Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe
Analysis ID:1669795
MD5:87464994d656d37c60e1642fe0f35f8b
SHA1:162a5cca3330e8b5d812bcbee3d139ea9458d445
SHA256:2b61670cf47f52f57144ea131c23f5ec6f418c2f99ddf6fc18df996949ce19bc
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file contains section with special chars
Entry point lies outside standard sections
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe (PID: 6380 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe" MD5: 87464994D656D37C60E1642FE0F35F8B)
    • conhost.exe (PID: 6376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeVirustotal: Detection: 23%Perma Link
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeReversingLabs: Detection: 44%
Source: Binary string: ".pdb^ source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Number of sections : 12 > 10
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Section: ZLIB complexity 1.0003055167597765
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Section: ZLIB complexity 0.9972727272727273
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Section: ZLIB complexity 0.9933588467714672
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engineClassification label: mal52.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6376:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeVirustotal: Detection: 23%
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeReversingLabs: Detection: 44%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: d3dcompiler_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: d3dx11_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeSection loaded: vcruntime140.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic file information: File size 5919760 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x171c00
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x382600
Source: Binary string: ".pdb^ source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name: .themida
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name: .boot
Source: SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exeStatic PE information: section name: entropy: 7.9832187796903495
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Software Packing
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1669795 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 20/04/2025 Architecture: WINDOWS Score: 52 10 Multi AV Scanner detection for submitted file 2->10 12 PE file contains section with special chars 2->12 6 SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe24%VirustotalBrowse
SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe44%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1669795
Start date and time:2025-04-20 16:05:33 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe
Detection:MAL
Classification:mal52.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 172.202.163.200
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe, PID 6380 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):7.980630104348216
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe
File size:5'919'760 bytes
MD5:87464994d656d37c60e1642fe0f35f8b
SHA1:162a5cca3330e8b5d812bcbee3d139ea9458d445
SHA256:2b61670cf47f52f57144ea131c23f5ec6f418c2f99ddf6fc18df996949ce19bc
SHA512:c418761918743453bd51a82844e2da2373b239b4d13cd2f50c3159eb412fc914583ee006da6cb1e371b3310f69245a32ea81f4abbe737d211dd63631b0e8422c
SSDEEP:98304:3GsEsgxB7Wq0AtlxIKUzlSGKfRT+mEemxgf5o/znQfHikt4DtOa3EkdESK0Pt1y:3Gxsg9jheQx3p4uZm8kEkdEkPt1y
TLSH:7F5633B8EB8039FDF71F47FD8CD628E6C1158EC089A2E36E62123CD964487BD851D691
File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........-...L...L...L...4p..L...4...L.......L.......L.......L.......L.......L..d....L...3...L..d....L...4...L...4...L..E....L...L...N.
Icon Hash:90cececece8e8eb0
Entrypoint:0x14092e058
Entrypoint Section:.boot
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x67ED3807 [Wed Apr 2 13:13:43 2025 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:083fd5f3a71f2bdcc080e2660e31bcc4
Instruction
call 00007F53B8D85807h
inc ecx
push edx
dec ecx
mov edx, esp
inc ecx
push edx
dec ecx
mov esi, dword ptr [edx+10h]
dec ecx
mov edi, dword ptr [edx+20h]
cld
mov dl, 80h
mov al, byte ptr [esi]
dec eax
inc esi
mov byte ptr [edi], al
dec eax
inc edi
mov ebx, 00000002h
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F53B8D85666h
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F53B8D856E0h
xor eax, eax
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F53B8D85788h
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
je 00007F53B8D8568Bh
push edi
mov eax, eax
dec eax
sub edi, eax
mov al, byte ptr [edi]
pop edi
mov byte ptr [edi], al
dec eax
inc edi
mov ebx, 00000002h
jmp 00007F53B8D8560Ah
mov eax, 00000001h
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F53B8D85689h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jc 00007F53B8D85668h
sub eax, ebx
mov ebx, 00000001h
jne 00007F53B8D856B0h
mov ecx, 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x31d5310x508.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x31f0000x1e4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x911cd00xaef0.themida
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xcb10000x10.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x31e0180x28.tls
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x10000x11037c0x86400f5bc739d68e85fe96fb04d5d487d9643False1.0003055167597765data7.9832187796903495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
0x1120000x47bd00x22600163272b0a4e732c93ffc63eb591c08f2False0.9972727272727273data7.973145239854265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x15a0000x1b5cb00x171c00b0f940f1d1e8b99b07f7f4d5e9a9c094False0.9933588467714672data7.955434878250804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x3100000xaed80x6800c7b4c3fb06a220952e6f8e5e75e381c9False0.9419320913461539data7.683058183812513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x31b0000x1e80x200708548c354f823fe4d670062da99e1edFalse0.591796875MS Windows COFF PA-RISC object file5.154511916994144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x31c0000xc080x8009d8b25851aaae56ccbcd350dbacc731cFalse0.91796875data7.400571047978993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.idata0x31d0000x10000xc00863fc2f60f4fcab30d96bfacc2497b2dFalse0.3271484375data3.7768457541794276IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x31e0000x10000x200d07380b220093615c128bc97bf0ab2c2False0.0625data0.28456851570206254IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x31f0000x10000x20035cb4e77eb3a62d3766739de7ba4ce77False0.5390625data4.765699291355714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.themida0x3200000x60e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.boot0x92e0000x3826000x382600f68275f18405c5c73318fc8e4c0fa858unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0xcb10000x10000x10cb12f238780babc608b98ceb972ffe8fFalse1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x31f0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
kernel32.dllGetModuleHandleA
d3d11.dllD3D11CreateDeviceAndSwapChain
D3DCOMPILER_43.dllD3DCompile
USER32.dllGetWindowTextA
GDI32.dllCreateRoundRectRgn
ADVAPI32.dllGetLengthSid
SHELL32.dllSHGetFolderPathA
ole32.dllCoInitializeEx
OLEAUT32.dllVariantInit
MSVCP140.dll?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
IMM32.dllImmSetCompositionWindow
dwmapi.dllDwmExtendFrameIntoClientArea
d3dx11_43.dllD3DX11CreateShaderResourceViewFromMemory
SHLWAPI.dllPathFindFileNameW
WININET.dllInternetCrackUrlA
WINHTTP.dllWinHttpConnect
IPHLPAPI.DLLGetAdaptersInfo
CRYPT32.dllCertGetCertificateChain
WS2_32.dllWSAStartup
PSAPI.DLLGetModuleInformation
USERENV.dllUnloadUserProfile
bcrypt.dllBCryptGenRandom
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll__C_specific_handler
api-ms-win-crt-stdio-l1-1-0.dll_lseeki64
api-ms-win-crt-utility-l1-1-0.dllrand
api-ms-win-crt-string-l1-1-0.dlltolower
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll_beginthreadex
api-ms-win-crt-convert-l1-1-0.dllstrtol
api-ms-win-crt-time-l1-1-0.dll_gmtime64
api-ms-win-crt-filesystem-l1-1-0.dll_fstat64
api-ms-win-crt-math-l1-1-0.dllfmodf
api-ms-win-crt-environment-l1-1-0.dllgetenv
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
Target ID:0
Start time:10:06:33
Start date:20/04/2025
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10147.7420.exe"
Imagebase:0x7ff6e2160000
File size:5'919'760 bytes
MD5 hash:87464994D656D37C60E1642FE0F35F8B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:10:06:33
Start date:20/04/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68dae0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly