conti_sample

94bdec109405050d31c2748fe3db32a357f554a441e0eae0af015e8b6461553e

Analysis SignalStatusDetails
Address Space Layout RandomizationDynamicBaseAddress Space Layout Randomization (ASLR) randomizes the memory locations used by system executables and DLLs, making it more difficult for attackers to predict target addresses.
Data Execution PreventionEnabledData Execution Prevention (DEP) prevents code execution from data pages, making buffer overflow attacks more difficult by marking memory regions as non-executable.
Control Flow GuardDisabledControl Flow Guard (CFG) is a Microsoft security feature that helps prevent memory corruption vulnerabilities by checking that indirect calls only target valid destinations.
Return Flow Guard (RFG)DisabledEnsures return addresses resolve to valid destinations, defeating ROP gadgets that pivot via RET.
Stack Buffer Security CheckDisabledStack Buffer Security Check (GS) provides protection against stack-based buffer overflows by placing a security cookie on the stack that is verified before a function returns.
Structured Exception Handler Overwrite ProtectionDisabledStructured Exception Handler (SEH) Overwrite Protection prevents the exploitation of exception handlers by verifying they are registered properly before they are called.
Safe Exception Handlers (SafeSEH)DisabledRestricts exception handler pointers to a linker-verified table, blocking many SEH-overwrite exploits on 32-bit images.
High Entropy ASLRDisabledHigh Entropy ASLR increases the randomization space of 64-bit processes, making it substantially more difficult for attackers to predict memory addresses.
Dynamic BaseEnabledAllows the Windows loader to relocate the image to a random base address at every launch instead of loading it at its preferred RVA
Authenticode SignatureDisabledA Microsoft PKI signature that allows the OS to verify publisher identity and tamper-proof the binary.
Force IntegrityDisabledPrevents the loader from starting the file if the Authenticode signature is missing or invalid, stopping unsigned patching attacks.
Manifest IsolationEnabledEmbeds a manifest that isolates the app from side-by-side DLL hijacking, favouring strong-named versioned assemblies.
CLR (.NET)NativeIndicates if the binary is a managed .NET assembly; changes exploit surface (JIT, GC, etc.).