Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Nexthink_Collector_Installer_Silent.exe

Overview

General Information

Sample name:Nexthink_Collector_Installer_Silent.exe
Analysis ID:1426833
MD5:a734e0ea93d16c673272cd373df1faf5
SHA1:b6454106405dfdb732641e34961a09127621bf5c
SHA256:603a9e9a531caf7bcea1992bfae68583f12beb7edac4768d4b50e76b16af60cd

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: certificate valid
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\wixca.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\Nexthink_Collector_Installer_Silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\scasched.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\scaexec.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msicollectorcustomactions.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msirun_silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\Nexthink_Collector_Installer_Silent.pdb/ source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msicollectorcustomactions.pdb' source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msirem_silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0K
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0N
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://wixtoolset.org
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crx;Software
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ffextension.nexthink.com/nexthink-latest-an-fx.xpiCan
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Resource name: BIN type: PE32+ executable (GUI) x86-64, for MS Windows
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Resource name: BIN type: PE32+ executable (GUI) x86-64, for MS Windows
Source: Nexthink_Collector_Installer_Silent.exeBinary or memory string: OriginalFilename vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsicollectorcustomactions.dllF vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamescasched.dll\ vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamescaexec.dll\ vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exeBinary or memory string: OriginalFilenamenxtinstaller.exeF vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exeBinary or memory string: OriginalFilenamemsirun.exeF vs Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exeBinary or memory string: OriginalFilenamemsirem.exeF vs Nexthink_Collector_Installer_Silent.exe
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeWindow detected: Number of UI elements: 35
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: certificate valid
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Nexthink_Collector_Installer_Silent.exeStatic file information: File size 70886592 > 1048576
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x4291400
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\wixca.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\Nexthink_Collector_Installer_Silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\scasched.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\agent\_work\138\s\build\ship\x86\scaexec.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msicollectorcustomactions.pdb source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msirun_silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\Nexthink_Collector_Installer_Silent.pdb/ source: Nexthink_Collector_Installer_Silent.exe
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msicollectorcustomactions.pdb' source: Nexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\jenkins\workspace\nexthinkinstaller_release_24.2.2\Local\bin\x64\Release\msirem_silent.pdb source: Nexthink_Collector_Installer_Silent.exe
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: Nexthink_Collector_Installer_Silent.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeCode function: 0_2_00007FF7D75874CC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7D75874CC
Source: C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory3
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://wixtoolset.orgNexthink_Collector_Installer_Silent.exe, 00000000.00000000.1679916321.00007FF7DB1CF000.00000002.00000001.01000000.00000003.sdmpfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1426833
    Start date and time:2024-04-16 17:22:21 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 51s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Nexthink_Collector_Installer_Silent.exe
    Detection:CLEAN
    Classification:clean1.winEXE@1/0@0/0
    EGA Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target Nexthink_Collector_Installer_Silent.exe, PID 7316 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.980505318400647
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Nexthink_Collector_Installer_Silent.exe
    File size:70'886'592 bytes
    MD5:a734e0ea93d16c673272cd373df1faf5
    SHA1:b6454106405dfdb732641e34961a09127621bf5c
    SHA256:603a9e9a531caf7bcea1992bfae68583f12beb7edac4768d4b50e76b16af60cd
    SHA512:966c5eb64f8d955e7692f1c9deefdc0bfd2544c47460432c342bbd64e333b68ef052d12802f6e39ce6f51df687aa3a59364c12fe16367b312faeb9f915d204b2
    SSDEEP:1572864:rAACpH7aKRZpaOsJPXtoYyCTbi0PuK4X8uU0L2wpAUfxoISl4mrhwKRkaQaNCNa3:rnCoUFsJhx34X8hAx7xlI4m1pRFQG0f4
    TLSH:85F733067E6401A9EEB7B139B5AE8900EA753C1513238ACB23F0759B1F73ED05A7631D
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;[.&.:.u.:.u.:.ukQ.tu:.ukQ.tl:.ukQ.t.:.u-O.to:.u-O.tu:.u-O.t.:.ukQ.tn:.u.:.u.:.u.O.tv:.u.O1u~:.u.O.t~:.uRich.:.u........PE..d..
    Icon Hash:53f16d4d4d4dcc51
    Entrypoint:0x140026ca8
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x65F1B49F [Wed Mar 13 14:13:51 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:45bf8736c7180e4761c8e6262738d870
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 09/03/2022 00:00:00 08/03/2025 23:59:59
    Subject Chain
    • CN=NEXThink S.A., O=NEXThink S.A., L=Prilly, C=CH
    Version:3
    Thumbprint MD5:90AFB125D358CFA7B918C56823D11089
    Thumbprint SHA-1:EBDAE0ACE9C8F5D0136152C0FDC1971DB3604412
    Thumbprint SHA-256:C1AB4749A2D23E6B829EA39BE33F04EE1211F525C47991BAB791C7493CCC367B
    Serial:075A2790DAD211DD1320BFDC8F6DC855
    Instruction
    dec eax
    sub esp, 28h
    call 00007F23807067F0h
    dec eax
    add esp, 28h
    jmp 00007F2380705E4Fh
    int3
    int3
    jmp 00007F238070E974h
    int3
    int3
    int3
    dec eax
    sub esp, 28h
    dec ebp
    mov eax, dword ptr [ecx+38h]
    dec eax
    mov ecx, edx
    dec ecx
    mov edx, ecx
    call 00007F2380705FE2h
    mov eax, 00000001h
    dec eax
    add esp, 28h
    ret
    int3
    int3
    int3
    inc eax
    push ebx
    inc ebp
    mov ebx, dword ptr [eax]
    dec eax
    mov ebx, edx
    inc ecx
    and ebx, FFFFFFF8h
    dec esp
    mov ecx, ecx
    inc ecx
    test byte ptr [eax], 00000004h
    dec esp
    mov edx, ecx
    je 00007F2380705FE5h
    inc ecx
    mov eax, dword ptr [eax+08h]
    dec ebp
    arpl word ptr [eax+04h], dx
    neg eax
    dec esp
    add edx, ecx
    dec eax
    arpl ax, cx
    dec esp
    and edx, ecx
    dec ecx
    arpl bx, ax
    dec edx
    mov edx, dword ptr [eax+edx]
    dec eax
    mov eax, dword ptr [ebx+10h]
    mov ecx, dword ptr [eax+08h]
    dec eax
    mov eax, dword ptr [ebx+08h]
    test byte ptr [ecx+eax+03h], 0000000Fh
    je 00007F2380705FDDh
    movzx eax, byte ptr [ecx+eax+03h]
    and eax, FFFFFFF0h
    dec esp
    add ecx, eax
    dec esp
    xor ecx, edx
    dec ecx
    mov ecx, ecx
    pop ebx
    jmp 00007F2380705766h
    int3
    dec eax
    mov eax, esp
    dec eax
    mov dword ptr [eax+08h], ebx
    dec eax
    mov dword ptr [eax+10h], ebp
    dec eax
    mov dword ptr [eax+18h], esi
    dec eax
    mov dword ptr [eax+20h], edi
    inc ecx
    push esi
    dec eax
    sub esp, 20h
    dec ecx
    mov ebx, dword ptr [ecx+38h]
    dec eax
    mov esi, edx
    dec ebp
    mov esi, eax
    dec eax
    mov ebp, ecx
    dec ecx
    mov edx, ecx
    dec eax
    mov ecx, esi
    dec ecx
    mov edi, ecx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x696380xb4.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x740000x4291220.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6f0000x3cfc.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x4300c000x998c0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x43060000xb18.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x61b600x54.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x61d000x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x61bc00x138.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x500000x450.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x4e2ec0x4e400d4d2e093d48cc9e7deb6f16e4c4d4510False0.5204610123801917data6.471270119324688IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x500000x1a4d00x1a60013963a4af3ffe2fd6b4f26292b15e08cFalse0.43549133590047395data5.112600792532151IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x6b0000x350c0x1e00115e48b62085ebd2a3b695ba77267d0aFalse0.15091145833333333DOS executable (block device driver)3.261064407548195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x6f0000x3cfc0x3e00b1da50022a1102b3240ca3a38efb5067False0.4769405241935484data5.599998597201377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    _RDATA0x730000xf40x200217914a1ea98ecd77c60cbc406c834d6False0.32421875data2.4688333672793643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x740000x42912200x429140096ceb2750e87858affd7267c673bbda5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x43060000xb180xc007849c6576b547e63ecccbec6dc4e411bFalse0.4973958333333333data5.28255770132007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    AFX_DIALOG_LAYOUT0x43037980x2dataEnglishUnited States5.0
    BIN0x749380x2ca00PE32+ executable (GUI) x86-64, for MS WindowsEnglishUnited States0.49060092787114845
    BIN0xc95380x422a0aeComposite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Nexthink Collector Windows Installer, Author: Nexthink S.A., Keywords: Installer, Comments: Nexthink Collector (24.2.3.2) for Windows 10 and above, Windows Server 2016 and above., Template: x64;1033, Revision Number: {ADCBBDBB-0708-4650-A785-2F1A7F4B049E}, Create Time/Date: Wed Mar 13 14:11:32 2024, Last Saved Time/Date: Wed Mar 13 14:11:32 2024, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.0.5722), Security: 4EnglishUnited States0.9637260437011719
    BIN0xa13380x28200PE32+ executable (GUI) x86-64, for MS WindowsEnglishUnited States0.4862429419781931
    RT_BITMAP0x42f9db80x993aDevice independent bitmap graphic, 210 x 62 x 24, image size 39186, resolution 2834 x 2834 px/mEnglishUnited States0.07296181104369551
    RT_ICON0x42f46700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.29609929078014185
    RT_ICON0x42f4ad80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.19098360655737706
    RT_ICON0x42f54600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.13860225140712945
    RT_ICON0x42f65080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.09367219917012448
    RT_ICON0x42f8ab00x12b2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9114082741328876
    RT_DIALOG0x42f39600xb06dataEnglishUnited States0.3543586109142452
    RT_DIALOG0x42f44680x204dataEnglishUnited States0.5581395348837209
    RT_STRING0x43037a00x3edataEnglishUnited States0.6129032258064516
    RT_STRING0x4303e580x494dataEnglishUnited States0.3174061433447099
    RT_STRING0x43042f00x706dataEnglishUnited States0.27196885428253614
    RT_STRING0x43049f80x150dataEnglishUnited States0.43452380952380953
    RT_STRING0x43037e00x678dataEnglishUnited States0.3254830917874396
    RT_STRING0x4304ca00x49edataEnglishUnited States0.2571912013536379
    RT_STRING0x43051400xdadataEnglishUnited States0.4908256880733945
    RT_STRING0x4304b480x152dataEnglishUnited States0.4881656804733728
    RT_GROUP_ICON0x42f9d680x4cdataEnglishUnited States0.7763157894736842
    RT_VERSION0x745b00x384dataEnglishUnited States0.42444444444444446
    RT_MANIFEST0x42f35e80x376XML 1.0 document, ASCII textEnglishUnited States0.4887133182844244
    None0x43036f80x9cdataEnglishUnited States0.3333333333333333
    DLLImport
    COMCTL32.dll
    SHLWAPI.dllPathFileExistsW, PathIsDirectoryW
    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
    KERNEL32.dllCreateFileW, CloseHandle, SizeofResource, WriteFile, EndUpdateResourceW, Sleep, LockResource, GlobalAlloc, DeleteFileW, GlobalFree, LoadResource, FindResourceW, UpdateResourceW, GlobalLock, FreeLibrary, BeginUpdateResourceW, GlobalUnlock, LoadLibraryExW, GetFileSizeEx, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, ReadConsoleW, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, ReadFile, GetLastError, GetProcessHeap, SetStdHandle, HeapSize, WriteConsoleW, SetEndOfFile, FreeEnvironmentStringsW, MultiByteToWideChar, HeapReAlloc, SetFilePointerEx, InitializeCriticalSectionEx, RaiseException, DecodePointer, DeleteCriticalSection, GetStringTypeW, WideCharToMultiByte, CompareStringEx, EnterCriticalSection, LeaveCriticalSection, EncodePointer, LCMapStringEx, GetCPInfo, InitializeCriticalSectionAndSpinCount, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, GetProcAddress, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, RtlUnwindEx, RtlPcToFileHeader, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetStdHandle, HeapFree, HeapAlloc, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, RtlUnwind
    USER32.dllLoadImageW, EnableWindow, MessageBoxW, LoadStringW, GetWindowTextLengthW, GetWindowRect, DialogBoxParamW, SetWindowTextW, EndDialog, SetDlgItemTextW, GetDlgItemTextW, LoadIconW, GetDlgItem, SetDlgItemInt, SetWindowPos, GetDlgItemInt, SendMessageW
    COMDLG32.dllGetOpenFileNameW
    ADVAPI32.dllCryptAcquireContextW, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptGetHashParam, CryptReleaseContext
    SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:17:23:12
    Start date:16/04/2024
    Path:C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\Nexthink_Collector_Installer_Silent.exe"
    Imagebase:0x7ff7d7560000
    File size:70'886'592 bytes
    MD5 hash:A734E0EA93D16C673272CD373DF1FAF5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    No disassembly