Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QuickTimeInstaller.exe

Overview

General Information

Sample name:QuickTimeInstaller.exe
Analysis ID:1428136
MD5:1a762049bef7fc3a53014833757de2d2
SHA1:e906b9b585a02c08270316fd21f8f5ce0081526a
SHA256:56eff77b029b5f56c47d11fe58878627065dbeacbc3108d50d98a83420152c2b
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry
Uses 32bit PE files

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample is looking for USB drives. Launch the sample with the USB Fake Disk cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • QuickTimeInstaller.exe (PID: 6420 cmdline: "C:\Users\user\Desktop\QuickTimeInstaller.exe" MD5: 1A762049BEF7FC3A53014833757DE2D2)
    • msiexec.exe (PID: 6564 cmdline: "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTime.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 6964 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7060 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding AF7759F71D07749EDCEA18A4E40A5B0C C MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: QuickTimeInstaller.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\QuickTimeInstaller1914.logJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\QTInstallCode.logJump to behavior
Source: QuickTimeInstaller.exeStatic PE information: certificate valid
Source: Binary string: c:\BWA\AppleSoftwareSupportWinPackageData-80.2\srcroot\CustomActions\AppleApplicationSupport_CustomActions.pdb<pbH source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData_Final-824\srcroot\setup\setup.pdb source: QuickTimeInstaller.exe
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: AppleApplicationSupport.msi.0.dr, QuickTime.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\firewall.pdb source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData-824\srcroot\QTMSISupport\QTMSISupport.pdb source: MSI297E.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.dr
Source: Binary string: c:\BWA\AppleSoftwareSupportWinPackageData-80.2\srcroot\CustomActions\AppleApplicationSupport_CustomActions.pdb source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData_Final-824\srcroot\setup\setup.pdb` source: QuickTimeInstaller.exe
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: QuickTime.msi.0.drString found in binary or memory: HTTP://WWW.MPEGLA.COM.
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
Source: MSI2A4C.tmp.1.drString found in binary or memory: http://quicktimepro.apple.com/y?country=%s&language=%s&productName=QuickTime%d&operatingSystem=Windo
Source: MSI297E.tmp.1.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://sf.symcb.com/sf.crl0f
Source: MSI297E.tmp.1.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: MSI297E.tmp.1.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://sf.symcd.com0&
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com.cn/support/ARPHELPTELEPHONE(86)
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com.cnARPURLUPDATEINFOhttp://www.apple.com.cn/ProductNameApple
Source: QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: http://www.apple.com/
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/br/support/ARPURLINFOABOUThttp://www.apple.com/brARPURLUPDATEINFOProductNameSup
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/de/support/ARPHELPTELEPHONE01805
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/deARPURLUPDATEINFOhttp://www.apple.com/de/
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/dk/support/ARPURLINFOABOUThttp://www.apple.com/dkARPURLUPDATEINFOProductNameApp
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/es/support/ARPURLINFOABOUThttp://www.apple.com/esARPURLUPDATEINFOhttp://www.app
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/fi/support/ARPURLINFOABOUThttp://www.apple.com/fiARPURLUPDATEINFOProductNameApp
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/fr/support/ARPHELPTELEPHONE0825
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/frARPURLUPDATEINFO
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/it/support/ARPURLINFOABOUThttp://www.apple.com/itARPURLUPDATEINFOProductNameSup
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/jp/support/ARPHELPTELEPHONE
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/jpARPURLUPDATEINFO
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/kr/support/ARPHELPTELEPHONE(82)
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/krARPURLUPDATEINFOhttp://www.apple.com/kr/ProductNameApple
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/nl/supportARPHELPTELEPHONE0900-7777703
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/nlARPURLUPDATEINFO
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/no/support/ARPHELPTELEPHONE815
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/noARPURLUPDATEINFOProductNameApple-programsupport
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/pl/support/ARPHELPTELEPHONE00-800-441875ARPURLINFOABOUThttp://www.apple.com/plA
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/pt/support/ARPURLINFOABOUThttp://www.apple.com/ptARPURLUPDATEINFOProductNameSup
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/ru/support/ARPHELPTELEPHONE
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/ruARPURLUPDATEINFOProductName
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/se/support/ARPHELPTELEPHONE0771
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/seARPURLUPDATEINFOhttp://www.apple.com/se/ProductNameApple-programst
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/tw/support/ARPHELPTELEPHONE(886)
Source: AppleApplicationSupport.msi.0.drString found in binary or memory: http://www.apple.com/twARPURLUPDATEINFOhttp://www.apple.com/tw/ProductNameApple
Source: QuickTime.msi.0.drString found in binary or memory: http://www.mpegla.com
Source: MSI297E.tmp.1.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
Source: MSI297E.tmp.1.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
Source: QuickTimeInstaller.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 41769914 bytes, 4 files, at 0x2c +A "QuickTime.msi" +A "AppleSoftwareUpdate.msi", number 1, 1594 datablocks, 0xf03 compression
Source: QuickTimeInstaller.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean3.winEXE@6/12@0/0
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\LocalLow\Apple Computer\Jump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeMutant created: \Sessions\1\BaseNamedObjects\QuickTimeInstaller
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\QuickTimeInstaller1914.logJump to behavior
Source: QuickTimeInstaller.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\QuickTimeInstaller.exe "C:\Users\user\Desktop\QuickTimeInstaller.exe"
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTime.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AF7759F71D07749EDCEA18A4E40A5B0C C
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTime.msi"Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AF7759F71D07749EDCEA18A4E40A5B0C CJump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: QuickTimeInstaller.exeStatic PE information: certificate valid
Source: QuickTimeInstaller.exeStatic file information: File size 41896256 > 1048576
Source: QuickTimeInstaller.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x27dc000
Source: QuickTimeInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\BWA\AppleSoftwareSupportWinPackageData-80.2\srcroot\CustomActions\AppleApplicationSupport_CustomActions.pdb<pbH source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData_Final-824\srcroot\setup\setup.pdb source: QuickTimeInstaller.exe
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: AppleApplicationSupport.msi.0.dr, QuickTime.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\firewall.pdb source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData-824\srcroot\QTMSISupport\QTMSISupport.pdb source: MSI297E.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.dr
Source: Binary string: c:\BWA\AppleSoftwareSupportWinPackageData-80.2\srcroot\CustomActions\AppleApplicationSupport_CustomActions.pdb source: AppleApplicationSupport.msi.0.dr
Source: Binary string: d:\BWA\QuickTimeWinPackageData_Final-824\srcroot\setup\setup.pdb` source: QuickTimeInstaller.exe
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTimeInstallerAdmin.exeJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2A4C.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI29ED.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2AD9.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2B68.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI297E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2B28.tmpJump to dropped file
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\QuickTimeInstaller1914.logJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\QTInstallCode.logJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 BlobJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTimeInstallerAdmin.exeJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2A4C.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI29ED.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2AD9.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2B68.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI297E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2B28.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: QuickTimeInstaller.exeBinary or memory string: qEMu?
