Windows
Analysis Report
SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe (PID: 4812 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win64.Evo- gen.28415. 5583.exe" MD5: 61769DD2942B6894E7DBD5F8AF9E037A) - conhost.exe (PID: 1340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Binary or memory string: | memstr_40d50803-a |
Source: | Static PE information: |
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00007FF68513CBB0 |
Source: | Code function: | 0_2_00007FF68513CBB0 |
Source: | Code function: | 0_2_00007FF685147260 | |
Source: | Code function: | 0_2_00007FF685168E70 | |
Source: | Code function: | 0_2_00007FF6851406D4 | |
Source: | Code function: | 0_2_00007FF685153170 | |
Source: | Code function: | 0_2_00007FF68516A9C0 | |
Source: | Code function: | 0_2_00007FF68513CE20 | |
Source: | Code function: | 0_2_00007FF685141E00 | |
Source: | Code function: | 0_2_00007FF685141200 | |
Source: | Code function: | 0_2_00007FF6851508A0 | |
Source: | Code function: | 0_2_00007FF6851310F0 | |
Source: | Code function: | 0_2_00007FF6851464F0 | |
Source: | Code function: | 0_2_00007FF68514B530 | |
Source: | Code function: | 0_2_00007FF68513CF40 | |
Source: | Code function: | 0_2_00007FF6851343F0 |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Code function: | 0_2_00007FF6851BD354 |
Source: | Code function: | 0_2_00007FF6851BD354 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF6851BC154 |
Source: | Code function: | 0_2_00007FF6851BD1B0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Time Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 2 Security Software Discovery | Remote Desktop Protocol | 2 Clipboard Data | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | Win64.Trojan.Generic | ||
100% | Avira | HEUR/AGEN.1315606 |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1428927 |
Start date and time: | 2024-04-19 21:27:08 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 17s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe |
Detection: | MAL |
Classification: | mal56.winEXE@2/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe, PID 4812 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe
File type: | |
Entropy (8bit): | 7.626648756676915 |
TrID: |
|
File name: | SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe |
File size: | 3'709'440 bytes |
MD5: | 61769dd2942b6894e7dbd5f8af9e037a |
SHA1: | c21221da05db3fd0786a2f2d8b27233df3afc446 |
SHA256: | 38b55c3dcefd3f1d1c21c52d0f150c11010158377afabc8684d55afa1be7e62e |
SHA512: | f27bec6545e81600c50aaac5f24a62bb0b1a885998c842060fa46e91f15ed673ccaca11573ca096dda19af564b69f854820957ffe7c5e08c5801ea442f4d6c7d |
SSDEEP: | 49152:0BByWEq0jznJzco6QdasS+ZPCgeV6FZUFMOVr5SOlzddrI2Ye6XxOHGK5TxqYJ8a:Ft9XC2FZtOZ5SWdd1R6Ym8q3 |
TLSH: | E5060207F791468DE637683CC6A69323F7B1F821172183CB93994979EE8B5E48E36341 |
File Content Preview: | MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......Z..k...8...8...8...8...8./j8...8./.9...8./.9...8./.98..8./.9...8...9w..8...9...8...9...8...8...8U..9=..8...8...8.,.9...8.,.9... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x14008c138 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x661BEE50 [Sun Apr 14 14:55:12 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | ad831b4bf551303dc56cd6637b65dcf9 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FE12152AFE4h |
dec eax |
add esp, 28h |
jmp 00007FE121529DE7h |
int3 |
int3 |
jmp 00007FE12152B2BAh |
int3 |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
xor ecx, ecx |
call dword ptr [00002FF3h] |
dec eax |
mov ecx, ebx |
call dword ptr [00002FF2h] |
call dword ptr [00003024h] |
dec eax |
mov ecx, eax |
mov edx, C0000409h |
dec eax |
add esp, 20h |
pop ebx |
dec eax |
jmp dword ptr [00002FC8h] |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 38h |
mov ecx, 00000017h |
call dword ptr [00002FACh] |
test eax, eax |
je 00007FE121529F79h |
mov ecx, 00000002h |
int 29h |
dec eax |
lea ecx, dword ptr [002F8592h] |
call 00007FE12152A13Eh |
dec eax |
mov eax, dword ptr [esp+38h] |
dec eax |
mov dword ptr [002F8679h], eax |
dec eax |
lea eax, dword ptr [esp+38h] |
dec eax |
add eax, 08h |
dec eax |
mov dword ptr [002F8609h], eax |
dec eax |
mov eax, dword ptr [002F8662h] |
dec eax |
mov dword ptr [002F84D3h], eax |
dec eax |
mov eax, dword ptr [esp+40h] |
dec eax |
mov dword ptr [002F85D7h], eax |
mov dword ptr [002F84ADh], C0000409h |
mov dword ptr [002F84A7h], 00000001h |
mov dword ptr [000000B1h], 00000000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac828 | 0x21c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x38d000 | 0x1e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x385000 | 0x60d8 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x38e000 | 0xc94 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa34f0 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xa3580 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xa33b0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8f000 | 0xa18 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8db2c | 0x8dc00 | d9c2a5f878db5a897c58767713c2c3ec | False | 0.5324831900352733 | data | 6.500298258635886 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8f000 | 0x1f9f4 | 0x1fa00 | a1e8aa048634d17c4365c8e4b94144d6 | False | 0.4442857583992095 | data | 5.903448855136923 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xaf000 | 0x2d5cb0 | 0x2d4c00 | bd358e984368a84eebfc18939197d2c0 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x385000 | 0x60d8 | 0x6200 | b2e3c5294d26e421a36ef5e7ce10e5e1 | False | 0.4799107142857143 | data | 5.87624813676978 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
_RDATA | 0x38c000 | 0x1d0 | 0x200 | 90c1a4c095bdcd0bd7c466f09ff97faa | False | 0.37890625 | data | 4.523192804901079 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x38d000 | 0x1e8 | 0x200 | c45cc2d052ec22895e96ad08870cbdfa | False | 0.54296875 | data | 4.768131151703051 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x38e000 | 0xc94 | 0xe00 | ae8f4f58829fa82915c9a2096247335b | False | 0.3125 | data | 5.18554868628415 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x38d060 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
ntdll.dll | RtlLookupFunctionEntry, RtlVirtualUnwind, RtlCaptureContext, VerSetConditionMask |
d3dx11_43.dll | D3DX11CreateShaderResourceViewFromMemory |
KERNEL32.dll | OutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, SetConsoleTitleA, GetLastError, InitializeCriticalSectionEx, DeleteCriticalSection, GetCurrentProcess, GlobalUnlock, GlobalLock, GlobalFree, MultiByteToWideChar, WideCharToMultiByte, QueryPerformanceCounter, QueryPerformanceFrequency, FreeLibrary, CreateToolhelp32Snapshot, GetProcAddress, LoadLibraryA, CreateFileW, ReadFile, CloseHandle, GetModuleHandleW, SetLastError, FormatMessageA, lstrcmpiA, EnterCriticalSection, LeaveCriticalSection, SleepEx, GetSystemDirectoryA, VerifyVersionInfoA, GetTickCount, MoveFileExA, WaitForSingleObjectEx, GetEnvironmentVariableA, GetStdHandle, GetFileType, PeekNamedPipe, DeviceIoControl, Sleep, ExitProcess, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, CreateThread, Process32First, Process32Next, GetModuleHandleA, GlobalAlloc |
USER32.dll | GetCursorPos, TranslateMessage, DispatchMessageA, DestroyWindow, SendInput, GetSystemMetrics, LoadCursorA, ScreenToClient, MessageBoxA, GetWindowLongA, SetCursorPos, GetClientRect, ClientToScreen, GetForegroundWindow, GetKeyState, EmptyClipboard, GetClipboardData, SetClipboardData, CloseClipboard, OpenClipboard, SetCursor |
d3d11.dll | D3D11CreateDeviceAndSwapChain |
MSVCP140.dll | ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?width@ios_base@std@@QEAA_J_J@Z, ?width@ios_base@std@@QEBA_JXZ, ?flags@ios_base@std@@QEBAHXZ, ?good@ios_base@std@@QEBA_NXZ, ?_Throw_Cpp_error@std@@YAXH@Z, _Cnd_do_broadcast_at_thread_exit, _Thrd_id, _Thrd_join, _Thrd_detach, _Query_perf_frequency, _Query_perf_counter, ?uncaught_exceptions@std@@YAHXZ, ?_Xlength_error@std@@YAXPEBD@Z |
IMM32.dll | ImmReleaseContext, ImmSetCandidateWindow, ImmGetContext, ImmSetCompositionWindow |
D3DCOMPILER_43.dll | D3DCompile |
dwmapi.dll | DwmExtendFrameIntoClientArea |
Normaliz.dll | IdnToAscii |
WLDAP32.dll | |
CRYPT32.dll | CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, PFXImportCertStore, CertOpenStore, CertCloseStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertEnumCertificatesInStore |
WS2_32.dll | setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, closesocket, socket, WSASetLastError, WSAIoctl, WSAStartup, ntohl, WSACleanup, accept, htonl, listen, ioctlsocket, __WSAFDIsSet, select, getaddrinfo, freeaddrinfo, recvfrom, sendto, gethostname, recv |
VCRUNTIME140.dll | __current_exception, __current_exception_context, strrchr, __C_specific_handler, memcmp, strchr, memchr, strstr, __std_terminate, memset, memmove, memcpy, __std_exception_copy, _CxxThrowException, __std_exception_destroy |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
api-ms-win-crt-runtime-l1-1-0.dll | system, _initialize_onexit_table, exit, _errno, _initialize_narrow_environment, terminate, _getpid, _beginthreadex, _register_onexit_function, _register_thread_local_exe_atexit_callback, _c_exit, __p___argv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _cexit, _configure_narrow_argv, strerror, __sys_nerr, _invalid_parameter_noinfo_noreturn, _crt_atexit |
api-ms-win-crt-heap-l1-1-0.dll | calloc, free, malloc, realloc, _callnewh, _set_new_mode |
api-ms-win-crt-string-l1-1-0.dll | strcspn, strpbrk, strspn, _strdup, isupper, strcmp, strncmp, tolower, strncpy |
api-ms-win-crt-stdio-l1-1-0.dll | _wfopen, fclose, fflush, fread, fseek, __acrt_iob_func, fopen, _open, _close, _write, _read, ftell, __p__commode, _set_fmode, fwrite, __stdio_common_vfprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vsnprintf_s, fgets, fputc, fputs, feof, _lseeki64 |
api-ms-win-crt-utility-l1-1-0.dll | qsort |
api-ms-win-crt-math-l1-1-0.dll | sinf, __setusermatherr, acosf, ceilf, cos, tanf, cosf, logf, pow, powf, sin, atan2, asin, sqrtf, log |
api-ms-win-crt-convert-l1-1-0.dll | atoi, strtol, strtoll, strtoul, atof |
api-ms-win-crt-filesystem-l1-1-0.dll | _fstat64, _stat64, _access, _unlink |
api-ms-win-crt-time-l1-1-0.dll | _gmtime64, _time64 |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
ADVAPI32.dll | CryptEncrypt, CryptDestroyKey, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGenRandom, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA, CryptImportKey |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 21:27:59 |
Start date: | 19/04/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.28415.5583.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff685130000 |
File size: | 3'709'440 bytes |
MD5 hash: | 61769DD2942B6894E7DBD5F8AF9E037A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 21:28:00 |
Start date: | 19/04/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Function 00007FF68513CBB0 Relevance: 12.1, APIs: 8, Instructions: 83clipboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851BD354 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 42COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851343F0 Relevance: 7.8, APIs: 4, Strings: 1, Instructions: 262COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF68516A9C0 Relevance: 6.3, APIs: 3, Strings: 1, Instructions: 257COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851BD1B0 Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851464F0 Relevance: 5.0, APIs: 2, Strings: 1, Instructions: 525COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF685141E00 Relevance: .4, Instructions: 425COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF685168E70 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851508A0 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF68513CF40 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF68513CE20 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF685142610 Relevance: 9.2, APIs: 1, Strings: 5, Instructions: 151stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF685131A90 Relevance: 7.6, APIs: 1, Strings: 4, Instructions: 60COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF685134010 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 91COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF6851332E0 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 187COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF68514C6C0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 92COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00007FF68514D220 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 22COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |