Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Riskware.Application.25773.563.exe

Overview

General Information

Sample name:SecuriteInfo.com.Riskware.Application.25773.563.exe
Analysis ID:1532744
MD5:168b53e30b4b064151a7d3b5b8fb64b8
SHA1:60c94ca95e67a143984da48906760a10344af23a
SHA256:1bbda33a4a0ee71425e0ef5188383a661c01aa9f430f4cea6bdae78212f9c8e0
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeReversingLabs: Detection: 21%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability

System Summary

barindex
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: section name: .,[H
Source: classification engineClassification label: mal84.evad.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6228:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe "C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSection loaded: cryptbase.dllJump to behavior
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic file information: File size 28346898 > 1048576
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: Raw size of .CX. is bigger than: 0x100000 < 0x17bb600
Source: initial sampleStatic PE information: section where entry point is pointing to: .CX.
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: section name: .ZRz
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: section name: .,[H
Source: SecuriteInfo.com.Riskware.Application.25773.563.exeStatic PE information: section name: .CX.

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeMemory written: PID: 6204 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeMemory written: PID: 6204 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeMemory written: PID: 6204 base: 7FFE2238000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeMemory written: PID: 6204 base: 7FFE2223CBC0 value: E9 5A 34 14 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSpecial instruction interceptor: First address: 1424B3C62 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSpecial instruction interceptor: First address: 1424B3C90 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeWindow / User API: threadDelayed 3540Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeWindow / User API: threadDelayed 6452Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe TID: 6184Thread sleep time: -354000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe TID: 6184Thread sleep time: -645200s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess Stats: CPU usage > 42% for more than 60s
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeSystem information queried: KernelDebuggerInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeProcess token adjusted: DebugJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x14231C506Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtSetInformationProcess: Direct from: 0x1414C657DJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQueryInformationProcess: Direct from: 0x1424ACF73Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtSetInformationThread: Direct from: 0x14149A03FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtSetInformationThread: Direct from: 0x1424AF985Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1414AEB1DJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1414C44FAJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x14231C5CCJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1414A8B48Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x14131361DJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x14149432CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQueryInformationProcess: Direct from: 0x14231FC5AJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtClose: Indirect: 0x1424B3C5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x141412697Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtMapViewOfSection: Direct from: 0x1424A2D46Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x1424AF5F2Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Indirect: 0x1412C40D1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x1422D08E5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtUnmapViewOfSection: Direct from: 0x1422C5339Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1412FF191Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtClose: Direct from: 0x1414C5ED4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQueryInformationProcess: Direct from: 0x1424ACBB6Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQueryInformationProcess: Direct from: 0x1424B142FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1413F3190Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtQuerySystemInformation: Direct from: 0x1422D8EBCJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exeNtProtectVirtualMemory: Direct from: 0x1422BFB31Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
331
Virtualization/Sandbox Evasion
1
Credential API Hooking
52
Security Software Discovery
Remote Services1
Credential API Hooking
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory331
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Riskware.Application.25773.563.exe21%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532744
Start date and time:2024-10-13 21:40:28 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Riskware.Application.25773.563.exe
Detection:MAL
Classification:mal84.evad.winEXE@2/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
  • VT rate limit hit for: SecuriteInfo.com.Riskware.Application.25773.563.exe
TimeTypeDescription
15:42:26API Interceptor15102x Sleep call for process: SecuriteInfo.com.Riskware.Application.25773.563.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe
File Type:ASCII text, with CRLF, CR line terminators
Category:dropped
Size (bytes):1254
Entropy (8bit):1.501585090809539
Encrypted:false
SSDEEP:6:Y/ZluTZ1/h1gb5FFeJ4ajbWQwVd6ai041kUvuetFIgcNOPFaaP:Yg1/UbbE/ONfi0BUvLtm1oFLP
MD5:DFB4D3610120BAF39F0D9B85DABCC590
SHA1:5B350D803F831A6DC263F36E6F6D8A833CE80FE7
SHA-256:A21A250ECAEF2C6C15057F5767920495B791D0215D699A64B6C2567E09066133
SHA-512:C6311ED232FF518376B9F7C49E4ACA92BF343BCB3BA89D42E6F2EAD2C5969FD99E603D94A63BA9C3C5A50970A2F0FB958C79305AED1BAA6B2A469F0146F77871
Malicious:false
Reputation:low
Preview:. _ _ _ _ _ .. . __| |_ __(_)_ __ | (_) |_ ___ .. . / _` | '__| | '_ \ | | | __/ _ \.. . | (_| | | | | |_) | | | | || __/.. . \__,_|_| |_| .__/ |_|_|\__\___|.. . |_| .... . ....v3.2.................................. . Starting Drip Lite in 10 seconds...
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):7.920098021724909
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Riskware.Application.25773.563.exe
File size:28'346'898 bytes
MD5:168b53e30b4b064151a7d3b5b8fb64b8
SHA1:60c94ca95e67a143984da48906760a10344af23a
SHA256:1bbda33a4a0ee71425e0ef5188383a661c01aa9f430f4cea6bdae78212f9c8e0
SHA512:01fd6882d7fab22a1d8d57189c923224e3aa576f7c77a877fdd22febb928e70d8550d35d8789e36980a143050f1fb5f4afe5030fbe5ee9de5270d250d84616d5
SSDEEP:393216:x509tqWcvPnE1wPlqOlf5Y36of4VGP8ZpNlwy99sN2AyaWWqWi00kSE:x58tClmBAAPqpN7982AyaoW1F
TLSH:20573396B9E6A3D4D7834D006A4A22D570D5B29DC1BB9A1E2BC71C033530DBBCA49DF3
File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...X..f..........#......L...^........1........@.......................................... ........................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x142319dab
Entrypoint Section:.CX.
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CCA658 [Mon Aug 26 15:59:20 2024 UTC]
TLS Callbacks:0x422f56b9, 0x1, 0x4009b810, 0x1, 0x4009b890, 0x1
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:aa7790079e5da97cfab7bf84d8bc295b
Instruction
inc ecx
push esi
dec ecx
mov esi, FCB40FB1h
push esi
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x13199880x64.CX.
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2aaa0000x1ff.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2aa07600x8e50.CX.
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x14bc9300x28.CX.
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2aa06200x138.CX.
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x12ed0000x40.,[H
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x104a460x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1060000x3c1700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1430000xf30680x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x2370000x64e00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x23e0000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.ZRz0x23f0000x10ad1510x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.,[H0x12ed0000x780x2007bc2b85179055fb7dcd672b7d8393dbdFalse0.064453125data0.30609107431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CX.0x12ee0000x17bb5b00x17bb600476002243b6859beabfbe4ad5a8288eeunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x2aaa0000x1ff0x200551aca63bbe4416892bf141f14025a01False0.529296875data4.808766913049419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x2aaa0580x1a7XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5437352245862884
DLLImport
msvcrt.dll__C_specific_handler
USER32.dllCloseClipboard
KERNEL32.dllAcquireSRWLockExclusive
ADVAPI32.dllSystemFunction036
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:15:41:22
Start date:13/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.25773.563.exe"
Imagebase:0x140000000
File size:28'346'898 bytes
MD5 hash:168B53E30B4B064151A7D3B5B8FB64B8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:15:41:22
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly