Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.PUA.Win32.Presenoker.25612

Overview

General Information

Sample Name:SecuriteInfo.com.PUA.Win32.Presenoker.25612 (renamed file extension from 25612 to exe)
Analysis ID:334154
MD5:706ca89ed31bf43bdfcc0d3aca8c9af4
SHA1:012da89db7ff6a6ed7136a910b340faaab70b3f1
SHA256:c0522052999f973d3bd24ac557945bb710291f019d4d8b8b76c87625a2f12389

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • SecuriteInfo.com.PUA.Win32.Presenoker.exe (PID: 4828 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe' MD5: 706CA89ED31BF43BDFCC0D3ACA8C9AF4)
    • conhost.exe (PID: 4696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeVirustotal: Detection: 15%Perma Link
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeReversingLabs: Detection: 14%
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346543224.000000C000008000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346605059.000000C00003E000.00000004.00000001.sdmp, SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346577815.000000C00002C000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signature
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346605059.000000C00003E000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureAvail
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346661687.000000C00006B000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346661687.000000C00006B000.00000004.00000001.sdmp, SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346577815.000000C00002C000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346543224.000000C000008000.00000004.00000001.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdC:
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeString found in binary or memory: https://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdreflect:
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Number of sections : 22 > 10
Source: classification engineClassification label: mal52.spyw.winEXE@2/4@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile created: C:\Users\user\Desktop\resultsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4696:120:WilError_01
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Section: .text IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.344739479.0000000000C0A000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeVirustotal: Detection: 15%
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeReversingLabs: Detection: 14%
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeString found in binary or memory: bufio.Scanner: SplitFunc returns advance count beyond inputhttps://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdreflect: indirection through nil pointer to embedded structsync/atomic: store of inconsistently typed value into Valuesync: WaitGroup is reused before previous Wait has returnedtype of SQlite aggregator Step() return value must be errorunsupported Scan, storing driver.Value type %T into type %T/AppData/Roaming/Mozilla/Firefox/Profiles/*.default-release/addr range base and limit are not in the same memory segmentbytes.Reader.UnreadRune: previous operation was not ReadRuneinvalid context to convert cursor rows, missing parent *Rowsruntime: GetQueuedCompletionStatusEx returned invalid mode= runtime: netpoll: PostQueuedCompletionStatus failed (errno= 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZfound bad pointer in Go heap (incorrect use of unsafe or cgo?)runtime: internal error: misuse of lockOSThread/unlockOSThreadstrings.Reader.UnreadRune: previous operation was not ReadRune&([a-zA-Z]{2,31}[0-9]{0,2}|#([0-9]{1,7}|[xX][0-9a-fA-F]{1,6}));<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" Invalid _locking_mode: %v, expecting value of 'NORMAL EXCLUSIVEinput [security find-generic-password -wa 'Chrome'] in terminal/AppData/Local/BraveSoftware/Brave-Browser/User Data/Local StateABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_compileCallback: expected function with one uintptr-sized resultdriver ColumnConverter error converted %T to unsupported type %Tflate: invalid compression level %d: want value in range [-2, 9]json: invalid number literal, trying to unmarshal %q into Numberruntime.SetFinalizer: pointer not at beginning of allocated blockstrconv: internal error: extFloat.FixedDecimal called with n == 0 <meta name="GENERATOR" content="Blackfriday Markdown Processor vSELECT id, url, last_visit_date, title, visit_count FROM moz_placesbig: invalid 2nd argument to Int.Jacobi: need odd integer but got %sruntime:greyobject: checkmarks finds unexpected unmarked object obj=bytes.Buffer: UnreadByte: previous operation was not a successful readsecond return value of SQLite aggregator Done() function must be errorjson: invalid use of ,string struct tag, trying to unmarshal %q into %vtoo many concurrent operations on a single file or socket (max 1048575)Missing '_auth_pass' while user authentication was requested with '_auth'Missing '_auth_user' while user authentication was requested with '_auth'Invalid _auto_vacuum: %v, expecting value of '0 NONE 1 FULL 2 INCREMENTAL'bytes.Buffer: UnreadRune: previous operation was not a successful ReadRuneSELECT origin_url, username_value, password_value, date_created FROM loginsInvalid _synchronous: %v, expecting value of '0 OFF 1 NORMAL 2 FULL 3 EXTRA'runtime: found space for saved base pointer, but no framepointer experiment
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe 'C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic file information: File size 16128584 > 1048576
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x322400
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x230a00
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Raw size of /51 is bigger than: 0x100000 < 0x2a2800
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: Raw size of /113 is bigger than: 0x100000 < 0x3d1a00
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: real checksum: 0xf6a167 should be:
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: .xdata
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /4
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /19
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /35
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /51
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /63
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /77
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /89
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /102
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /113
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /124
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exeStatic PE information: section name: /138
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.348026490.0000021189A83000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History VolumeInformationJump to behavior

Stealing of Sensitive Information:

barindex
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login DataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter2Path InterceptionProcess Injection1Masquerading1OS Credential Dumping1Security Software Discovery1Remote ServicesData from Local System1Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemorySystem Information Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 334154 Sample: SecuriteInfo.com.PUA.Win32.... Startdate: 26/12/2020 Architecture: WINDOWS Score: 52 11 Multi AV Scanner detection for submitted file 2->11 6 SecuriteInfo.com.PUA.Win32.Presenoker.exe 6 2->6         started        process3 signatures4 13 Tries to harvest and steal browser information (history, passwords, etc) 6->13 9 conhost.exe 6->9         started        process5

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.PUA.Win32.Presenoker.exe16%VirustotalBrowse
SecuriteInfo.com.PUA.Win32.Presenoker.exe15%ReversingLabsWin64.Infostealer.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdreflect:SecuriteInfo.com.PUA.Win32.Presenoker.exefalse
    high
    https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureAvailSecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346605059.000000C00003E000.00000004.00000001.sdmpfalse
      high
      https://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdSecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346543224.000000C000008000.00000004.00000001.sdmpfalse
        high
        https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346661687.000000C00006B000.00000004.00000001.sdmp, SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346577815.000000C00002C000.00000004.00000001.sdmpfalse
          high
          https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureCSecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346661687.000000C00006B000.00000004.00000001.sdmpfalse
            high
            https://github.com/urfave/cli/blob/master/docs/CHANGELOG.md#deprecated-cli-app-action-signatureSecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346605059.000000C00003E000.00000004.00000001.sdmp, SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346577815.000000C00002C000.00000004.00000001.sdmpfalse
              high
              https://github.com/urfave/cli/blob/master/docs/CHANGELOG.mdC:SecuriteInfo.com.PUA.Win32.Presenoker.exe, 00000000.00000002.346543224.000000C000008000.00000004.00000001.sdmpfalse
                high
                No contacted IP infos

                General Information

                Joe Sandbox Version:31.0.0 Red Diamond
                Analysis ID:334154
                Start date:26.12.2020
                Start time:12:41:41
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 2m 50s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:SecuriteInfo.com.PUA.Win32.Presenoker.25612 (renamed file extension from 25612 to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:2
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal52.spyw.winEXE@2/4@0/0
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:Failed
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Stop behavior analysis, all processes terminated
                No simulations
                No context
                No context
                No context
                No context
                No context
                C:\Users\user\Desktop\Cookies
                Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe
                File Type:SQLite 3.x database, last written using SQLite version 3032001
                Category:dropped
                Size (bytes):20480
                Entropy (8bit):0.6951152985249047
                Encrypted:false
                SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBopIvJn2QOYiUG3PaVrX:T5LLOpEO5J/Kn7U1uBopIvZXC/alX
                MD5:EA7F9615D77815B5FFF7C15179C6C560
                SHA1:3D1D0BAC6633344E2B6592464EBB957D0D8DD48F
                SHA-256:A5D1ABB57C516F4B3DF3D18950AD1319BA1A63F9A39785F8F0EACE0A482CAB17
                SHA-512:9C818471F69758BD4884FDB9B543211C9E1EE832AC29C2C5A0377C412454E8C745FB3F38FF6E3853AE365D04933C0EC55A46DDA60580D244B308F92C57258C98
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\History
                Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe
                File Type:SQLite 3.x database, last written using SQLite version 3032001
                Category:dropped
                Size (bytes):118784
                Entropy (8bit):0.4589067735369779
                Encrypted:false
                SSDEEP:48:TXYBfHNPM5ETQTbKPHBsRkOLkRf+z4QHItYysX0uhnHu132RUioVeINUravDLjY/:UWU+bDoYysX0uhnydVjN9DLjGQLBE3u
                MD5:89CE01DCB0DC182AFF651E0094A2A7A2
                SHA1:DBFC15F5503780095741421FCC662D72460D804A
                SHA-256:1A0599ED2576D1224FDE5E4B512BF36AA0D322765C8F83ADDF9487D6D4E511E0
                SHA-512:86E16B4D227056BB75D51F4D01F69E8585626664401E14C1F052C8C9F6D6F4BF5C3FAB041FCDB33E9D8EBB82785D9B382E97FBBBCD0550BA49776C14934079EC
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\Login Data
                Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe
                File Type:SQLite 3.x database, last written using SQLite version 3032001
                Category:dropped
                Size (bytes):40960
                Entropy (8bit):0.792852251086831
                Encrypted:false
                SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\results\chrome_cookie.csv
                Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Win32.Presenoker.exe
                File Type:UTF-8 Unicode (with BOM) text
                Category:dropped
                Size (bytes):362
                Entropy (8bit):5.771550006160671
                Encrypted:false
                SSDEEP:6:lrbwqto4CyiBdg8vc7AZ7XoX51TbDgivd4YMrd71DLE7XGsTQ4D7lfBIXWo//Io6:JbwWo4mg807CXop1Tt4YYd7JL8h3vlJV
                MD5:78F412AEA7CA20287BCBD4F5713C4260
                SHA1:324652BA893BE62889108598F0F3ACA5190C8542
                SHA-256:D3E6BA3C71BA5DB058FE05E1A4869E94DEBB5049DDDC5B39B9CAF9CF79C92743
                SHA-512:DDF3FAD77D1D27D4D77D01E894143478B596086A442649E6E04FA935D493A2A5BFB945BD1FEE8E4446691D33CB105D9EFB5071CF3652C926B85494CB4D84827C
                Malicious:false
                Reputation:low
                Preview: .Host,Path,KeyName,Value,IsSecure,IsHTTPOnly,HasExpire,IsPersistent,CreateDate,ExpireDate..google.com,/,NID,204=XlJ-cT9Xg8DDNcFChe-nUGbxxEez8DRPGzgzUdZjP1JdN2YiNhfyRKFYdvFacUiguPGJxNZQxNzSiNVBcKqtq4ja7gbbvS3qQExvrcATH8SyD8dfy7IhIXh65vwy9wvzcYGB8MPR2c8HHGKEWDbc9DczP4qY4Ggc7D8ZFucZfEc,true,true,true,true,2020-09-30T15:22:32.814034Z,2021-04-01T15:22:32.814034Z.

                Static File Info

                General

                File type:PE32+ executable (console) x86-64, for MS Windows
                Entropy (8bit):5.490746762743521
                TrID:
                • Win64 Executable Console (202006/5) 92.65%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SecuriteInfo.com.PUA.Win32.Presenoker.exe
                File size:16128584
                MD5:706ca89ed31bf43bdfcc0d3aca8c9af4
                SHA1:012da89db7ff6a6ed7136a910b340faaab70b3f1
                SHA256:c0522052999f973d3bd24ac557945bb710291f019d4d8b8b76c87625a2f12389
                SHA512:daa4581420095acb91b8aee1768bf1b4b850d3e70c081950a75f1cbe272d41b093740d52f287c38badc990184ff08b7f0fa5ebe387d9a16c3025e8bff9fafc4d
                SSDEEP:98304:MtEfGgb4e5c8lDDSfJ9dMvCRmwj1YJ39UqDWIsymoaTrTAdBMuJICql:MtEOgb4e5cbJ9KvC3OszCJE
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......_.....8....&......$2..._...............@..............................@......g.....`... ............................

                File Icon

                Icon Hash:00828e8e8686b000

                General

                Entrypoint:0x4014e0
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, LINE_NUMS_STRIPPED
                DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                Time Stamp:0x5FCE0BB8 [Mon Dec 7 11:02:16 2020 UTC]
                TLS Callbacks:0x719fe0
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:1
                File Version Major:6
                File Version Minor:1
                Subsystem Version Major:6
                Subsystem Version Minor:1
                Import Hash:22c96a94a1d71cb6fbd5097c4874e51e
                Instruction
                dec eax
                sub esp, 28h
                dec eax
                mov eax, dword ptr [00578FD5h]
                mov dword ptr [eax], 00000000h
                call 00007FA48067767Fh
                call 00007FA48035EA2Ah
                nop
                nop
                dec eax
                add esp, 28h
                ret
                nop dword ptr [eax+00h]
                nop word ptr [eax+eax+00000000h]
                dec eax
                sub esp, 28h
                call 00007FA480678E6Ch
                dec eax
                test eax, eax
                sete al
                movzx eax, al
                neg eax
                dec eax
                add esp, 28h
                ret
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                push ebp
                dec eax
                mov ebp, esp
                dec eax
                lea ecx, dword ptr [00000015h]
                pop ebp
                jmp 00007FA48035ED74h
                nop dword ptr [eax+eax+00h]
                nop word ptr [eax+eax+00000000h]
                push ebp
                dec eax
                mov ebp, esp
                pop ebp
                ret
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                jmp dword ptr [eax]
                inc edi
                outsd
                and byte ptr [edx+75h], ah
                imul ebp, dword ptr [esp+20h], 203A4449h
                and dh, byte ptr [48736752h]
                imul eax, dword ptr [ebp+ebp+74h], 38h
                push ebp
                xor al, 2Dh
                dec ecx
                je 00007FA48035EE0Bh
                cmp byte ptr [ebx+53h], ch
                push 4647652Fh
                jp 00007FA48035EDF3h
                push eax
                inc esi
                imul ebx, dword ptr [ecx+4Bh], 2D765955h
                jbe 00007FA48035EE0Ch
                dec esi
                push 0000004Fh
                das
                dec ecx
                dec edi
                inc ebx
                jbe 00007FA48035EDF9h
                js 00007FA48035EDF7h
                jp 00007FA48035EE09h
                sub eax, 00645676h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x5c00000x5d365.edata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x61e0000x1698.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x57b0000x54a8.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x6220000x198e0.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x57a0200x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x61e50c0x4d0.idata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x3222800x322400unknownunknownunknownunknownIMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .data0x3240000x250600x25200False0.366115582912data4.30306727092IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .rdata0x34a0000x2309100x230a00unknownunknownunknownunknownIMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .pdata0x57b0000x54a80x5600False0.506268168605data5.81223809454IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .xdata0x5810000x58f00x5a00False0.133333333333data4.38047769652IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .bss0x5870000x38d800x0False0empty0.0IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .edata0x5c00000x5d3650x5d400False0.270950276475data6.00652676402IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .idata0x61e0000x16980x1800False0.298014322917data4.37126596025IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .CRT0x6200000x680x200False0.076171875data0.280401167659IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .tls0x6210000x100x200False0.02734375data0.0IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                .reloc0x6220000x198e00x19a00False0.286070884146data5.43823664342IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /40x63c0000x6800x800False0.26611328125data1.95337602316IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /190x63d0000x11f6e0x12000False0.256971571181data5.41767186239IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /350x64f0000x272db0x27400False0.200879528264data5.50517907022IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /510x6770000x2a26600x2a2800unknownunknownunknownunknownIMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /630x91a0000x24390x2600False0.271792763158data4.75715823172IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /770x91d0000xd9d3f0xd9e00False0.52933385327data6.22494233684IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /890x9f70000x5c2780x5c400False0.249769753557TIM image, (3088,2055)4.37271088559IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /1020xa540000x2e630x3000False0.435546875data4.87664561577IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /1130xa570000x3d19710x3d1a00unknownunknownunknownunknownIMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /1240xe290000xe97300xe9800False0.17447951519data2.57617936781IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                /1380xf130000x220x200False0.076171875data0.6216517742IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
                DLLImport
                KERNEL32.dllAddVectoredExceptionHandler, AreFileApisANSI, CloseHandle, CreateEventA, CreateFileA, CreateFileMappingA, CreateFileMappingW, CreateFileW, CreateIoCompletionPort, CreateMutexW, CreateThread, CreateWaitableTimerA, DeleteCriticalSection, DeleteFileA, DeleteFileW, DuplicateHandle, EnterCriticalSection, ExitProcess, FlushFileBuffers, FlushViewOfFile, FormatMessageA, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceA, GetDiskFreeSpaceW, GetEnvironmentStringsW, GetFileAttributesA, GetFileAttributesExW, GetFileAttributesW, GetFileSize, GetFullPathNameA, GetFullPathNameW, GetLastError, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetTempPathA, GetTempPathW, GetThreadContext, GetTickCount, GetVersionExA, GetVersionExW, HeapAlloc, HeapCompact, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, HeapValidate, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, LockFile, LockFileEx, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, OutputDebugStringW, PostQueuedCompletionStatus, ProcessIdToSessionId, QueryFullProcessImageNameA, QueryPerformanceCounter, ReadFile, ResumeThread, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetEndOfFile, SetErrorMode, SetEvent, SetFilePointer, SetProcessPriorityBoost, SetThreadContext, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsGetValue, TryEnterCriticalSection, UnhandledExceptionFilter, UnlockFile, UnlockFileEx, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                msvcrt.dll__getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _endthreadex, _errno, _fmode, _initterm, _localtime64, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcmp, memcpy, memmove, memset, qsort, realloc, signal, strcmp, strcspn, strlen, strncmp, strrchr, vfprintf
                NameOrdinalAddress
                _cgo_c73858d9e6d6_Cfunc__Cmalloc10x66ddc0
                _cgo_c73858d9e6d6_Cfunc__sqlite3_bind_blob20x66e1a0
                _cgo_c73858d9e6d6_Cfunc__sqlite3_bind_text30x66e1f0
                _cgo_c73858d9e6d6_Cfunc__sqlite3_create_function40x66e240
                _cgo_c73858d9e6d6_Cfunc__sqlite3_limit50x66e2a0
                _cgo_c73858d9e6d6_Cfunc__sqlite3_open_v260x66e2e0
                _cgo_c73858d9e6d6_Cfunc__sqlite3_prepare_v2_internal70x66e320
                _cgo_c73858d9e6d6_Cfunc__sqlite3_result_blob80x66df20
                _cgo_c73858d9e6d6_Cfunc__sqlite3_result_text90x66df30
                _cgo_c73858d9e6d6_Cfunc__sqlite3_step_internal100x66e370
                _cgo_c73858d9e6d6_Cfunc__sqlite3_step_row_internal110x66e3a0
                _cgo_c73858d9e6d6_Cfunc_free120x66de00
                _cgo_c73858d9e6d6_Cfunc_my_result_blob130x66eca0
                _cgo_c73858d9e6d6_Cfunc_my_result_text140x66ecc0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_aggregate_context150x66e410
                _cgo_c73858d9e6d6_Cfunc_sqlite3_backup_finish160x66de10
                _cgo_c73858d9e6d6_Cfunc_sqlite3_backup_init170x66de40
                _cgo_c73858d9e6d6_Cfunc_sqlite3_backup_pagecount180x66de80
                _cgo_c73858d9e6d6_Cfunc_sqlite3_backup_remaining190x66deb0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_backup_step200x66dee0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_double210x66e450
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_int220x66e490
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_int64230x66e4d0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_null240x66e510
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_parameter_count250x66e550
                _cgo_c73858d9e6d6_Cfunc_sqlite3_bind_parameter_index260x66e580
                _cgo_c73858d9e6d6_Cfunc_sqlite3_busy_timeout270x66e5c0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_clear_bindings280x66e600
                _cgo_c73858d9e6d6_Cfunc_sqlite3_close_v2290x66e630
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_blob300x66e660
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_bytes310x66e6a0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_count320x66e6e0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_decltype330x66e710
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_double340x66e750
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_int64350x66e790
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_name360x66e7d0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_text370x66e810
                _cgo_c73858d9e6d6_Cfunc_sqlite3_column_type380x66e850
                _cgo_c73858d9e6d6_Cfunc_sqlite3_commit_hook390x66e890
                _cgo_c73858d9e6d6_Cfunc_sqlite3_create_collation400x66e8d0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_db_filename410x66e920
                _cgo_c73858d9e6d6_Cfunc_sqlite3_enable_load_extension420x66ed10
                _cgo_c73858d9e6d6_Cfunc_sqlite3_errcode430x66e960
                _cgo_c73858d9e6d6_Cfunc_sqlite3_errmsg440x66e990
                _cgo_c73858d9e6d6_Cfunc_sqlite3_errstr450x66e120
                _cgo_c73858d9e6d6_Cfunc_sqlite3_exec460x66e9d0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_extended_errcode470x66ea20
                _cgo_c73858d9e6d6_Cfunc_sqlite3_finalize480x66ea50
                _cgo_c73858d9e6d6_Cfunc_sqlite3_free490x66ed50
                _cgo_c73858d9e6d6_Cfunc_sqlite3_get_autocommit500x66ea80
                _cgo_c73858d9e6d6_Cfunc_sqlite3_interrupt510x66eab0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_libversion520x66eac0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_libversion_number530x66eaf0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_load_extension540x66ed60
                _cgo_c73858d9e6d6_Cfunc_sqlite3_reset550x66eb20
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_double560x66df40
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_error570x66df50
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_error_toobig580x66ece0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_int590x66ecf0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_int64600x66df60
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_null610x66df70
                _cgo_c73858d9e6d6_Cfunc_sqlite3_result_zeroblob620x66ed00
                _cgo_c73858d9e6d6_Cfunc_sqlite3_rollback_hook630x66eb50
                _cgo_c73858d9e6d6_Cfunc_sqlite3_set_authorizer640x66eb90
                _cgo_c73858d9e6d6_Cfunc_sqlite3_sourceid650x66ebd0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_system_errno660x66ec00
                _cgo_c73858d9e6d6_Cfunc_sqlite3_threadsafe670x66ec30
                _cgo_c73858d9e6d6_Cfunc_sqlite3_update_hook680x66ec60
                _cgo_c73858d9e6d6_Cfunc_sqlite3_user_data690x66df80
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_blob700x66dfc0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_bytes710x66e000
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_double720x66e030
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_int64730x66e070
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_text740x66e0b0
                _cgo_c73858d9e6d6_Cfunc_sqlite3_value_type750x66e0f0
                _cgo_get_context_function760x719b80
                _cgo_init770x73b9e0
                _cgo_is_runtime_initialized780x719a20
                _cgo_maybe_run_preinit790x719960
                _cgo_notify_runtime_init_done800x73b9e8
                _cgo_panic810x5a4c80
                _cgo_preinit_init820x719900
                _cgo_release_context830x7198d0
                _cgo_sys_thread_start840x719c70
                _cgo_thread_start850x73b9f0
                _cgo_topofstack860x46b960
                _cgo_wait_runtime_init_done870x719a50
                _cgo_yield880x979fa0
                _cgoexp_c73858d9e6d6_authorizerTrampoline890x5c3a40
                _cgoexp_c73858d9e6d6_callbackTrampoline900x5c37a0
                _cgoexp_c73858d9e6d6_commitHookTrampoline910x5c3920
                _cgoexp_c73858d9e6d6_compareTrampoline920x5c38c0
                _cgoexp_c73858d9e6d6_doneTrampoline930x5c3860
                _cgoexp_c73858d9e6d6_preUpdateHookTrampoline940x5c3aa0
                _cgoexp_c73858d9e6d6_rollbackHookTrampoline950x5c3980
                _cgoexp_c73858d9e6d6_stepTrampoline960x5c3800
                _cgoexp_c73858d9e6d6_updateHookTrampoline970x5c39e0
                _sqlite3_create_function980x66e190
                _sqlite3_result_blob990x66e180
                _sqlite3_result_text1000x66e160

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                Behavior

                Click to jump to process

                System Behavior

                Start time:12:42:39
                Start date:26/12/2020
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff61de10000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis