Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
imfsbSvc.exe

Overview

General Information

Sample name:imfsbSvc.exe
Analysis ID:1564516
MD5:ca73da8345de507ac023d52b4b5c1814
SHA1:ef32667de23715ef2903b185c08ed9b5dc7cfeed
SHA256:5b88f7d36fe435cd6944bda05f1758f64c7d5136a5f529a58522ac3b0dc9743a
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Suspicious New Service Creation
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Creates a process in suspended mode (likely to inject code)
Enables driver privileges
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Spawns drivers

Classification

  • System is w10x64
  • cmd.exe (PID: 6588 cmdline: cmd /c sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" >> C:\servicereg.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 6944 cmdline: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cmd.exe (PID: 732 cmdline: cmd /c sc start rJxyS >> C:\servicestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5252 cmdline: sc start rJxyS MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • imfsbSvc.exe (PID: 4960 cmdline: C:\Users\user\Desktop\imfsbSvc.exe MD5: CA73DA8345DE507AC023D52B4B5C1814)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , CommandLine: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , ProcessId: 6944, ProcessName: sc.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , CommandLine: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6588, ParentProcessName: cmd.exe, ProcessCommandLine: sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" , ProcessId: 6944, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: imfsbSvc.exeStatic PE information: certificate valid
Source: imfsbSvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbDll.pdb source: imfsbSvc.exe, 00000006.00000002.1640048795.00000000666EE000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: C:\IMF9\sandboxie-master\core\low\obj\amd64\LowLevel.pdb source: imfsbSvc.exe
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbSvc.pdb source: imfsbSvc.exe
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbDll.pdb7 source: imfsbSvc.exe, 00000006.00000002.1640048795.00000000666EE000.00000002.00000001.01000000.00000004.sdmp
Source: imfsbSvc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: imfsbSvc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: imfsbSvc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0
Source: imfsbSvc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: imfsbSvc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: imfsbSvc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: imfsbSvc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: imfsbSvc.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03
Source: imfsbSvc.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: imfsbSvc.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: imfsbSvc.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: imfsbSvc.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: imfsbSvc.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K
Source: imfsbSvc.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: imfsbSvc.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: imfsbSvc.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: imfsbSvc.exeString found in binary or memory: http://ocsp.digicert.com0H
Source: imfsbSvc.exeString found in binary or memory: http://ocsp.digicert.com0I
Source: imfsbSvc.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: imfsbSvc.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: imfsbSvc.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: imfsbSvc.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\imfsbSvc.exeProcess token adjusted: Load DriverJump to behavior
Source: imfsbSvc.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Source: imfsbSvc.exe, 00000006.00000002.1640120067.000000006670E000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameimfsbDll.dll vs imfsbSvc.exe
Source: C:\Users\user\Desktop\imfsbSvc.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\imfsbDrvJump to behavior
Source: imfsbSvc.exeBinary string: DropAdminRightsNtAlpcConnectPortNtAlpcSendWaitReceivePortlsarpcsrvsvcwkssvcsamrnetlogon\device\mup\\PIPE\\device\namedpipe\ntsvcsplugplay\RPC Control\%s_NetProxy:Use=%c:Use=NtReplyWaitReceivePort beforeNtReplyWaitReceivePort afterGetProcessIdOfThreadProcessServer::Handler/msg->msgid: %dProcessServer::RunSandboxedHandlerProcessServer::RunSandboxedHandler/ cmd: %sdir: %senv: %sProcessServer::RunSandboxedHandler/CallerPid: %dProcessServer::RunSandboxedHandler/OpenProcess trueCallerInSandbox = trueCallerInSandbox = falsePrimaryTokenHandleCallerPid: %dRunSandboxedStartProcess sucRunSandboxedDupAndCloseHandles sucRunSandboxedDupAndCloseHandles failRunSandboxedStartProcess fail err: %d!PrimaryTokenHandleOpenProcess fail, err: %d*SYSTEM**THREAD*ProcessServer::RunSandboxedStartProcesscrflags2 != (*crflags)*COMSRV*cmd is *COMSRV*CallerProcessId: %dRunSandboxedComServer fail, !cmdCreateProcessAsUser cmd: %sCreateProcessAsUser LastError: %dSetThreadTokenSetThreadToken !ok LastError: %dok && StartProgramInSandboxSbieApi_CallTwo rc != 0 LastError: %d! ok TerminateProcess 1020!StartProgramInSandbox 1021!ok 1022\imfsbSvc.exe" Sandboxie_ComProxy_ComServer:pstorec.dllPStoreCreateInstanceGlobalSettingsUserSettings_UserSettings_PortableUserSettings_%08XMicrosoft Base Cryptographic Provider v1.0[%d / %08X]EditAdminOnlyEditPassword]
Source: imfsbSvc.exeBinary string: F.urlURLInternetShortcut ""00000000_SBIE_COMSRV_EXE00000000_SBIE_COMSRV_CMDiexplore.exewmplayer.exewinamp.exekmplayer.exe/Enqueue%S [HR=%08X/%d]"%s" "%s"O:SYG:SYD:(A;;GA;;;SY)%s-internal-%dDriverAssist::MsgWorkerThreadMsgWorkerThread msgid: %d[11 / %d]*?*?*?*[33 / %08X]\Software\Microsoft\Windows\CurrentVersion\ExplorerLogon User Name%S [%d / %d][%08X]\Registry\Machine\System\CurrentControlSet\Services\imfsbDrvSeLoadDriverPrivilege5.40%SLOWLEVEL.textzzzzLdrInitializeThunk\imfsbDll.dllLdrLoadDllLdrGetProcedureAddressNtRaiseHardErrorRtlFindActivationContextSectionStringkernel32.dll\32ERROR_NOT_READYInjectLow_OpenProcess failNtDeviceIoControlFileInjectLow_SendHandle failInjectLow_BuildTramp failInjectLow_CopySyscalls failInjectLow_CopyData failInjectLow_WriteJump fail!msg->bHostInjectGuiServer::GetInstance()->InitProcess failSbieApi_CallOne API_INJECT_COMPLETE sucerrlvl err: %d%S [%02X / %d]hProcesserrlvlInjectLow_OpenProcessOpenProcess suctime.dwLowDateTime == msg->create_time\Device\SandboxieDriverApi%S [%02X %02X %02X %02X %02X %02X %02X %02X %02X %02X %02X %02X]kernel32.dllntdll.dllLogFile%04d-%02d-%02d %02d:%02d:%02d %sMultiLog
Source: classification engineClassification label: mal48.evad.winEXE@9/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2472:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6824:120:WilError_03
Source: imfsbSvc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\sc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" >> C:\servicereg.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe"
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc start rJxyS >> C:\servicestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start rJxyS
Source: unknownProcess created: C:\Users\user\Desktop\imfsbSvc.exe C:\Users\user\Desktop\imfsbSvc.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start rJxySJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: imfsbdll.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\imfsbSvc.exeSection loaded: iphlpapi.dllJump to behavior
Source: imfsbSvc.exeStatic PE information: certificate valid
Source: imfsbSvc.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: imfsbSvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: imfsbSvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbDll.pdb source: imfsbSvc.exe, 00000006.00000002.1640048795.00000000666EE000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: C:\IMF9\sandboxie-master\core\low\obj\amd64\LowLevel.pdb source: imfsbSvc.exe
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbSvc.pdb source: imfsbSvc.exe
Source: Binary string: C:\IMF9\sandboxie-master\Bin\x64\SbieRelease\imfsbDll.pdb7 source: imfsbSvc.exe, 00000006.00000002.1640048795.00000000666EE000.00000002.00000001.01000000.00000004.sdmp
Source: imfsbSvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: imfsbSvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: imfsbSvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: imfsbSvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: imfsbSvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe"

Malware Analysis System Evasion

barindex
Source: imfsbSvc.exeBinary or memory string: [12 / %D][13 / %D][14 / %D][15 / %D][16 / %D][17 / %D][18 / %D]SANDBOXIE.INIINILOCATION.TMP-%DSBIECTRL_ENABLEAUTOSTARTDEFAULT /OPEN /SYNCSBIECTRL.EXESTARTSERVICE%S [%S]/ENV:00000000_SBIE_%S="%S" /BOX:-%D DEVICE_MAPSERVICE_NAME/HIDE_WINDOW IMFSBSTART.EXE%S_UACPROXY:%08X_%08X_%08X_%08X_@%S*MSI*WINDOWS INSTALLERSHGETSTOCKICONINFOSANDBOXIE_UAC_WINDOWCLASSARIAL" RUNASSHELLEXECUTEEXWWINSTA.DLLWINSTATIONQUERYINFORMATIONWWINSTATIONISSESSIONREMOTEABLEWINSTATIONNAMEFROMLOGONIDWWINSTATIONGETCONNECTIONPROPERTYWINSTATIONFREEPROPERTYVALUEWINSTATIONDISCONNECT
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start rJxySJump to behavior
Source: imfsbSvc.exeBinary or memory string: CicMarshalWndClassProgmanMSTaskSwWClassexcel.exepowerpnt.exe
Source: imfsbSvc.exeBinary or memory string: *GUIPROXY_%08X\imfsbSvc.exe" Sandboxie%s_GuiProxy_%08X,%dWinSta0\Default[%02X / %08X]_GuiProxy_Console,IsHungAppWindowuser32.dllNtUserQueryWindowwin32u.dll_GuiProxy%s_%s_Session_%d_Job_%08XS:(ML;;NW;;;LW)%s_WinSta_%d\%s_Desktop_%dSandboxie_ConsoleReadyEvent_%08XSandboxie_GuiProxy_Console,CloseClipboard %08XShell_TrayWndASIndicator/ignoreuipi$:
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Windows Service
12
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job2
LSASS Driver
2
LSASS Driver
1
DLL Side-Loading
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
12
Process Injection
Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1564516 Sample: imfsbSvc.exe Startdate: 28/11/2024 Architecture: WINDOWS Score: 48 23 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->23 25 Sigma detected: Suspicious New Service Creation 2->25 6 cmd.exe 2 2->6         started        9 cmd.exe 2 2->9         started        11 imfsbSvc.exe 2->11         started        process3 file4 21 C:\servicereg.log, ASCII 6->21 dropped 13 conhost.exe 6->13         started        15 sc.exe 1 6->15         started        17 conhost.exe 9->17         started        19 sc.exe 1 9->19         started        process5
SourceDetectionScannerLabelLink
imfsbSvc.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1564516
Start date and time:2024-11-28 13:03:54 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run as Windows Service
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:imfsbSvc.exe
Detection:MAL
Classification:mal48.evad.winEXE@9/2@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: imfsbSvc.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):28
Entropy (8bit):3.678439190827718
Encrypted:false
SSDEEP:3:4A4AnXjzSv:4HAnXjg
MD5:A8F4D690C5BDE96AD275C7D4ABE0E3D3
SHA1:7C62C96EFD2CA4F3C3EBF0B24C9B5B4C04A4570A
SHA-256:596CCC911C1772735AAC6A6B756A76D3D55BCECD006B980CF147090B2243FA7B
SHA-512:A875EBE3C5CDF222FF9D08576F4D996AF827A1C86B3E758CE23F6B33530D512A82CE8E39E519837512080C6212A0A19B3385809BE5F5001C4E488DD79550B852
Malicious:true
Reputation:moderate, very likely benign file
Preview:[SC] CreateService SUCCESS..
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):421
Entropy (8bit):3.524264899601009
Encrypted:false
SSDEEP:6:lg3D/8F/dldgVKBRjGxVVLvH2s/u8qLLFmLaZnsHgm66//V+NmBNefq:lgAddrgV0qVbH2suZLQqOVKmBNcq
MD5:29257B01CE5B8D1DF85BE23B08340F89
SHA1:25BAF3D0A63B65D088BF9E9856DB2BCF131B11FA
SHA-256:E064F0652AE5D3F1B8AE8F16ECA63CBED5ACBE0F71DA3E8229058199AEC7EF8C
SHA-512:DF5C4D51CBB0EB1E4AD6841C825C346599BB54C443D0DD17D51CE076026BF782EE8AD1CCE26A5308A0A944B3B7B78E72321FB0B01C62F1A1740005EF7E67255B
Malicious:false
Reputation:low
Preview:..SERVICE_NAME: rJxyS .. TYPE : 10 WIN32_OWN_PROCESS .. STATE : 2 START_PENDING .. (NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN).. WIN32_EXIT_CODE : 0 (0x0).. SERVICE_EXIT_CODE : 0 (0x0).. CHECKPOINT : 0x0.. WAIT_HINT : 0x7d0.. PID : 4960.. FLAGS : ..
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.337397239640206
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:imfsbSvc.exe
File size:347'344 bytes
MD5:ca73da8345de507ac023d52b4b5c1814
SHA1:ef32667de23715ef2903b185c08ed9b5dc7cfeed
SHA256:5b88f7d36fe435cd6944bda05f1758f64c7d5136a5f529a58522ac3b0dc9743a
SHA512:b5140ef135e8cafc7a6c3b7aaa514612e3ea6a25653c925385421c2bbba75cd51bd228ac5c671de383555658573293c1e20a93950ae1be52e86da6780aee4339
SSDEEP:6144:ZEtNasNqZsBotlNFVK12krBAixDbJeRG+2RzV5F0Xmbv9OiLLMyc5:ZEtNYZ3tlNFVo24AixPJqavLZc5
TLSH:E6747D45F3E418E5EA6BC13989A3D51BE67278111760DBDF0370826A3F23BD16A3DB21
File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......f..."..."...".....1.'.....3.......2.,....8..#.......*.......6............g..+....g..:.......!..."...........#.......7.....?.#..
Icon Hash:90cececece8e8eb0
Entrypoint:0x14001f170
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6139C8DD [Thu Sep 9 08:42:05 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e20cce52935dcbdf120d0fe332168d10
Signature Valid:true
Signature Issuer:CN=DigiCert EV Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 27/08/2019 01:00:00 30/08/2022 13:00:00
Subject Chain
  • CN="IObit CO., LTD", O="IObit CO., LTD", L=Chengdu, S=Sichuan, C=CN, SERIALNUMBER=91510107072412418F, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.1="Wuhou District, Chengdu", OID.1.3.6.1.4.1.311.60.2.1.2=Sichuan, OID.1.3.6.1.4.1.311.60.2.1.3=CN
Version:3
Thumbprint MD5:627EB5F58AA7BB5E49C3ED2D92DD61FD
Thumbprint SHA-1:C2D65E12D4FC8DB328577D74F4BD417FEC0F28B1
Thumbprint SHA-256:0686186695953609414F4D551738F90203E37E2E651CBB2E7CDB6F033E0EB155
Serial:0D98F5DF96C592C5B76BFDE1CB823096
Instruction
dec eax
sub esp, 28h
call 00007F0B911CB030h
dec eax
add esp, 28h
jmp 00007F0B911CA9B7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
mov eax, edx
dec eax
lea ecx, dword ptr [0001C9C9h]
dec eax
mov dword ptr [ebx], ecx
dec eax
lea edx, dword ptr [ebx+08h]
xor ecx, ecx
dec eax
mov dword ptr [edx], ecx
dec eax
mov dword ptr [edx+08h], ecx
dec eax
lea ecx, dword ptr [eax+08h]
call 00007F0B911CD909h
dec eax
lea eax, dword ptr [0001CA59h]
dec eax
mov dword ptr [ebx], eax
dec eax
mov eax, ebx
dec eax
add esp, 20h
pop ebx
ret
int3
xor eax, eax
dec eax
mov dword ptr [ecx+10h], eax
dec eax
lea eax, dword ptr [0001CA4Fh]
dec eax
mov dword ptr [ecx+08h], eax
dec eax
lea eax, dword ptr [0001CA34h]
dec eax
mov dword ptr [ecx], eax
dec eax
mov eax, ecx
ret
int3
dec eax
lea eax, dword ptr [0001C975h]
dec eax
mov dword ptr [ecx], eax
dec eax
add ecx, 08h
jmp 00007F0B911CD952h
int3
dec eax
mov dword ptr [esp+08h], ebx
push edi
dec eax
sub esp, 20h
dec eax
lea eax, dword ptr [0001C957h]
dec eax
mov edi, ecx
dec eax
mov dword ptr [ecx], eax
mov ebx, edx
dec eax
add ecx, 08h
call 00007F0B911CD92Fh
test bl, 00000001h
je 00007F0B911CAB3Fh
mov edx, 00000018h
dec eax
mov ecx, edi
call 00007F0B911CA4F5h
dec eax
mov eax, edi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
add esp, 20h
Programming Language:
  • [IMP] VS2015 UPD3.1 build 24215
  • [ C ] VS2015 UPD3.1 build 24215
  • [C++] VS2015 UPD3.1 build 24215
  • [RES] VS2015 UPD3 build 24213
  • [LNK] VS2015 UPD3.1 build 24215
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4893c0x118.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x530000x1fd0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4e0000x37a4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x50c000x40d0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x550000x6a8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x43b000x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43b600x94.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x380000xcb8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x363a30x36400adaed845aa76e95b19ef6d1b9451fad4False0.5539449524769585data6.392642559878584IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x380000x135a80x136005f82a5eab9777181ed6c7c5b5e0435eeFalse0.4251260080645161data5.113273953227112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x4c0000x1fb40xc00b219f7da6d9e6f8fc66fb1911b8d4f13False0.19108072916666666data2.5572052693801814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x4e0000x37a40x38001e90241e3e01b5bbab8207d7289818f8False0.474609375data5.5830297706186185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.gfids0x520000xe40x20028b7de2b64e0f9465b393905f515b86fFalse0.328125Linux/i386 core file of '\' (signal 55)2.0399083813350414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x530000x1fd00x2000a4de5172aee8728eca667ce5837ba7e3False0.4366455078125data4.546132680078495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x550000x6a80x8001bb762a032ac4543e7d043213ed3acb2False0.57666015625data5.002880185935442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_RCDATA0x531000x1a00PE32+ executable (DLL) (GUI) x86-64, for MS WindowsEnglishUnited States0.4307391826923077
RT_VERSION0x54b000x34cdataEnglishUnited States0.47393364928909953
RT_MANIFEST0x54e500x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
imfsbDll.dllSbieDll_IsOpenClsid, SbieApi_IsBoxEnabled, SbieDll_RunSandboxed, SbieApi_CallZero, SbieApi_CallOne, SbieApi_GetVersion, SbieApi_GetWork, SbieApi_GetHomePath, SbieApi_EnumProcessEx, SbieApi_SetUserName, SbieApi_GetUnmountHive, SbieDll_FormatMessage2, SbieDll_ComCreateStub, SbieDll_RunFromHome, SbieApi_QueryProcess, SbieDll_PortName, SbieApi_QueryProcessPath, SbieApi_QueryProcessEx2, SbieApi_QueryProcessInfo, SbieApi_QueryPathList, SbieDll_KillOne, SbieDll_FreeMem, SbieDll_QueueCreate, SbieDll_QueueGetReq, SbieDll_QueuePutRpl, SbieApi_QueryConf, SbieApi_CheckInternetAccess, SbieApi_QueryConfBool, SbieApi_CallTwo, SbieApi_SessionLeader, SbieApi_LogEx, SbieApi_Log, SbieApi_ReloadConf, SbieApi_OpenProcess, SbieDll_GetLanguage, SbieDll_FormatMessage0, SbieDll_GetServiceRegistryValue
ntdll.dllNtWriteFile, RtlLookupFunctionEntry, RtlVirtualUnwind, RtlUnwindEx, RtlPcToFileHeader, NtReadFile, NtSetInformationFile, NtQueryInformationFile, NtQueryDirectoryFile, NtCreateFile, RtlSetDaclSecurityDescriptor, RtlNtStatusToDosError, NtAllocateVirtualMemory, NtLoadDriver, RtlInitUnicodeString, NtReplyWaitReceivePort, NtRequestPort, NtCreatePort, NtUnloadKey, NtOpenKey, NtOpenFile, NtClose, NtQueryKey, NtQuerySystemInformation, NtLoadKey, RtlCreateSecurityDescriptor, NtQueryInformationProcess, NtSetInformationThread, NtOpenProcessToken, NtOpenThreadToken, NtQueryInformationToken, NtDuplicateToken, NtFilterToken, NtConnectPort, NtRequestWaitReplyPort, NtAcceptConnectPort, NtCompleteConnectPort, NtImpersonateClientOfPort, NtOpenDirectoryObject, NtSetInformationProcess, NtOpenProcess, NtDuplicateObject, RtlCaptureContext
KERNEL32.dllEncodePointer, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, IsDebuggerPresent, UnhandledExceptionFilter, CloseHandle, GetLastError, HeapCreate, HeapAlloc, HeapFree, GetProcessHeap, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, SetEvent, WaitForSingleObject, CreateMutexW, OpenMutexW, CreateEventW, OpenEventW, Sleep, ExitProcess, TerminateProcess, CreateThread, GetCurrentThread, OpenProcess, GetTickCount, CreateFileMappingW, OpenFileMappingW, MapViewOfFile, UnmapViewOfFile, GetProcAddress, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, LocalFree, WaitForMultipleObjects, GetEnvironmentVariableW, TlsFree, GetFullPathNameW, GetPrivateProfileStringW, CreateFileW, SetFilePointer, WriteFile, OutputDebugStringW, DuplicateHandle, SetLastError, GetProcessTimes, GetCurrentProcess, SetThreadPriority, TerminateThread, GetLocalTime, GetVersionExW, VirtualAlloc, VirtualFree, VirtualAllocEx, VirtualProtectEx, ReadProcessMemory, WriteProcessMemory, GetModuleHandleA, LoadResource, LockResource, SizeofResource, LocalAlloc, FindResourceW, GetSystemWindowsDirectoryW, ResetEvent, GetCurrentProcessId, GetCurrentThreadId, ProcessIdToSessionId, IsProcessInJob, GetModuleHandleW, GlobalSize, LoadLibraryW, RegisterWaitForSingleObject, UnregisterWait, CreateJobObjectW, AssignProcessToJobObject, QueryInformationJobObject, SetInformationJobObject, AllocConsole, GetConsoleWindow, GetConsoleProcessList, RaiseException, InitializeCriticalSectionAndSpinCount, GetCommandLineW, GetSystemInfo, CancelIo, DefineDosDeviceW, OpenThread, TlsAlloc, TlsGetValue, TlsSetValue, ResumeThread, QueueUserWorkItem, GetExitCodeProcess, DeleteFileW, GetFileAttributesW, SetEndOfFile, SetFileAttributesW, HeapReAlloc, GetWindowsDirectoryW, CopyFileW, SuspendThread, CreateProcessW, GetModuleFileNameW, MulDiv, FreeLibrary, LoadLibraryExW, GetStringTypeW, GetModuleHandleExW, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, GetACP, GetFileType, LCMapStringW, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, HeapSize, GetConsoleCP, GetConsoleMode, SetFilePointerEx, FlushFileBuffers, SetCurrentDirectoryW, WriteConsoleW
USER32.dllGetClassLongPtrA, GetClassLongPtrW, GetDesktopWindow, GetParent, EnumChildWindows, FindWindowA, FindWindowW, FindWindowExA, FindWindowExW, GetShellWindow, EnumWindows, EnumThreadWindows, GetClassNameA, GetClassNameW, GetWindowThreadProcessId, GetWindow, GetIconInfo, ChangeDisplaySettingsExA, ChangeDisplaySettingsExW, MonitorFromWindow, GetWindowInfo, UserHandleGrantAccess, PackDDElParam, RegisterClassExW, ShowWindow, BeginPaint, EndPaint, GetMonitorInfoW, GetClientRect, GetPropW, GetPropA, SetPropW, ReleaseDC, GetDC, GetClassLongW, IsWindowEnabled, IsWindowUnicode, KillTimer, EnumClipboardFormats, GetClipboardData, GetClipboardSequenceNumber, IsZoomed, IsIconic, IsWindowVisible, SetWindowPos, DestroyWindow, IsWindow, CreateWindowExW, RegisterClassW, DefWindowProcW, PostMessageW, PostMessageA, SendNotifyMessageW, SendNotifyMessageA, SendMessageTimeoutW, SendMessageW, SendMessageA, GetProcessWindowStation, SetProcessWindowStation, CreateWindowStationW, GetThreadDesktop, SetThreadDesktop, CreateDesktopW, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, SetTimer, DispatchMessageW, GetMessageW, wsprintfW, GetClassLongA, GetWindowLongPtrW, GetWindowLongPtrA, GetWindowLongW, GetWindowLongA, MapWindowPoints, ScreenToClient, ClientToScreen, ClipCursor, SetCursorPos, SetForegroundWindow, GetWindowRect
ADVAPI32.dllCreateProcessAsUserW, OpenThreadToken, DuplicateTokenEx, OpenProcessToken, AdjustTokenPrivileges, LookupAccountSidW, LookupPrivilegeValueW, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, ConvertStringSidToSidW, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegOpenUserClassesRoot, RegOpenCurrentUser, GetSecurityDescriptorSacl, GetTokenInformation, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetTokenInformation, SetSecurityInfo, CloseServiceHandle, ControlService, EnumServicesStatusExW, OpenSCManagerW, OpenServiceW, StartServiceW, OpenEventLogW, ReportEventW, RegisterServiceCtrlHandlerExW, SetServiceStatus, StartServiceCtrlDispatcherW, RevertToSelf, SetThreadToken, AddAccessAllowedAce, DuplicateToken, GetLengthSid, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, CryptAcquireContextW, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, QueryServiceStatusEx, QueryServiceConfig2W, CryptHashData, CryptDestroyHash, EnumServicesStatusW, QueryServiceConfigW
PSAPI.DLLGetModuleBaseNameW, EnumProcessModules
ole32.dllCreateStreamOnHGlobal, CoInitializeEx, CoInitialize, CoRevokeClassObject, CoRegisterClassObject, CoGetObject, CoTaskMemFree, StringFromGUID2, CoCopyProxy, CoSetProxyBlanket, CoQueryProxyBlanket, CoInitializeSecurity, CoUnmarshalInterface, CoMarshalInterface, CoGetClassObject
CRYPT32.dllCryptProtectData, CryptUnprotectData
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock
GDI32.dllTextOutW, DeleteDC, GetDIBits, GetMetaFileBitsEx, GetEnhMetaFileBits, CreateFontW, CreateSolidBrush, GetDeviceCaps, SelectObject, SetBkColor, CreateCompatibleDC, SetTextColor
NETAPI32.dllNetUseAdd
WTSAPI32.dllWTSQueryUserToken
RPCRT4.dllRpcStringFreeW, RpcBindingToStringBindingW, RpcMgmtEpEltInqBegin, RpcMgmtEpEltInqDone, RpcMgmtEpEltInqNextW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:07:04:41
Start date:28/11/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe" >> C:\servicereg.log 2>&1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:07:04:41
Start date:28/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:07:04:41
Start date:28/11/2024
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc create rJxyS binpath= "C:\Users\user\Desktop\imfsbSvc.exe"
Imagebase:0xb70000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:3
Start time:07:04:42
Start date:28/11/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc start rJxyS >> C:\servicestart.log 2>&1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:07:04:42
Start date:28/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:07:04:42
Start date:28/11/2024
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc start rJxyS
Imagebase:0xb70000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:6
Start time:07:04:42
Start date:28/11/2024
Path:C:\Users\user\Desktop\imfsbSvc.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\imfsbSvc.exe
Imagebase:0x7ff6e9c20000
File size:347'344 bytes
MD5 hash:CA73DA8345DE507AC023D52B4B5C1814
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

No disassembly