Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA

Overview

General Information

Sample URL:https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA
Analysis ID:1426822
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 1632 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 2200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 6092 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1, CommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5728, ProcessCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1, ProcessId: 1632, ProcessName: cmd.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 162.125.9.18:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like GeckoAccept: */*Accept-Encoding: identityHost: www.dropbox.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: www.dropbox.com
Source: wget.exe, 00000002.00000002.1983778141.0000000001115000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drString found in binary or memory: https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA
Source: wget.exe, 00000002.00000002.1983778141.0000000001110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiAPR
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownHTTPS traffic detected: 162.125.9.18:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: classification engineClassification label: clean1.win@4/1@1/1
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2200:120:WilError_03
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: wget.exe, 00000002.00000002.1983534444.0000000000A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://www.dropbox.com/l/aadmt_zaht_hohazubumscb681rytsgmfia" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://www.dropbox.com/l/aadmt_zaht_hohazubumscb681rytsgmfia"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://www.dropbox.com/l/aadmt_zaht_hohazubumscb681rytsgmfia" Jump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1426822 URL: https://www.dropbox.com/l/A... Startdate: 16/04/2024 Architecture: WINDOWS Score: 1 13 www.dropbox.com 2->13 15 www-env.dropbox-dns.com 2->15 6 cmd.exe 2 2->6         started        process3 process4 8 wget.exe 1 6->8         started        11 conhost.exe 6->11         started        dnsIp5 17 www-env.dropbox-dns.com 162.125.9.18, 443, 49705 DROPBOXUS United States 8->17
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www-env.dropbox-dns.com
162.125.9.18
truefalse
    unknown
    www.dropbox.com
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiAfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiAPRwget.exe, 00000002.00000002.1983778141.0000000001110000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          162.125.9.18
          www-env.dropbox-dns.comUnited States
          19679DROPBOXUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1426822
          Start date and time:2024-04-16 17:10:00 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 35s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:urldownload.jbs
          Sample URL:https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean1.win@4/1@1/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Unable to download file
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Not all processes where analyzed, report is missing behavior information
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Windows\SysWOW64\cmd.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):328
          Entropy (8bit):5.3579031113038935
          Encrypted:false
          SSDEEP:6:HRo1L2/F4GLHOvxfwL7duShr1IDuu+uShrKnQT1De5RhgZwc6REkbL2kuRLr:HRoLQF4aOpY1uEryDkuErKnQT1De5Rhe
          MD5:C221371A3BF502D2491A2E3A0C9E34E0
          SHA1:47BF1D8E08ABD3535E55B996832DF03C2B6CB4F7
          SHA-256:E25E0352368C0826F61E106F8E0EEC287C10545557DF96FA4326F86C94958A9C
          SHA-512:89ED2B28E62B2BE9180C71BBCF106C5405D451B223E9E0E88F487E3A8C21E4B9B914141D127D11329CBD02CA8FFEFDD8E524C863B0CF0F734497F7C5B5DF9F76
          Malicious:false
          Reputation:low
          Preview:--2024-04-16 17:10:44-- https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA..Resolving www.dropbox.com (www.dropbox.com)... 162.125.9.18..Connecting to www.dropbox.com (www.dropbox.com)|162.125.9.18|:443... connected...HTTP request sent, awaiting response... 409 Conflict..2024-04-16 17:10:45 ERROR 409: Conflict.....
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Apr 16, 2024 17:10:44.993014097 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:44.993060112 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:44.993212938 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:44.994672060 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:44.994693041 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.331430912 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.332127094 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:45.334234953 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:45.334243059 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.334467888 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.337248087 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:45.384118080 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.735532999 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.735593081 CEST44349705162.125.9.18192.168.2.5
          Apr 16, 2024 17:10:45.735658884 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:45.774175882 CEST49705443192.168.2.5162.125.9.18
          Apr 16, 2024 17:10:45.774194956 CEST44349705162.125.9.18192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Apr 16, 2024 17:10:44.870866060 CEST5131553192.168.2.51.1.1.1
          Apr 16, 2024 17:10:44.976907969 CEST53513151.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 16, 2024 17:10:44.870866060 CEST192.168.2.51.1.1.10xf42bStandard query (0)www.dropbox.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 16, 2024 17:10:44.976907969 CEST1.1.1.1192.168.2.50xf42bNo error (0)www.dropbox.comwww-env.dropbox-dns.comCNAME (Canonical name)IN (0x0001)false
          Apr 16, 2024 17:10:44.976907969 CEST1.1.1.1192.168.2.50xf42bNo error (0)www-env.dropbox-dns.com162.125.9.18A (IP address)IN (0x0001)false
          • www.dropbox.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549705162.125.9.184436092C:\Windows\SysWOW64\wget.exe
          TimestampBytes transferredDirectionData
          2024-04-16 15:10:45 UTC228OUTGET /l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA HTTP/1.1
          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
          Accept: */*
          Accept-Encoding: identity
          Host: www.dropbox.com
          Connection: Keep-Alive
          2024-04-16 15:10:45 UTC484INHTTP/1.1 409 Conflict
          Content-Type: text/html
          Content-Security-Policy: sandbox allow-forms allow-scripts
          Date: Tue, 16 Apr 2024 15:10:45 GMT
          Server: envoy
          Strict-Transport-Security: max-age=31536000; includeSubDomains
          Content-Length: 1337
          Strict-Transport-Security: max-age=31536000; includeSubDomains
          Cache-Control: no-cache, no-store
          Vary: Accept-Encoding
          X-Dropbox-Response-Origin: far_remote
          X-Dropbox-Request-Id: b11108526b5445f5bd0ec0f8c0ba0982
          Connection: close
          2024-04-16 15:10:45 UTC1337INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 44 72 6f 70 62 6f 78 20 2d 20 34 30 39 3c 2f 74 69 74 6c 65 3e 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 66 6c 2e 64 72 6f 70 62 6f 78 73 74 61 74 69 63 2e 63 6f 6d 2f 73 74 61 74 69 63 2f 6d 65 74 61 73 65 72 76 65
          Data Ascii: <!DOCTYPE html><html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Dropbox - 409</title><link href="https://cfl.dropboxstatic.com/static/metaserve


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:17:10:44
          Start date:16/04/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA" > cmdline.out 2>&1
          Imagebase:0x790000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:17:10:44
          Start date:16/04/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:17:10:44
          Start date:16/04/2024
          Path:C:\Windows\SysWOW64\wget.exe
          Wow64 process (32bit):true
          Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://www.dropbox.com/l/AADMt_ZaHT_hoHAzUbuMSCB681rYTSgmfiA"
          Imagebase:0x400000
          File size:3'895'184 bytes
          MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly