Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
powershell.exe

Overview

General Information

Sample name:powershell.exe
Analysis ID:1522749
MD5:9d8e30daf21108092d5980c931876b7e
SHA1:7c04ec2377e32b3c7742f581f6c5437464dd2cf2
SHA256:3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sigma detected: System File Execution Location Anomaly
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • powershell.exe (PID: 1836 cmdline: "C:\Users\user\Desktop\powershell.exe" MD5: 9D8E30DAF21108092D5980C931876B7E)
    • conhost.exe (PID: 3540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\powershell.exe", CommandLine: "C:\Users\user\Desktop\powershell.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\powershell.exe, NewProcessName: C:\Users\user\Desktop\powershell.exe, OriginalFileName: C:\Users\user\Desktop\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\powershell.exe", ProcessId: 1836, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Users\user\Desktop\powershell.exe", CommandLine: "C:\Users\user\Desktop\powershell.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\powershell.exe, NewProcessName: C:\Users\user\Desktop\powershell.exe, OriginalFileName: C:\Users\user\Desktop\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\powershell.exe", ProcessId: 1836, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: powershell.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: classification engineClassification label: sus21.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3540:120:WilError_03
Source: powershell.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\powershell.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\powershell.exe "C:\Users\user\Desktop\powershell.exe"
Source: C:\Users\user\Desktop\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Users\user\Desktop\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: powershell.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: powershell.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: powershell.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1522749 Sample: powershell.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 21 10 Sigma detected: System File Execution Location Anomaly 2->10 6 powershell.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
powershell.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522749
Start date and time:2024-09-30 15:55:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:powershell.exe
Detection:SUS
Classification:sus21.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for powershell
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: powershell.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.393783193765634
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:powershell.exe
File size:450'560 bytes
MD5:9d8e30daf21108092d5980c931876b7e
SHA1:7c04ec2377e32b3c7742f581f6c5437464dd2cf2
SHA256:3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8
SHA512:02686cc52cb87adb192e378e4cbdd32bfaf02233321750c94d5d73a5b706ebe81daf6fbfba9e4d1ff1f437affa0606e8c868006fc7299d1b9eb5fb73d7e01f85
SSDEEP:6144:Sv5gN0KPKrsK9WWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:QsnPKriW2KXzJ4pdd3klnnWosPhnzq
TLSH:C6A44B87679412D1EC3EC035D82744520721BCBAD79197EF99D8F2390E712D0AE3EA6B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?...QO..QO..QO...O..QO...O..QO..RN..QO..UN..QO..POG.QO..PN..QO..TN..QO..\N..QO...O..QO..SN..QORich..QO................PE..d..
Icon Hash:6b595171192d243b
Entrypoint:0x140004eb0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x89A8E62 [Mon Jul 29 16:18:42 1974 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:afacf6dc9041114b198160aab4d0ae77
Instruction
dec eax
sub esp, 28h
call 00007F46CCF09A50h
dec eax
add esp, 28h
jmp 00007F46CCF09073h
int3
int3
int3
int3
int3
int3
jmp dword ptr [00007522h]
int3
int3
int3
int3
int3
int3
jmp dword ptr [0000761Eh]
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [0000E751h]
jne 00007F46CCF09272h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007F46CCF09263h
ret
dec eax
ror ecx, 10h
jmp 00007F46CCF09497h
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [0000E784h]
call dword ptr [00007296h]
mov eax, dword ptr [0000E710h]
dec eax
lea ecx, dword ptr [0000E771h]
mov edx, dword ptr [0000ED03h]
inc eax
mov dword ptr [0000E6FBh], eax
mov dword ptr [ebx], eax
dec eax
mov eax, dword ptr [00000058h]
inc ecx
mov ecx, 00000004h
dec esp
mov eax, dword ptr [eax+edx*8]
mov eax, dword ptr [0000E6E0h]
inc ebx
mov dword ptr [ecx+eax], eax
call dword ptr [0000725Eh]
dec eax
lea ecx, dword ptr [0000E73Fh]
dec eax
add esp, 20h
pop ebx
dec eax
Programming Language:
  • [IMP] VS2008 build 21022
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x119d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x57d88.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x140000xa08.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000x3b8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xdc200x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xbd100x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xbbd00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xc0b00x468.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x9c560xa0004b420d9b7f0eee885baa036281fc86efFalse0.5060302734375data6.117950209374687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xb0000x781c0x8000d3a58342384c044b9df29ff145bbcd36False0.30377197265625data4.1134931510635875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x130000xf820x1000ab8aabeae04a78f205558af0fa2c0112False0.11669921875data1.7383246754874346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x140000xa080x100039cce6c7b20d8154bcb2f198d201632aFalse0.32421875data3.4176248422972875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x150000x57d880x58000fd9c32563fa2fea0c5fe7f4050684fe1False0.3489324396306818data5.3002119917429615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6d0000x3b80x10001019612b71d441505287a4da973cde27False0.169921875data1.965989543687137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
MUI0x6ccb00xd8dataEnglishUnited States0.5277777777777778
RT_ICON0x15c480x2fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.966372115856652
RT_ICON0x18c080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13096362777515352
RT_ICON0x1ce300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1795643153526971
RT_ICON0x1f3d80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.1933431952662722
RT_ICON0x20e400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2572701688555347
RT_ICON0x21ee80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3422131147540984
RT_ICON0x228700x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.4197674418604651
RT_ICON0x22f280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5416666666666666
RT_ICON0x234080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.39451219512195124
RT_ICON0x23a700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5524193548387096
RT_ICON0x23d580x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.6065573770491803
RT_ICON0x23f400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6486486486486487
RT_ICON0x240680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5748933901918977
RT_ICON0x24f100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7522563176895307
RT_ICON0x257b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.8248847926267281
RT_ICON0x25e800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.6083815028901735
RT_ICON0x263e80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.3222586324229961
RT_ICON0x684100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5345435684647303
RT_ICON0x6a9b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6050656660412758
RT_ICON0x6ba600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6475409836065574
RT_ICON0x6c3e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6462765957446809
RT_GROUP_ICON0x233900x76dataEnglishUnited States0.7457627118644068
RT_GROUP_ICON0x6c8500xbcdataEnglishUnited States0.6063829787234043
RT_VERSION0x6c9100x39cOpenPGP Public KeyEnglishUnited States0.4642857142857143
RT_MANIFEST0x155a00x6a3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3719835197174809
DLLImport
msvcrt.dll_unlock, _lock, _commode, _fmode, _initterm, __setusermatherr, _cexit, _exit, exit, __set_app_type, __wgetmainargs, __CxxFrameHandler4, __dllonexit, _amsg_exit, _onexit, ?terminate@@YAXXZ, _vsnwprintf, _wcsicmp, _wcsnicmp, fclose, _wfopen, ??1type_info@@UEAA@XZ, wcstoul, wcschr, __uncaught_exception, _XcptFilter, memmove, memcpy, __CxxFrameHandler3, _CxxThrowException, ?what@exception@@UEBAPEBDXZ, ??1exception@@UEAA@XZ, ??0exception@@QEAA@AEBV0@@Z, ??0exception@@QEAA@AEBQEBDH@Z, ??0exception@@QEAA@AEBQEBD@Z, _callnewh, malloc, wcsncmp, wcsrchr, free, _purecall, ??3@YAXPEAX@Z, memcpy_s, ??_V@YAXPEAX@Z, __C_specific_handler, _itow_s, memset
ATL.DLL
KERNEL32.dllFindResourceExW, LCIDToLocaleName, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetLocaleInfoEx, GetSystemDefaultUILanguage, SearchPathW, LoadResource, GetTickCount, GetSystemTimeAsFileTime, FreeLibrary, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, CreateFileMappingW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, Sleep, IsWow64Process, GetCurrentThreadId, GetStartupInfoW, SetConsoleTitleW, FindFirstFileW, MapViewOfFile, GetFileType, CompareStringW, VerifyVersionInfoW, SetLastError, LoadLibraryExW, GetCurrentProcess, GetStdHandle, WriteFile, GetModuleHandleW, ExpandEnvironmentStringsW, GetModuleHandleExW, GetCurrentProcessId, VerSetConditionMask, GetModuleFileNameW, SetThreadUILanguage, K32GetModuleFileNameExW, GetProcAddress, SetErrorMode, FindClose, CreateFileW, GetFileAttributesW, OpenProcess, CreateToolhelp32Snapshot, WakeAllConditionVariable, FormatMessageW, LocalFree, WriteConsoleW, GetLastError, Process32NextW, Process32FirstW, CloseHandle
OLEAUT32.dllSysAllocString, SysFreeString, SafeArrayCreate, SafeArrayPutElement, SysStringLen, VariantClear
ADVAPI32.dllEventRegister, RegEnumKeyExW, RegOpenKeyExW, RegGetValueW, EventUnregister, EventWriteTransfer, RegCloseKey, RegQueryValueExW, EventSetInformation
OLE32.dllPropVariantClear, CoTaskMemAlloc, CoInitializeEx, CoUninitialize, CoCreateInstance, CoInitialize
USER32.dllLoadStringW
mscoree.dllCorBindToRuntimeEx
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:2
Start time:09:56:15
Start date:30/09/2024
Path:C:\Users\user\Desktop\powershell.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\powershell.exe"
Imagebase:0x7ff6d72a0000
File size:450'560 bytes
MD5 hash:9D8E30DAF21108092D5980C931876B7E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:3
Start time:09:56:15
Start date:30/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly