Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qOiBFeRq7X.exe

Overview

General Information

Sample Name:qOiBFeRq7X.exe
Analysis ID:708237
MD5:e350cbab3b64e8f7e523619721392d21
SHA1:719c508f86b5e0a5c97d90dfad8aa30ca5f344f9
SHA256:b25478bd070ab292272094d6a9793a0e7eba11340b2693258eccd6876196c5e3
Tags:185-25-204-244ServereasySrlexeMorpheus
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file contains more sections than normal
Potential time zone aware malware
Installs a raw input device (often for capturing keystrokes)
Program does not show much activity (idle)
Detected TCP or UDP traffic on non-standard ports
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • qOiBFeRq7X.exe (PID: 2512 cmdline: "C:\Users\user\Desktop\qOiBFeRq7X.exe" MD5: E350CBAB3B64E8F7E523619721392D21)
    • conhost.exe (PID: 5384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: qOiBFeRq7X.exeVirustotal: Detection: 7%Perma Link
Source: qOiBFeRq7X.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.6:49708 -> 185.25.204.244:9090
Source: unknownTCP traffic detected without corresponding DNS query: 185.25.204.244
Source: unknownTCP traffic detected without corresponding DNS query: 185.25.204.244
Source: unknownTCP traffic detected without corresponding DNS query: 185.25.204.244
Source: qOiBFeRq7X.exeBinary or memory string: github.com/gonutz/w32/v2.getRawInputData
Source: qOiBFeRq7X.exeStatic PE information: Number of sections : 14 > 10
Source: qOiBFeRq7X.exeStatic PE information: Section: /19 ZLIB complexity 0.9957361985125858
Source: qOiBFeRq7X.exeStatic PE information: Section: /32 ZLIB complexity 0.9980690696022727
Source: qOiBFeRq7X.exeStatic PE information: Section: /65 ZLIB complexity 0.9984093597374848
Source: qOiBFeRq7X.exeVirustotal: Detection: 7%
Source: qOiBFeRq7X.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\qOiBFeRq7X.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: qOiBFeRq7X.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
Source: classification engineClassification label: mal48.winEXE@2/0@0/1
Source: unknownProcess created: C:\Users\user\Desktop\qOiBFeRq7X.exe "C:\Users\user\Desktop\qOiBFeRq7X.exe"
Source: C:\Users\user\Desktop\qOiBFeRq7X.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5384:120:WilError_01
Source: qOiBFeRq7X.exeStatic file information: File size 4145664 > 1048576
Source: qOiBFeRq7X.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: qOiBFeRq7X.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x12f400
Source: qOiBFeRq7X.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x132600
Source: qOiBFeRq7X.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: qOiBFeRq7X.exeStatic PE information: section name: /4
Source: qOiBFeRq7X.exeStatic PE information: section name: /19
Source: qOiBFeRq7X.exeStatic PE information: section name: /32
Source: qOiBFeRq7X.exeStatic PE information: section name: /46
Source: qOiBFeRq7X.exeStatic PE information: section name: /65
Source: qOiBFeRq7X.exeStatic PE information: section name: /78
Source: qOiBFeRq7X.exeStatic PE information: section name: /90
Source: qOiBFeRq7X.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\qOiBFeRq7X.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\qOiBFeRq7X.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\qOiBFeRq7X.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: qOiBFeRq7X.exe, 00000000.00000002.259002698.000002D0DA2D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllGG
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path Interception1
Process Injection
1
Software Packing
11
Input Capture
1
System Time Discovery
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Non-Standard Port
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 708237 Sample: qOiBFeRq7X.exe Startdate: 23/09/2022 Architecture: WINDOWS Score: 48 13 Multi AV Scanner detection for submitted file 2->13 6 qOiBFeRq7X.exe 1 2->6         started        process3 dnsIp4 11 185.25.204.244, 49708, 9090 ASSERVEREASYIT Italy 6->11 9 conhost.exe 6->9         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
qOiBFeRq7X.exe0%ReversingLabs
qOiBFeRq7X.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
185.25.204.244
unknownItaly
60798ASSERVEREASYITfalse
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:708237
Start date and time:2022-09-23 07:54:20 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 3m 47s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:qOiBFeRq7X.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.winEXE@2/0@0/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 100%)
  • Quality average: 75.8%
  • Quality standard deviation: 24.4%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Excluded domains from analysis (whitelisted): fs.microsoft.com
  • Execution Graph export aborted for target qOiBFeRq7X.exe, PID 2512 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
ASSERVEREASYITBt1MbEJx8u.exeGet hashmaliciousBrowse
  • 185.229.237.73
V4bjKWslitGet hashmaliciousBrowse
  • 185.242.183.188
RFQ2201002 PFK.xlsxGet hashmaliciousBrowse
  • 185.25.206.144
croILhAeSRGet hashmaliciousBrowse
  • 185.242.183.174
WjmYak325l.exeGet hashmaliciousBrowse
  • 185.242.180.182
soramrk.armGet hashmaliciousBrowse
  • 185.242.183.179
2bb0000.exeGet hashmaliciousBrowse
  • 185.242.180.72
fOMSAB0Sfe.exeGet hashmaliciousBrowse
  • 185.242.180.72
F9TrHRE53b.exeGet hashmaliciousBrowse
  • 185.242.180.213
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):6.725203166929832
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:qOiBFeRq7X.exe
File size:4145664
MD5:e350cbab3b64e8f7e523619721392d21
SHA1:719c508f86b5e0a5c97d90dfad8aa30ca5f344f9
SHA256:b25478bd070ab292272094d6a9793a0e7eba11340b2693258eccd6876196c5e3
SHA512:f17f8a257da81eefa3517642e71f2873c287561a3e8e166f36fd0df82928a60b0f9544f59241af4d0a63457b7ae568de97697ebb9270f8fdc21a8cab3c7e9617
SSDEEP:49152:LyYds833khrb/TrvO90d7HjmAFd4A64nsfJvdp/nBWg/UljSVplAKsq1wxEUUSbw:z3ITnbZfAg
TLSH:0E166B4FBC9495A5C5E9D230C96982927630BC451B2037DFEA5CBABB2B337C05E36394
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........8......."..................Y........@...............................E...........`... ............................
Icon Hash:008039c4c4384000
Entrypoint:0x465900
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:9cbefe68f395e67356e2a5d8d1b285c0
Instruction
jmp 00007F7424AE83F0h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
pushfd
cld
dec eax
sub esp, 000000E0h
dec eax
mov dword ptr [esp], edi
dec eax
mov dword ptr [esp+08h], esi
dec eax
mov dword ptr [esp+10h], ebp
dec eax
mov dword ptr [esp+18h], ebx
dec esp
mov dword ptr [esp+20h], esp
dec esp
mov dword ptr [esp+28h], ebp
dec esp
mov dword ptr [esp+30h], esi
dec esp
mov dword ptr [esp+38h], edi
movups dqword ptr [esp+40h], xmm6
movups dqword ptr [esp+50h], xmm7
inc esp
movups dqword ptr [esp+60h], xmm0
inc esp
movups dqword ptr [esp+70h], xmm1
inc esp
movups dqword ptr [esp+00000080h], xmm2
inc esp
movups dqword ptr [esp+00000090h], xmm3
inc esp
movups dqword ptr [esp+000000A0h], xmm4
inc esp
movups dqword ptr [esp+000000B0h], xmm5
inc esp
movups dqword ptr [esp+000000C0h], xmm6
inc esp
movups dqword ptr [esp+000000D0h], xmm7
dec eax
sub esp, 30h
dec ecx
mov edi, eax
dec eax
mov edx, dword ptr [00000028h]
dec eax
cmp edx, 00000000h
jne 00007F7424AEC0FEh
dec eax
mov eax, 00000000h
jmp 00007F7424AEC175h
dec eax
mov edx, dword ptr [edx+00000000h]
dec eax
cmp edx, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3dd0000x47c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4150000x42560.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x3de0000x55a8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2641800x140.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x12f2ad0x12f400False0.44155438478977743data6.134186837146027IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1310000x1325480x132600False0.40453513871889024data5.359995809128577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x2640000x777c80x1ba00False0.37967512726244346data4.447089029507736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
/40x2dc0000x1270x200False0.6171875data5.097874074212899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190x2dd0000x368380x36a00False0.9957361985125858data7.994836896991751IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/320x3140000xafee0xb000False0.9980690696022727data7.939302201607372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/460x31f0000x300x200False0.103515625data0.8556848540171443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/650x3200000x665c70x66600False0.9984093597374848data7.997091496748059IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/780x3870000x42e510x43000False0.9844478777985075data7.992917864787682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/900x3ca0000x122d60x12400False0.974703017979452data7.801272414782094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.idata0x3dd0000x47c0x600False0.3333333333333333data3.569267435002183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x3de0000x55a80x5600False0.32639898255813954data5.435661439949003IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.symtab0x3e40000x30cee0x30e00False0.2462735773657289data5.299414661215501IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x4150000x425600x42600False0.03361508356873823data1.4857977616407179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_ICON0x4150e80x42028data
RT_GROUP_ICON0x4571100x14data
RT_MANIFEST0x4571280x434XML 1.0 document, ASCII textEnglishUnited States
DLLImport
kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Sep 23, 2022 07:55:19.176639080 CEST497089090192.168.2.6185.25.204.244
Sep 23, 2022 07:55:19.202127934 CEST909049708185.25.204.244192.168.2.6
Sep 23, 2022 07:55:19.708651066 CEST497089090192.168.2.6185.25.204.244
Sep 23, 2022 07:55:19.734209061 CEST909049708185.25.204.244192.168.2.6
Sep 23, 2022 07:55:20.240000963 CEST497089090192.168.2.6185.25.204.244
Sep 23, 2022 07:55:20.265697956 CEST909049708185.25.204.244192.168.2.6

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:07:55:17
Start date:23/09/2022
Path:C:\Users\user\Desktop\qOiBFeRq7X.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\qOiBFeRq7X.exe"
Imagebase:0xf20000
File size:4145664 bytes
MD5 hash:E350CBAB3B64E8F7E523619721392D21
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Target ID:1
Start time:07:55:18
Start date:23/09/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6da640000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly