC57CF93C589FDDB200CBEBEA8265FADE98E71854256981306316E71FED934ACFFE4953C40F5DD4DBC85E3F8D8DF4B24007CA2D9819F7BC171C2
                        Malicious:false
                        Preview:...................................FL..................F.".. ...d..............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......~...... ...........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSldY.|....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....dY.|..Roaming.@......DWSldY.|....C.....................{...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSldY.|....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSldY.|....E.....................e[..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSldY.|....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSldY.|....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSldY.|....q...........
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6222
                        Entropy (8bit):3.711676589499161
                        Encrypted:false
                        SSDEEP:96:4UGCeoFckvhkvCCt15Z2O2wHG5Z2OVwHP:4UAB15ZA5ZO
                        MD5:5D2DFED3DEA4C33383D35199376BBD73
                        SHA1:C2FFA536DEF56BF8544680CFD1BCCBFC4EDC818D
                        SHA-256:330E644755D5847FE95D5305D7C43EECBE900FE17F138D593CBB948DA6FC55CD
                        SHA-512:7044C1295FAFBC57CF93C589FDDB200CBEBEA8265FADE98E71854256981306316E71FED934ACFFE4953C40F5DD4DBC85E3F8D8DF4B24007CA2D9819F7BC171C2
                        Malicious:false
                        Preview:...................................FL..................F.".. ...d..............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......~...... ...........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSldY.|....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....dY.|..Roaming.@......DWSldY.|....C.....................{...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSldY.|....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSldY.|....E.....................e[..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSldY.|....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSldY.|....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSldY.|....q...........
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):6222
                        Entropy (8bit):3.711676589499161
                        Encrypted:false
                        SSDEEP:96:4UGCeoFckvhkvCCt15Z2O2wHG5Z2OVwHP:4UAB15ZA5ZO
                        MD5:5D2DFED3DEA4C33383D35199376BBD73
                        SHA1:C2FFA536DEF56BF8544680CFD1BCCBFC4EDC818D
                        SHA-256:330E644755D5847FE95D5305D7C43EECBE900FE17F138D593CBB948DA6FC55CD
                        SHA-512:7044C1295FAFBC57CF93C589FDDB200CBEBEA8265FADE98E71854256981306316E71FED934ACFFE4953C40F5DD4DBC85E3F8D8DF4B24007CA2D9819F7BC171C2
                        Malicious:false
                        Preview:...................................FL..................F.".. ...d..............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......~...... ...........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSldY.|....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....dY.|..Roaming.@......DWSldY.|....C.....................{...R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSldY.|....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSldY.|....E.....................e[..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSldY.|....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSldY.|....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSldY.|....q...........
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):4.880511061956073
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:iFD9jPLjXC.exe
                        File size:7'680 bytes
                        MD5:732bba29e4283036d0fce29331d71577
                        SHA1:c2a5ef70e605a4dd1f12f5e28511b85a357c0ea6
                        SHA256:f1d2ceaf32e6e7f864e31faafdeb308653a10fa177c55ab0af111ad6affe58e5
                        SHA512:31ce8d7dfa415ce28e65385efa4b6f92459c8065762552e8a9482eacc67541f18fa16735d56119a03cc10d85fe724d65b5710d4d747c767f52de945ccd61bf91
                        SSDEEP:96:TxJTv8DAhxmQmATEkm3avBzzCQgDl+C+DRZB+LWqcpOoL:TxNMAhxakDFlDRZB+qD
                        TLSH:A4F193177C628471D2068EB63E4F6390AEBBA133E274A00D8FB30DD1E531D27C71A209
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=.JwS.JwS.JwS..h@..wS..WA.KwS.RichJwS.................PE..L......f..................................... ....@................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x401000
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x6681030F [Sun Jun 30 07:02:39 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:2623d8e6c0cd976fa9682386c6a3c4c7
                        Instruction
                        push 00000001h
                        push 00000000h
                        push 00000000h
                        push 00000001h
                        push 004030AFh
                        push 004030B6h
                        push 80000001h
                        call 00007F6F74E2BCEAh
                        push 00000000h
                        push 00000000h
                        push 00000000h
                        push 00401B79h
                        push 00000000h
                        push 00000000h
                        call 00007F6F74E2CA79h
                        ret
                        push ebp
                        mov ebp, esp
                        add esp, FFFFFBF8h
                        push ecx
                        push edx
                        push ebx
                        push edi
                        push esi
                        cmp dword ptr [ebp+20h], 01h
                        jne 00007F6F74E2BD49h
                        lea eax, dword ptr [ebp-08h]
                        push eax
                        lea eax, dword ptr [ebp-04h]
                        push eax
                        push 00000000h
                        push 000F003Fh
                        push 00000000h
                        push 00000000h
                        push 00000000h
                        push dword ptr [ebp+0Ch]
                        push dword ptr [ebp+08h]
                        call 00007F6F74E2CA8Ch
                        push 00000100h
                        lea eax, dword ptr [ebp-00000408h]
                        push eax
                        push 00000000h
                        call 00007F6F74E2CA3Dh
                        lea eax, dword ptr [ebp-00000408h]
                        push eax
                        push 004030E8h
                        lea eax, dword ptr [ebp-00000308h]
                        push eax
                        call 00007F6F74E2CA07h
                        add esp, 0Ch
                        lea eax, dword ptr [ebp-00000308h]
                        push eax
                        call 00007F6F74E2C794h
                        lea ecx, dword ptr [ebp-00000308h]
                        lea eax, dword ptr [eax+01h]
                        push eax
                        push ecx
                        push dword ptr [ebp+14h]
                        push 00000000h
                        push dword ptr [ebp+10h]
                        push dword ptr [ebp-04h]
                        call 00007F6F74E2CA49h
                        jmp 00007F6F74E2BCF3h
                        lea eax, dword ptr [ebp-04h]
                        push eax
                        push 000F003Fh
                        push 00000000h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x20a80x8c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x40000x8c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000xa8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xe9a0x1000cc69db88557b194073d28c07d430519aFalse0.542724609375data5.58163857898463IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x20000x4220x600ac4c1eb33fa0398af27c87a28f9923a1False0.3619791666666667data3.4936546973620373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x30000x1200x200348e410480780bedf2ddf3a4b8441fcbFalse0.45703125data4.324908374450215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x40000xe80x2001dd6750d76794b648742651305c4ca88False0.302734375data2.1795345155745305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        user32.dllwsprintfA
                        kernel32.dllGetModuleFileNameA, GetVolumeInformationA, LocalAlloc, ExitProcess, SetEvent, CreateThread, VirtualAlloc, VirtualFree, WaitForSingleObject, CreateEventA, CloseHandle, LocalFree, Sleep
                        advapi32.dllRegSetValueExA, RegCreateKeyExA, RegCloseKey, RegOpenKeyExA, RegDeleteValueA
                        wsock32.dllWSAStartup, closesocket, connect, htons, inet_addr, inet_ntoa, ioctlsocket, recv, select, send, setsockopt, shutdown, socket
                        ws2_32.dllfreeaddrinfo, WSAIoctl, getaddrinfo
                        secur32.dllGetUserNameExA
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-11-04T16:38:41.941211+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.549707TCP
                        2024-11-04T16:39:20.350354+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.549922TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Nov 4, 2024 16:38:24.010967016 CET497044378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.016056061 CET43784970479.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:24.016165972 CET497044378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.016339064 CET497044378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.021400928 CET43784970479.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:24.647495985 CET43784970479.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:24.647732019 CET497044378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.647767067 CET497044378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.650628090 CET497054378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.652707100 CET43784970479.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:24.656337023 CET43784970579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:24.656405926 CET497054378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.656615973 CET497054378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:24.661726952 CET43784970579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:25.306077003 CET43784970579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:25.306312084 CET497054378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:25.306653976 CET497054378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:25.312946081 CET43784970579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:38.744848013 CET497084378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:38.751964092 CET43784970879.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:38.754154921 CET497084378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:38.755036116 CET497084378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:38.762341976 CET43784970879.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:39.392637014 CET43784970879.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:39.392777920 CET497084378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:39.392811060 CET497084378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:39.395369053 CET497154378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:39.397903919 CET43784970879.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:39.400556087 CET43784971579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:39.400657892 CET497154378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:39.400933981 CET497154378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:39.406256914 CET43784971579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:40.035247087 CET43784971579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:40.035341024 CET497154378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:40.053833961 CET497154378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:40.059624910 CET43784971579.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:45.183572054 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:45.188443899 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:45.188524008 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:45.188816071 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:45.194144964 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.264226913 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.264667034 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.264755964 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.265593052 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.265635967 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.266500950 CET497504378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.273591042 CET43784975079.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.280788898 CET497514378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.286653996 CET43784975179.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.290183067 CET497514378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.318697929 CET497514378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.323642969 CET43784975179.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.924124002 CET43784975179.124.58.130192.168.2.5
                        Nov 4, 2024 16:38:46.924252033 CET497514378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.924382925 CET497514378192.168.2.579.124.58.130
                        Nov 4, 2024 16:38:46.929234028 CET43784975179.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.315670013 CET499834378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.320723057 CET43784998379.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.320800066 CET499834378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.321080923 CET499834378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.326004028 CET43784998379.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.947252989 CET43784998379.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.950427055 CET499834378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.950510979 CET499834378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.953196049 CET499844378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.956214905 CET43784998379.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.958273888 CET43784998479.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:25.958368063 CET499844378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.958591938 CET499844378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:25.964173079 CET43784998479.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:26.574314117 CET43784998479.124.58.130192.168.2.5
                        Nov 4, 2024 16:41:26.574373960 CET499844378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:26.574496031 CET499844378192.168.2.579.124.58.130
                        Nov 4, 2024 16:41:26.579338074 CET43784998479.124.58.130192.168.2.5

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:10:38:21
                        Start date:04/11/2024
                        Path:C:\Users\user\Desktop\iFD9jPLjXC.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Imagebase:0x400000
                        File size:7'680 bytes
                        MD5 hash:732BBA29E4283036D0FCE29331D71577
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000000.00000000.2068186380.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Target ID:2
                        Start time:10:38:33
                        Start date:04/11/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        Imagebase:0x7ff7be880000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:10:38:34
                        Start date:04/11/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:10:38:36
                        Start date:04/11/2024
                        Path:C:\Users\user\Desktop\iFD9jPLjXC.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Imagebase:0x400000
                        File size:7'680 bytes
                        MD5 hash:732BBA29E4283036D0FCE29331D71577
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000004.00000000.2215297855.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000004.00000002.3922921994.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Target ID:6
                        Start time:10:38:41
                        Start date:04/11/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -windowstyle hidden -Command "& 'C:\Users\user\Desktop\iFD9jPLjXC.exe'"
                        Imagebase:0x7ff7be880000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:10:38:41
                        Start date:04/11/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:10:38:43
                        Start date:04/11/2024
                        Path:C:\Users\user\Desktop\iFD9jPLjXC.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\iFD9jPLjXC.exe"
                        Imagebase:0x400000
                        File size:7'680 bytes
                        MD5 hash:732BBA29E4283036D0FCE29331D71577
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000008.00000000.2279848208.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SystemBC, Description: Yara detected SystemBC, Source: 00000008.00000002.3922944930.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:38.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:17.5%
                          Total number of Nodes:114
                          Total number of Limit Nodes:3
                          execution_graph 355 401000 358 401031 355->358 357 40101c CreateThread 366 401b79 357->366 359 401045 RegCreateKeyExA GetModuleFileNameA wsprintfA 358->359 360 4010bc RegOpenKeyExA RegDeleteValueA 358->360 364 401b5e 359->364 362 4010dd RegCloseKey 360->362 362->357 363 40109f RegSetValueExA 363->362 365 401b69 364->365 365->363 365->365 373 401b47 366->373 368 401b95 Sleep WSAStartup 368->368 371 401bb4 368->371 370 401bd6 Sleep 370->371 371->370 372 40146a 41 API calls 371->372 374 40146a 371->374 372->370 373->368 399 401b47 374->399 376 401486 VirtualAlloc CreateEventA GetUserNameExA 400 401c2e 376->400 378 4014d8 379 40160c 378->379 382 4014f0 GetVolumeInformationA 378->382 424 401c0f shutdown closesocket 379->424 381 401830 CloseHandle VirtualFree 386 401882 381->386 387 40187b ExitProcess 381->387 383 401523 382->383 416 4019ad 383->416 386->371 388 401558 select 388->379 392 401539 388->392 389 4017d1 recv 389->379 389->392 390 401663 recv 390->379 395 401687 390->395 391 4016d0 LocalAlloc 391->379 391->395 392->379 392->388 392->389 392->390 394 4019ad 4 API calls 392->394 393 4019ad 4 API calls 393->395 394->392 395->391 395->392 395->393 396 401753 socket 395->396 397 401746 socket 395->397 398 40175e setsockopt CreateThread 396->398 397->398 398->395 435 4010f3 398->435 399->376 425 401b47 400->425 402 401c47 socket 426 401ac0 402->426 404 401c63 setsockopt 405 401c9a 404->405 406 401ca6 405->406 429 401a34 405->429 407 401cbb inet_addr 406->407 410 401cc9 407->410 411 401d5c 407->411 412 401cdc htons ioctlsocket connect 410->412 411->378 427 401b0d 412->427 415 401d3d ioctlsocket 415->411 417 4019c3 WaitForSingleObject 416->417 419 4019cd 416->419 417->419 418 401a1c 420 401a22 SetEvent 418->420 421 401a2a 418->421 419->418 422 4019e4 select 419->422 420->421 421->392 422->418 423 4019fa send 422->423 423->418 423->419 424->381 425->402 426->404 428 401b1f select 427->428 428->411 428->415 430 401a50 429->430 431 401a5b getaddrinfo 430->431 432 401ab3 inet_ntoa 431->432 433 401a85 431->433 432->407 433->432 434 401a96 freeaddrinfo 433->434 434->432 436 40110f 435->436 437 40119f ioctlsocket 436->437 438 401211 437->438 439 4011cf 437->439 440 401a34 2 API calls 438->440 442 401241 438->442 441 401201 connect 439->441 440->442 444 401287 441->444 443 401274 442->443 446 401279 connect 442->446 448 4019ad 4 API calls 443->448 445 401299 select 444->445 445->443 447 4012b1 ioctlsocket WSAIoctl 445->447 446->444 447->443 451 401344 448->451 449 4013c0 458 401c0f shutdown closesocket 449->458 451->449 453 40138b select 451->453 456 4013a4 recv 451->456 457 4019ad 4 API calls 451->457 452 401423 454 4019ad 4 API calls 452->454 453->451 455 40144c LocalFree 454->455 456->449 456->451 457->451 458->452 459 4013c2 467 401374 459->467 460 4013c0 469 401c0f shutdown closesocket 460->469 462 40138b select 462->467 463 401423 465 4019ad 4 API calls 463->465 464 4013a4 recv 464->460 464->467 466 40144c LocalFree 465->466 467->460 467->462 467->464 468 4019ad 4 API calls 467->468 468->467 469->463 470 40161b 482 401539 470->482 471 401558 select 474 40160c 471->474 471->482 472 4017d1 recv 472->474 472->482 473 401663 recv 473->474 473->482 486 401c0f shutdown closesocket 474->486 476 401830 CloseHandle VirtualFree 479 401882 476->479 480 40187b ExitProcess 476->480 477 4016d0 LocalAlloc 477->474 477->482 481 4019ad WaitForSingleObject select send SetEvent 481->482 482->471 482->472 482->473 482->474 482->477 482->481 483 401753 socket 482->483 484 401746 socket 482->484 485 40175e setsockopt CreateThread 483->485 484->485 485->482 487 4010f3 17 API calls 485->487 486->476

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00401000 13 Function_00401031 0->13 17 Function_00401B79 0->17 1 Function_00401AC0 2 Function_004013C2 2->1 7 Function_004019AD 2->7 8 Function_00401B0D 2->8 11 Function_00401C0F 2->11 12 Function_0040188F 2->12 3 Function_00401BE2 4 Function_00401D84 5 Function_00401B47 6 Function_0040146A 6->1 6->5 6->7 6->8 9 Function_00401C2E 6->9 6->11 6->12 14 Function_004010F3 6->14 7->8 9->1 9->4 9->5 9->8 10 Function_00401BEE 9->10 15 Function_00401A34 9->15 16 Function_00401AD8 9->16 12->5 19 Function_00401B5E 13->19 14->1 14->5 14->7 14->8 14->11 14->12 14->15 15->5 17->5 17->6 18 Function_0040161B 18->1 18->7 18->8 18->11 18->12 18->14

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40146a-4014da call 401b47 VirtualAlloc CreateEventA GetUserNameExA call 401c2e 5 4014e0-401534 call 401ac0 GetVolumeInformationA call 40188f call 4019ad 0->5 6 401825-401836 call 401c0f 0->6 19 401539-40153d 5->19 11 40183b-401845 6->11 11->11 13 401847-401856 11->13 13->13 15 401858-401879 CloseHandle VirtualFree 13->15 17 401882-40188c 15->17 18 40187b-40187d ExitProcess 15->18 20 401543-40156e call 401b0d select 19->20 21 4015e7-4015ee 19->21 20->6 32 401574-401576 20->32 23 4015f0-4015f4 21->23 24 4015fa-4015ff 21->24 23->24 26 4017d1-4017f0 recv 23->26 27 401601-401604 24->27 28 401663-401681 recv 24->28 26->6 31 4017f2-40180d 26->31 29 401620-401623 27->29 30 401606-40160a 27->30 28->6 33 401687-40169c 28->33 37 401631-401635 29->37 38 401625-401629 29->38 30->29 34 40160c-401616 30->34 35 401820 31->35 36 40180f-40181b call 40188f 31->36 32->21 39 401578-40157c 32->39 40 4016a2-4016bf call 40188f 33->40 41 4017c8-4017cf 33->41 34->6 35->19 36->35 37->41 45 40163b-40163f 37->45 38->37 43 40162b-40162c 38->43 39->6 44 401582-401586 39->44 53 4016c1-4016c2 40->53 54 4016c7-4016ca 40->54 41->35 43->41 44->6 47 40158c-4015a3 44->47 45->41 48 401645-401651 45->48 47->6 50 4015a9-4015e2 call 40188f call 4019ad 47->50 51 401653 48->51 52 40165e 48->52 50->19 51->52 52->41 55 4017c1 53->55 56 4016d0-4016de LocalAlloc 54->56 57 4017aa-4017bc call 4019ad 54->57 55->41 56->6 59 4016e4-401744 call 401ac0 * 3 56->59 57->55 70 401753-401759 socket 59->70 71 401746-401751 socket 59->71 72 40175e-4017a8 setsockopt CreateThread 70->72 71->72 72->55
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00010000,00003000,00000004,?,?,?,?,?,?,00401BC3,0040300F,0040306B,00000202,?,000003E8), ref: 00401494
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,00000000,00010000,00003000,00000004,?,?,?,?,?,?,00401BC3,0040300F), ref: 004014A4
                          • GetUserNameExA.SECUR32(00000002,?,?,00000000,00000000,00000001,00000000,00000000,00010000,00003000,00000004,?,?), ref: 004014BF
                            • Part of subcall function 00401C2E: socket.WSOCK32(00000002,00000001,00000006,?,?,?,?), ref: 00401C4D
                            • Part of subcall function 00401C2E: setsockopt.WSOCK32(?,00000006,00000001,?,00000004,?,?,00000004,00000002,00000001,00000006,?,?,?,?), ref: 00401C77
                            • Part of subcall function 00401C2E: inet_addr.WSOCK32(00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?,00000004,?,?,00000004), ref: 00401CBC
                            • Part of subcall function 00401C2E: htons.WSOCK32(?,00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?,00000004,?,?), ref: 00401CDD
                            • Part of subcall function 00401C2E: ioctlsocket.WSOCK32(?,8004667E,?,?,00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?), ref: 00401CFF
                            • Part of subcall function 00401C2E: connect.WSOCK32(?,?,00000010,?,8004667E,?,?,00000000,00000000,?,00000002,?,00403000,00403075,?,?), ref: 00401D0D
                            • Part of subcall function 00401C2E: select.WSOCK32(00000000,00000000,?,00000000,?,?,00000000,?,?,00000000,?,?,00000010,?,8004667E,?), ref: 00401D33
                            • Part of subcall function 00401C2E: ioctlsocket.WSOCK32(?,8004667E,?,00000000,00000000,?,00000000,?,?,00000000,?,?,00000000,?,?,00000010), ref: 00401D50
                          • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00403075,?,00000032,?,?), ref: 0040150C
                            • Part of subcall function 004019AD: WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 004019C8
                            • Part of subcall function 004019AD: SetEvent.KERNEL32(?,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 00401A25
                          • select.WSOCK32(00000000,?,00000000,00000000,?,?,00000000,?,0000003C,00000000), ref: 00401566
                            • Part of subcall function 004019AD: select.WSOCK32(00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 004019F0
                            • Part of subcall function 004019AD: send.WSOCK32(?,?,?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 00401A03
                          • CloseHandle.KERNEL32(?,?,?,?,?,0000000A,00000002,?,?,00000000,00000000,00000001,00000000,00000000,00010000,00003000), ref: 0040185E
                          • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,0000000A,00000002,?,?,00000000,00000000,00000001,00000000), ref: 0040186D
                          • ExitProcess.KERNEL32(00000000), ref: 0040187D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: select$EventVirtualioctlsocket$AllocCloseCreateExitFreeHandleInformationNameObjectProcessSingleUserVolumeWaitconnecthtonsinet_addrsendsetsockoptsocket
                          • String ID:
                          • API String ID: 1318156763-0
                          • Opcode ID: 6d508a0f77d53cff8d3e45683c36eb44aa79ec33d4e798442360411c9835d309
                          • Instruction ID: bbffc66e5c7ffa652bc1eb9c33fb21750f01b9076fe66eeaa3a4aca29229b1d3
                          • Opcode Fuzzy Hash: 6d508a0f77d53cff8d3e45683c36eb44aa79ec33d4e798442360411c9835d309
                          • Instruction Fuzzy Hash: 68B1B871A40309BAEB219F50CC02FEEB7B9BB04704F10417BF6097A1E1D7B96A94CB59

                          Control-flow Graph

                          APIs
                          • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,?,?,0040101C), ref: 00401060
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00401073
                          • wsprintfA.USER32 ref: 0040108B
                          • RegSetValueExA.ADVAPI32(?,?,00000000,?,?,?,?), ref: 004010B5
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?,?,?,?,?,?,?,0040101C,80000001,Software\\Microsoft\\Windows\\CurrentVersion\\Run,socks5,00000001), ref: 004010CD
                          • RegDeleteValueA.ADVAPI32(?,?,?,?,00000000,000F003F,?,?,?,?,?,?,?,0040101C,80000001,Software\\Microsoft\\Windows\\CurrentVersion\\Run), ref: 004010D8
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,000F003F,?,?,?,?,?,?,?,0040101C,80000001), ref: 004010E0
                          Strings
                          • powershell.exe -windowstyle hidden -Command "& '%s'", xrefs: 0040107F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: Value$CloseCreateDeleteFileModuleNameOpenwsprintf
                          • String ID: powershell.exe -windowstyle hidden -Command "& '%s'"
                          • API String ID: 1744295022-1821757466
                          • Opcode ID: fdbce37f371b4441aa8a3e650baf4e02924b1e1aaf9ec20a2d128210f2519b20
                          • Instruction ID: da474709eb26fb5714bd3c76322e74f8595bc295cb584bc0b34793c5a59033c4
                          • Opcode Fuzzy Hash: fdbce37f371b4441aa8a3e650baf4e02924b1e1aaf9ec20a2d128210f2519b20
                          • Instruction Fuzzy Hash: EC110A76640208BAEB11EF81CD42FEE776CEB44704F10406AFA04B60E1DBB5AB549B68

                          Control-flow Graph

                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006,?,?,?,?), ref: 00401C4D
                          • setsockopt.WSOCK32(?,00000006,00000001,?,00000004,?,?,00000004,00000002,00000001,00000006,?,?,?,?), ref: 00401C77
                          • inet_ntoa.WSOCK32(00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?,00000004,?,?,00000004,00000002), ref: 00401CB6
                          • inet_addr.WSOCK32(00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?,00000004,?,?,00000004), ref: 00401CBC
                          • htons.WSOCK32(?,00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?,00000004,?,?), ref: 00401CDD
                          • ioctlsocket.WSOCK32(?,8004667E,?,?,00000000,00000000,?,00000002,?,00403000,00403075,?,?,00000006,00000001,?), ref: 00401CFF
                          • connect.WSOCK32(?,?,00000010,?,8004667E,?,?,00000000,00000000,?,00000002,?,00403000,00403075,?,?), ref: 00401D0D
                          • select.WSOCK32(00000000,00000000,?,00000000,?,?,00000000,?,?,00000000,?,?,00000010,?,8004667E,?), ref: 00401D33
                          • ioctlsocket.WSOCK32(?,8004667E,?,00000000,00000000,?,00000000,?,?,00000000,?,?,00000000,?,?,00000010), ref: 00401D50
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: ioctlsocket$connecthtonsinet_addrinet_ntoaselectsetsockoptsocket
                          • String ID:
                          • API String ID: 983927830-0
                          • Opcode ID: 44d9bddc88b868e19a6587a4e4f9218af8d47d8d0636409a41e9c91609fb06c7
                          • Instruction ID: 3da05dab749adc0824459bad4dae381b054e1d7957fa21fd4983f135862404fa
                          • Opcode Fuzzy Hash: 44d9bddc88b868e19a6587a4e4f9218af8d47d8d0636409a41e9c91609fb06c7
                          • Instruction Fuzzy Hash: EA310171950209BADF10EFA5CD46FEE7B7DEB04708F10403AF611B60E1E7B99A049B69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 103 4019ad-4019c1 104 4019c3-4019c8 WaitForSingleObject 103->104 105 4019cd-4019d0 103->105 104->105 106 401a16-401a1a 105->106 107 4019d2-4019f8 call 401b0d select 106->107 108 401a1c-401a20 106->108 107->108 113 4019fa-401a0a send 107->113 110 401a22-401a25 SetEvent 108->110 111 401a2a-401a31 108->111 110->111 113->108 114 401a0c-401a14 113->114 114->106 114->108
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 004019C8
                          • select.WSOCK32(00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 004019F0
                          • send.WSOCK32(?,?,?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 00401A03
                          • SetEvent.KERNEL32(?,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 00401A25
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: EventObjectSingleWaitselectsend
                          • String ID:
                          • API String ID: 3746265427-0
                          • Opcode ID: 58ab6f447b6ed9ca5310716a95241dca7274d8ab234d3ea4d936545e78857079
                          • Instruction ID: f520780259ba0a303ee1fe91c66d2faddea0671fb2dfeafc5fc36e4d417c99ce
                          • Opcode Fuzzy Hash: 58ab6f447b6ed9ca5310716a95241dca7274d8ab234d3ea4d936545e78857079
                          • Instruction Fuzzy Hash: C0115E31640209ABDF209E55DC06FDF3668AB40365F100137B910B51E1D7B8AD50DBA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 115 401000-401030 call 401031 CreateThread
                          APIs
                            • Part of subcall function 00401031: RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?,?,?,?,?,?,?,0040101C), ref: 00401060
                            • Part of subcall function 00401031: GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00401073
                            • Part of subcall function 00401031: wsprintfA.USER32 ref: 0040108B
                            • Part of subcall function 00401031: RegSetValueExA.ADVAPI32(?,?,00000000,?,?,?,?), ref: 004010B5
                            • Part of subcall function 00401031: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,000F003F,?,?,?,?,?,?,?,0040101C,80000001), ref: 004010E0
                          • CreateThread.KERNEL32(00000000,00000000,00401B79,00000000,00000000,00000000), ref: 0040102B
                          Strings
                          • socks5, xrefs: 00401008
                          • Software\\Microsoft\\Windows\\CurrentVersion\\Run, xrefs: 0040100D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: Create$CloseFileModuleNameThreadValuewsprintf
                          • String ID: Software\\Microsoft\\Windows\\CurrentVersion\\Run$socks5
                          • API String ID: 277307019-2545829411
                          • Opcode ID: cf697da2617ab0347418e0f29c076db7c08a4dcd0572fcaa18f92ca93c849f9f
                          • Instruction ID: 1483a93459bf94501396be5ed0da8a1cb6e4d76a7219c0368f29bbba111e4fa3
                          • Opcode Fuzzy Hash: cf697da2617ab0347418e0f29c076db7c08a4dcd0572fcaa18f92ca93c849f9f
                          • Instruction Fuzzy Hash: 69D048343D530034F83429624C83F8824090B00F4AFB0006A37043C4EA85FE3180005E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 118 401b79-401b90 call 401b47 120 401b95-401bb2 Sleep WSAStartup 118->120 120->120 121 401bb4-401bc5 call 40146a 120->121 124 401bd6-401be0 Sleep 121->124 125 401bc7-401bd1 call 40146a 121->125 124->121 125->124
                          APIs
                          • Sleep.KERNEL32(000003E8,?,?), ref: 00401B9A
                          • WSAStartup.WSOCK32(00000202,?,000003E8,?,?), ref: 00401BAB
                          • Sleep.KERNEL32(0002BF20,0040300F,0040306B,00000202,?,000003E8,?,?), ref: 00401BDB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep$Startup
                          • String ID:
                          • API String ID: 3152138391-0
                          • Opcode ID: 084a2d97175f52e3c16b9ccebaa0c4652f674e1541dc7530800f6325029e8f40
                          • Instruction ID: 5180cccb262e5aaded7f6767353c698c11b0ebe877813b9923098971f205a182
                          • Opcode Fuzzy Hash: 084a2d97175f52e3c16b9ccebaa0c4652f674e1541dc7530800f6325029e8f40
                          • Instruction Fuzzy Hash: 5DE0395164134876D5206AB78C4BEAF7A6C5A40B49F10013F7919B10FAFBBCAB04456E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 127 401c0f-401c2b shutdown closesocket
                          APIs
                          • shutdown.WSOCK32(?,00000002,?,?,?,?,00401830,?,?,?,?,0000000A,00000002,?,?,00000000), ref: 00401C1A
                          • closesocket.WSOCK32(?,?,00000002,?,?,?,?,00401830,?,?,?,?,0000000A,00000002,?,?), ref: 00401C22
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: closesocketshutdown
                          • String ID:
                          • API String ID: 572888783-0
                          • Opcode ID: 6e4acbc54aa0ad7d579ce4890f7b1c7f6b62aa958536362b714b561787b487b0
                          • Instruction ID: fbecee67bb8fba84921c4314e932484626e28807aee03a801a345db67e388b3c
                          • Opcode Fuzzy Hash: 6e4acbc54aa0ad7d579ce4890f7b1c7f6b62aa958536362b714b561787b487b0
                          • Instruction Fuzzy Hash: 1BC0802220010876D6113A57DC07D8F7F1CDBD17ECF00C037FA08640B145758C5181F4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 128 40161b 129 4017c8-4017cf 128->129 130 401820 129->130 131 401539-40153d 130->131 132 401543-40156e call 401b0d select 131->132 133 4015e7-4015ee 131->133 144 401825-401836 call 401c0f 132->144 145 401574-401576 132->145 135 4015f0-4015f4 133->135 136 4015fa-4015ff 133->136 135->136 138 4017d1-4017f0 recv 135->138 139 401601-401604 136->139 140 401663-401681 recv 136->140 143 4017f2-40180d 138->143 138->144 141 401620-401623 139->141 142 401606-40160a 139->142 140->144 146 401687-40169c 140->146 149 401631-401635 141->149 150 401625-401629 141->150 142->141 147 40160c-401616 142->147 143->130 148 40180f-40181b call 40188f 143->148 162 40183b-401845 144->162 145->133 151 401578-40157c 145->151 146->129 153 4016a2-4016bf call 40188f 146->153 147->144 148->130 149->129 157 40163b-40163f 149->157 150->149 155 40162b-40162c 150->155 151->144 156 401582-401586 151->156 168 4016c1-4016c2 153->168 169 4016c7-4016ca 153->169 155->129 156->144 160 40158c-4015a3 156->160 157->129 161 401645-401651 157->161 160->144 164 4015a9-4015e2 call 40188f call 4019ad 160->164 165 401653 161->165 166 40165e 161->166 162->162 167 401847-401856 162->167 164->131 165->166 166->129 167->167 174 401858-401879 CloseHandle VirtualFree 167->174 170 4017c1 168->170 171 4016d0-4016de LocalAlloc 169->171 172 4017aa-4017bc call 4019ad 169->172 170->129 171->144 175 4016e4-401744 call 401ac0 * 3 171->175 172->170 177 401882-40188c 174->177 178 40187b-40187d ExitProcess 174->178 188 401753-401759 socket 175->188 189 401746-401751 socket 175->189 190 40175e-4017a8 setsockopt CreateThread 188->190 189->190 190->170
                          APIs
                          • select.WSOCK32(00000000,?,00000000,00000000,?,?,00000000,?,0000003C,00000000), ref: 00401566
                            • Part of subcall function 004019AD: WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 004019C8
                            • Part of subcall function 004019AD: SetEvent.KERNEL32(?,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,?,?), ref: 00401A25
                          • CloseHandle.KERNEL32(?,?,?,?,?,0000000A,00000002,?,?,00000000,00000000,00000001,00000000,00000000,00010000,00003000), ref: 0040185E
                          • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,0000000A,00000002,?,?,00000000,00000000,00000001,00000000), ref: 0040186D
                          • ExitProcess.KERNEL32(00000000), ref: 0040187D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseEventExitFreeHandleObjectProcessSingleVirtualWaitselect
                          • String ID:
                          • API String ID: 1456646865-0
                          • Opcode ID: 72724868b13c99a76407fa31ff93421f84496aa833f1b7e878eb452a4975f704
                          • Instruction ID: 2438ceddd74ffa4cdfe5bc4a6a951b7035832373fe88b063ec0b7ccf5b4d187d
                          • Opcode Fuzzy Hash: 72724868b13c99a76407fa31ff93421f84496aa833f1b7e878eb452a4975f704
                          • Instruction Fuzzy Hash: A311DB71984218EEEF269A90CC45BED76BDAB44708F5040B7E209B90E0C7B95F94CF5A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 191 4010f3-4011cd call 401b47 call 401ac0 * 8 ioctlsocket 210 401211-40121b 191->210 211 4011cf-40120f call 401ac0 * 2 connect 191->211 212 40121d-401243 call 401ac0 call 401a34 210->212 213 40124e-401252 210->213 230 401287-4012af call 401b0d select 211->230 221 401304-40136b call 40188f * 2 call 4019ad call 40188f * 2 212->221 231 401249-40124c 212->231 216 401274 213->216 217 401254-401272 call 401ac0 * 2 213->217 216->221 236 401279-401282 connect 217->236 245 401371 221->245 246 401414-401467 call 401c0f call 40188f call 4019ad LocalFree 221->246 230->221 238 4012b1-401300 ioctlsocket WSAIoctl 230->238 231->236 236->230 238->221 248 401374 245->248 250 40140a-40140e 248->250 250->246 251 401379-4013a0 call 401b0d select 250->251 251->248 257 4013a2 251->257 257->246 259 4013a4-4013b9 recv 257->259 260 4013c0 259->260 261 4013bb-4013be 259->261 260->246 261->260 262 4013c4-401402 call 401ac0 call 40188f * 2 261->262 262->250 269 401405 call 4019ad 262->269 269->250
                          APIs
                          • ioctlsocket.WSOCK32(?,8004667E,00000001,?,?,00000001,?,?,00000004,?,?,00000004,?,?,00000004,?), ref: 004011C4
                          • connect.WSOCK32(?,00000017,0000001C,?,?,00000010,?,?,00000002,?,8004667E,00000001,?,?,00000001,?), ref: 0040120A
                          • connect.WSOCK32(?,00000002,00000010,?,?,00000002,?,?,00000004,?,8004667E,00000001,?,?,00000001,?), ref: 00401282
                          • select.WSOCK32(00000000,00000000,?,00000000,?,?,00000000,?,00000001,00000000,?,00000002,00000010,?,?,00000002), ref: 004012A7
                          • ioctlsocket.WSOCK32(?,8004667E,00000000,00000000,00000000,?,00000000,?,?,00000000,?,00000001,00000000,?,00000002,00000010), ref: 004012C4
                          • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 004012FB
                          • select.WSOCK32(00000000,?,00000000,00000000,?,?,00000000,?,00000001,00000000,00403075,00000032,00000005,0000000A,00403075,00000032), ref: 00401399
                          • recv.WSOCK32(?,?,0000FFFA,00000000,00000000,?,00000000,00000000,?,?,00000000,?,00000001,00000000,00403075,00000032), ref: 004013B2
                          • LocalFree.KERNEL32(?,?,?,00000003,?,00403075,00000032,?,00000003,?,00403075,00000032,00000005,0000000A,00403075,00000032), ref: 00401459
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3922907138.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3922882116.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922924735.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922952823.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3922974775.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_iFD9jPLjXC.jbxd
                          Yara matches
                          Similarity
                          • API ID: connectioctlsocketselect$FreeIoctlLocalrecv
                          • String ID: `
                          • API String ID: 3066282071-1850852036
                          • Opcode ID: 6ca844d213eeb6f2275984a97160e92bd2559d353b0a479cc22394595804d0f5
                          • Instruction ID: 64fe681de91eec89505d86f2c9f86f3b62d708f57b3aa067c7741132328bad3a
                          • Opcode Fuzzy Hash: 6ca844d213eeb6f2275984a97160e92bd2559d353b0a479cc22394595804d0f5
                          • Instruction Fuzzy Hash: 1EB10C72940248BAEB11EAE1CC42FEEB7BCAB04704F54452AB711F60E1D779A644CB69