Windows
Analysis Report
[SOH] CS1.6 Hack v2.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
[SOH] CS1.6 Hack v2.exe (PID: 7528 cmdline:
"C:\Users\ user\Deskt op\[SOH] C S1.6 Hack v2.exe" MD5: 4EEAB4B5B16939A50019E34F53CC8536) conhost.exe (PID: 7536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7588 cmdline:
C:\Windows \system32\ cmd.exe /c color F8 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) WerFault.exe (PID: 7712 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 528 -s 576 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 2 Software Packing | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
60% | Virustotal | Browse | ||
64% | ReversingLabs | Win32.Trojan.Generic |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1655136 |
Start date and time: | 2025-04-03 00:52:57 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | [SOH] CS1.6 Hack v2.exe (renamed file extension from bat to exe) |
Original Sample Name: | [SOH] CS1.6 Hack v2.bat |
Detection: | MAL |
Classification: | mal48.winEXE@5/6@0/0 |
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WerFault.exe, WMIA DAP.exe, SIHClient.exe, SgrmBr oker.exe, conhost.exe, svchost .exe - Excluded IPs from analysis (wh
itelisted): 104.208.16.94, 20. 190.163.18, 184.31.69.3, 20.12 .23.50 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, login.live.com, slscr.upda te.microsoft.com, blobcollecto r.events.data.trafficmanager.n et, ctldl.windowsupdate.com, u mwatson.events.data.microsoft. com, fe3cr.delivery.mp.microso ft.com, onedsblobprdcus16.cent ralus.cloudapp.azure.com - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
18:53:57 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8187705350218806 |
Encrypted: | false |
SSDEEP: | 96:H5FR7sOqSsOujsOytsnsO9h6nsOf7PfKQXIDcQvc6QcEVcw3cE/MsO4sOz+HbHgd:ZrwbAtb0BU/ojTZzuiFbZ24IO8b |
MD5: | C08751FEB3292953B268C4C7FB81849D |
SHA1: | 40430448810F5386927C8B5ACFD04C26997CCBC0 |
SHA-256: | 0297545A0FB8DDE7DC2B2E869D9FC42B82842ABDB6060F1A5B65D61392D68D80 |
SHA-512: | ECD0F893DFD814A112EE9C318FFFB29498FFF607CA69F9847D828E75CF6C5E1859E0A4DD4388F21BDC0338E5A1D4C08EC4318D181FAC882B49A7A3171060406E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49026 |
Entropy (8bit): | 2.0974402613877143 |
Encrypted: | false |
SSDEEP: | 192:J9AhwR+gMOOOO9GAs8568pU9bwnYWBJMBv3ysy+A0tKAjQieVuk5z:bAnXOJO9GArzYoJMlysvdKAgVuA |
MD5: | D3ABA2F14862E62DFBBBC3622A29E3BB |
SHA1: | 8A4A496A9E3D18690DE01EB896E19755BD5156B8 |
SHA-256: | 8E110F6803E5D10560990886CA3F2B93E6E44F9D28DB6EB60A3356F803F12A96 |
SHA-512: | 4AF56ABF2844F1270F77032F22E735FB553D388FEA86BF9B6C959C525527B3856B93DA048AB71FB934D9F20C0D1449A8BE87A7102B90C3BA48170673A9651B3D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8352 |
Entropy (8bit): | 3.705025873047624 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJXj66d6YZiSU9WqgmfhHpr+89bexsfyqm:R6lXJz66d6YcSU9Wqgmfh9eqfW |
MD5: | CFC60879473BCBE1235CBABDE86601F7 |
SHA1: | AF52AD6F24638BC00F29D3A565050E38916C5085 |
SHA-256: | 4F44B9A625BD4F577E9BCE191F941AE6060BA2112D338A1FE89AA41F7A00B4F3 |
SHA-512: | 6B79700027196E79C94A3602F4304929B621910F3FB1E3CE30465EC0CF753D87E3603CB8F7247C507EFA449EEE56F5813B7CAEE7066274CCB4C5A8FE691DF6A3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4646 |
Entropy (8bit): | 4.500667350444125 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsmSJg77aI9/MWpW8VYCYm8M4JWanrFgJ+q8VI53L2C8Usvd:uIjfmgI7Fl7VKJaJRr87vd |
MD5: | A34F16B32EE0DACF237A457A9E0EF59B |
SHA1: | 70B5094A8AB180B2B80A0C8218973DE63589079A |
SHA-256: | 60BBFFF2B9BF6982A169E1D8685ADA635B600BE0F1E86C24ADC818DA32D7A284 |
SHA-512: | 14F6F1325D6DCB31558431CFE748F769098C0A68965D56ECE8310183BD27CB6D4B543984BFF50FFB73C94DB83445C510ABC2BCA46CC8E408379ABC605319708C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.471857372939963 |
Encrypted: | false |
SSDEEP: | 6144:qzZfpi6ceLPx9skLmb0fjZWSP3aJG8nAgeiJRMMhA2zX4WABlFuNKjDH5S:sZHtjZWOKnMM6bFkMj4 |
MD5: | B7978DBB7EFE6D537461852783A49763 |
SHA1: | F382CD76506FA6CA38CF6BBDB2354CF69225EB64 |
SHA-256: | 8BE670DD2F5C99121D5CFC26025343BCBC2E11465F1A9D86D17126AFA058FB06 |
SHA-512: | E9EA55996299E23FDCB2DD64F5D37BE4E54DC60B9941ACFFBB7EDA5D59DC58E4843850EB9AC789EADD54467E82DFF2C94B2355965FF892FFD05081DEBEE9F54A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\[SOH] CS1.6 Hack v2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7 |
Entropy (8bit): | 2.5216406363433186 |
Encrypted: | false |
SSDEEP: | 3:jwn:jwn |
MD5: | 2F64267CB717CEE85054093DA85FD90A |
SHA1: | 143C26032E49EDE7EB60483F92104855AC658995 |
SHA-256: | 8B1E909395FA237DD09D038F5A27F6B43E381F29AB50ACD2653B2DE9411EC88D |
SHA-512: | 50827B561805DDABBBDFAC826A166468272C1877C924C7E64BFDC16DC46BBE4DEEDA5BC6F5421BCF0AE1989ACFE83B8A53E1674127BDED9D3401DEB67C10F31E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.948939926981446 |
TrID: |
|
File name: | [SOH] CS1.6 Hack v2.exe |
File size: | 67'585 bytes |
MD5: | 4eeab4b5b16939a50019e34f53cc8536 |
SHA1: | 1bcf2a73174f1b388646e0c8db2ade63eb03dd24 |
SHA256: | 0977ee8dff943b199d60adc10077f361611e0428cd4781ff5ae556a0192be1a6 |
SHA512: | 48adf7ed1da4046add7d3fb974800210380b09467f8884591e1931297145c44f9a4c1a7b9ed191f7b5547ec6b718134553f6e6def6d31c578da6ccbaa58fb90f |
SSDEEP: | 1536:SJx5JMnXmqrxr5MHVIZ675/tOCqRm45BIJFMJ3Li0BXXTOM5:SJQRVr53Z6tt7qRzYFh0BXXh |
TLSH: | 1C630252909B6B3CC279C33B18BF05E24864385B81A6DB73D7CB51A6ED287C8214C3B3 |
File Content Preview: | MZ@.....................................!..L.!Win32 .EXE...$@...PE..L...gv|O.................~...:....................@.......................... ................... ......................................................................................... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4301a6 |
Entrypoint Section: | .MPRESS2 |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F7C7667 [Wed Apr 4 16:27:19 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | 4b56b32aa086612dc2211b44e12d520f |
Instruction |
---|
pushad |
call 00007F6AB08E7A95h |
pop eax |
add eax, 00000B5Ah |
mov esi, dword ptr [eax] |
add esi, eax |
sub eax, eax |
mov edi, esi |
lodsw |
shl eax, 0Ch |
mov ecx, eax |
push eax |
lodsd |
sub ecx, eax |
add esi, ecx |
mov ecx, eax |
push edi |
push ecx |
dec ecx |
mov al, byte ptr [ecx+edi+06h] |
mov byte ptr [ecx+esi], al |
jne 00007F6AB08E7A88h |
sub eax, eax |
lodsb |
mov ecx, eax |
and cl, FFFFFFF0h |
and al, 0Fh |
shl ecx, 0Ch |
mov ch, al |
lodsb |
or ecx, eax |
push ecx |
add cl, ch |
mov ebp, FFFFFD00h |
shl ebp, cl |
pop ecx |
pop eax |
mov ebx, esp |
lea esp, dword ptr [esp+ebp*2-00000E70h] |
push ecx |
sub ecx, ecx |
push ecx |
push ecx |
mov ecx, esp |
push ecx |
mov dx, word ptr [edi] |
shl edx, 0Ch |
push edx |
push edi |
add ecx, 04h |
push ecx |
push eax |
add ecx, 04h |
push esi |
push ecx |
call 00007F6AB08E7AF3h |
mov esp, ebx |
pop esi |
pop edx |
sub eax, eax |
mov dword ptr [edx+esi], eax |
mov ah, 10h |
sub edx, eax |
sub ecx, ecx |
cmp ecx, edx |
jnc 00007F6AB08E7AB8h |
mov ebx, ecx |
lodsb |
inc ecx |
and al, FEh |
cmp al, E8h |
jne 00007F6AB08E7A84h |
inc ebx |
add ecx, 04h |
lodsd |
or eax, eax |
js 00007F6AB08E7A98h |
cmp eax, edx |
jnc 00007F6AB08E7A77h |
jmp 00007F6AB08E7A98h |
add eax, ebx |
js 00007F6AB08E7A71h |
add eax, edx |
sub eax, ebx |
mov dword ptr [esi-04h], eax |
jmp 00007F6AB08E7A68h |
call 00007F6AB08E7A95h |
pop edi |
add edi, FFFFFF4Dh |
mov al, E9h |
stosb |
mov eax, 00000B56h |
stosd |
call 00007F6AB08E7A95h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x30000 | 0x1a8 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x31000 | 0x2b0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x300a0 | 0x38 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.MPRESS1 | 0x1000 | 0x2f000 | 0xf400 | 32ad70d792a0d1c06e7e6ad41fbc9da7 | False | 1.0000960553278688 | data | 7.996976368895077 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.MPRESS2 | 0x30000 | 0xd10 | 0xe00 | 07e8cde14ef459b98c3305cce8570fe6 | False | 0.5463169642857143 | data | 5.753649772857798 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x31000 | 0x2b0 | 0x400 | 921e2b5a4bcfc94d1b4c9fd8e1b0e982 | False | 0.3525390625 | data | 4.100127979411817 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x31058 | 0x256 | ASCII text, with CRLF line terminators | English | United States | 0.5100334448160535 |
DLL | Import |
---|---|
KERNEL32.DLL | GetModuleHandleA, GetProcAddress |
USER32.dll | GetDC |
GDI32.dll | CreateFontA |
WINMM.dll | timeGetTime |
OPENGL32.dll | glGenLists |
SHLWAPI.dll | PathStripPathA |
MSVCR90.dll | rand |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 18:53:53 |
Start date: | 02/04/2025 |
Path: | C:\Users\user\Desktop\[SOH] CS1.6 Hack v2.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 67'585 bytes |
MD5 hash: | 4EEAB4B5B16939A50019E34F53CC8536 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 18:53:53 |
Start date: | 02/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68dae0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 18:53:53 |
Start date: | 02/04/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2a0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 18:53:54 |
Start date: | 02/04/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe70000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |