Click to jump to signature section
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.6% probability |
Source: unknown | HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49732 version: TLS 1.2 |
Source: gshv2.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View | IP Address: 162.159.129.233 162.159.129.233 |
Source: Joe Sandbox View | IP Address: 162.159.129.233 162.159.129.233 |
Source: Joe Sandbox View | JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19 |
Source: Network traffic | Suricata IDS: 2022550 - Severity 1 - ET MALWARE Possible Malicious Macro DL EXE Feb 2016 : 192.168.2.4:49732 -> 162.159.129.233:443 |
Source: global traffic | HTTP traffic detected: GET /attachments/1019415395452588092/1019417039519092736/dxd32s.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /attachments/926255566924447794/952693608832708628/chrome.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-AliveCookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CCFD0 URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle, | 0_2_00007FF62C0CCFD0 |
Source: global traffic | HTTP traffic detected: GET /attachments/1019415395452588092/1019417039519092736/dxd32s.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /attachments/926255566924447794/952693608832708628/chrome.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-AliveCookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000 |
Source: global traffic | DNS traffic detected: DNS query: cdn.discordapp.com |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Dec 2024 12:34:57 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeSet-Cookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; path=/; expires=Fri, 27-Dec-24 13:04:57 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=898Eminxt%2FiRtRfKNZ0XB8iQQMwMXXeNfTrElGiP02RY0Pk5KuItFVq%2F59fSQZ1tuBf7SlklTFbCKo9LAMEQuiQuMEp%2BwclXz8Y4nl8Gm%2FxZfWy5D0g6WEiQeQKliF16bRY2tA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8f8959067fb780e2-EWRalt-svc: h3=":443"; ma=86400 |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Dec 2024 12:35:05 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1C%2FZUX%2BBE3akSylxAb9CToCJGmDjyAU3CHzntD4QmbR9Ddx5Okl3Hm9ggR2YTwkNsVVVRFUPFKQJLjy4qD7ZsuDF1cjTWP7woS2MtP7beWmDTSc1PDL%2BkS7cOxeDXZRLwKLUzA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpServer: cloudflareCF-RAY: 8f8959347bbb42ea-EWRalt-svc: h3=":443"; ma=86400 |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/ |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/L |
Source: gshv2.exe | String found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exe |
Source: gshv2.exe | String found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exeC: |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F5385B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exendowsF |
Source: gshv2.exe, 00000000.00000003.1666174920.0000021F538E2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exer |
Source: gshv2.exe, gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp, gshv2.exe, 00000000.00000002.1759636616.0000021F538E2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe. |
Source: gshv2.exe | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe03:21:08 |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe11 |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe: |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exer |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: unknown | Network traffic detected: HTTP traffic on port 49733 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49733 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49732 version: TLS 1.2 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B1A40 _Init_thread_footer,free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard, | 0_2_00007FF62C0B1A40 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B1BB0 OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard, | 0_2_00007FF62C0B1BB0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B1A40 _Init_thread_footer,free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard, | 0_2_00007FF62C0B1A40 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C9F80 GetClientRect,QueryPerformanceCounter,GetKeyState,GetKeyState,GetKeyState,ClientToScreen,SetCursorPos,GetActiveWindow,GetCursorPos,ScreenToClient,GetCursorPos, | 0_2_00007FF62C0C9F80 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CCFD0: URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle, | 0_2_00007FF62C0CCFD0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CCFD0 | 0_2_00007FF62C0CCFD0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B4D50 | 0_2_00007FF62C0B4D50 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0AD570 | 0_2_00007FF62C0AD570 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0BFD60 | 0_2_00007FF62C0BFD60 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B9DD0 | 0_2_00007FF62C0B9DD0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B99D0 | 0_2_00007FF62C0B99D0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0AB622 | 0_2_00007FF62C0AB622 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B3650 | 0_2_00007FF62C0B3650 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B7650 | 0_2_00007FF62C0B7650 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0A2E50 | 0_2_00007FF62C0A2E50 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0AFA70 | 0_2_00007FF62C0AFA70 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0BEA90 | 0_2_00007FF62C0BEA90 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C66A0 | 0_2_00007FF62C0C66A0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C4B00 | 0_2_00007FF62C0C4B00 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CE300 | 0_2_00007FF62C0CE300 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B9730 | 0_2_00007FF62C0B9730 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C5330 | 0_2_00007FF62C0C5330 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B8340 | 0_2_00007FF62C0B8340 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B5F70 | 0_2_00007FF62C0B5F70 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C9F80 | 0_2_00007FF62C0C9F80 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C43D0 | 0_2_00007FF62C0C43D0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C73E0 | 0_2_00007FF62C0C73E0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B0000 | 0_2_00007FF62C0B0000 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C0860 | 0_2_00007FF62C0C0860 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B7C80 | 0_2_00007FF62C0B7C80 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B9480 | 0_2_00007FF62C0B9480 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0C20B0 | 0_2_00007FF62C0C20B0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0B88D0 | 0_2_00007FF62C0B88D0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0BC910 | 0_2_00007FF62C0BC910 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0BB930 | 0_2_00007FF62C0BB930 |
Source: classification engine | Classification label: mal68.winEXE@4/1@1/1 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CCFD0 URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle, | 0_2_00007FF62C0CCFD0 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2312:120:WilError_03 |
Source: gshv2.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: gshv2.exe | Virustotal: Detection: 68% |
Source: gshv2.exe | ReversingLabs: Detection: 54% |
Source: unknown | Process created: C:\Users\user\Desktop\gshv2.exe "C:\Users\user\Desktop\gshv2.exe" | |
Source: C:\Users\user\Desktop\gshv2.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\gshv2.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exe | |
Source: C:\Users\user\Desktop\gshv2.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exe | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\gshv2.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: ndfapi.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wdi.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: gshv2.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: gshv2.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: gshv2.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: gshv2.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: gshv2.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: gshv2.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: gshv2.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: gshv2.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\gshv2.exe | API coverage: 3.2 % |
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F538C2000.00000004.00000020.00020000.00000000.sdmp, gshv2.exe, 00000000.00000002.1759636616.0000021F5385B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0D00D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF62C0D00D0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0D027C SetUnhandledExceptionFilter, | 0_2_00007FF62C0D027C |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0CFF4C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF62C0CFF4C |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0D00D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF62C0D00D0 |
Source: C:\Users\user\Desktop\gshv2.exe | Code function: 0_2_00007FF62C0D04F0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF62C0D04F0 |