Source: C:\Windows\SysWOW64\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\QuickTimeInstaller.exeCode function: 0_2_0040FC52 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040FC52
Source: C:\Windows\SysWOW64\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1428136 Sample: QuickTimeInstaller.exe Startdate: 18/04/2024 Architecture: WINDOWS Score: 3 5 QuickTimeInstaller.exe 6 2->5         started        8 msiexec.exe 2->8         started        file3 15 C:\Users\user\...\QuickTimeInstallerAdmin.exe, PE32 5->15 dropped 10 msiexec.exe 11 5->10         started        13 msiexec.exe 1 3 8->13         started        process4 file5 17 C:\Users\user\AppData\Local\...\MSI2B68.tmp, PE32 10->17 dropped 19 C:\Users\user\AppData\Local\...\MSI2B28.tmp, PE32 10->19 dropped 21 C:\Users\user\AppData\Local\...\MSI2AD9.tmp, PE32 10->21 dropped 23 3 other files (none is malicious) 10->23 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
QuickTimeInstaller.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTimeInstallerAdmin.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI297E.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI29ED.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI2A4C.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI2AD9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI2B28.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI2B68.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
HTTP://WWW.MPEGLA.COM.QuickTime.msi.0.drfalse
    high
    http://www.mpegla.comQuickTime.msi.0.drfalse
      high
      http://crl.thawte.com/ThawteTimestampingCA.crl0QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drfalse
        high
        http://ocsp.thawte.com0QuickTimeInstaller.exe, 00000000.00000003.1767587370.0000000002C76000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767605872.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, QuickTimeInstaller.exe, 00000000.00000003.1767648467.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, MSI297E.tmp.1.dr, AppleApplicationSupport.msi.0.dr, MSI2A4C.tmp.1.dr, MSI2AD9.tmp.1.dr, MSI29ED.tmp.1.drfalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1428136
        Start date and time:2024-04-18 15:43:58 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 16s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:QuickTimeInstaller.exe
        Detection:CLEAN
        Classification:clean3.winEXE@6/12@0/0
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target QuickTimeInstaller.exe, PID 6420 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: QuickTimeInstaller.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\QuickTimeInstaller.exe
        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1256, Title: Installation Database, Subject: Apple, Author: Apple Inc., Keywords: Installer,MSI,Database, Comments: Apple 2.3.6, Create Time/Date: Sat Sep 14 04:45:10 2013, Name of Creating Application: Windows Installer XML (3.5.2519.0), Security: 4, Template: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053,1025, Last Saved By: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053,1025, Revision Number: {46F044A5-CE8B-4196-984E-5BD6525E361D}2.3.6;{46F044A5-CE8B-4196-984E-5BD6525E361D}2.3.6;{529316F8-601C-48AB-BAF6-D9E09938D8D3}, Number of Pages: 300, Number of Characters: 131135
        Category:dropped
        Size (bytes):21402624
        Entropy (8bit):7.950705942600233
        Encrypted:false
        SSDEEP:393216:gE4XhXm1y4vPzRFlHRm0sZHMOVO4rEI6LCao4ssmTQMRHOJ++vpR:0XtmbHH6bMOY4wI6eTbscQWu
        MD5:1B720C225226D66085F7F08371F28909
        SHA1:9F2849702A83D8DA22C80C35D6786EB106CB219C
        SHA-256:07BAD38B7F9972AA3F8228676B76200B7F675D6DDF75EB9C78EE6B3512EB94A8
        SHA-512:EA1A42E3586A493942499CFF141379E81C42B13FF12E5F4714969F3AD10B250B862BAE09F2777FCBD15BA5F82DD455A7DB123C51DE01EF5B087D245A90C574BE
        Malicious:false
        Reputation:low
        Preview:......................>...................G........................6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6......w....................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Users\user\Desktop\QuickTimeInstaller.exe
        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Instalador da Actualizao de Software Apple, Author: Apple Inc., Keywords: Installer,MSI,Database, Comments: Apple Software Update 2.1.3.127, Create Time/Date: Tue Jun 21 23:23:46 2011, Name of Creating Application: Windows Installer XML (3.5.2519.0), Security: 4, Template: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053, Last Saved By: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053, Revision Number: {789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}2.1.3.127;{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}2.1.3.127;{58E373E7-C6D5-4691-885F-721D3B317918}, Number of Pages: 200, Number of Characters: 131135
        Category:dropped
        Size (bytes):2323456
        Entropy (8bit):6.538762300356342
        Encrypted:false
        SSDEEP:49152:c+zrHUiMXNd5mll9BxjSsxEH2LUy9jacluLjtNHXplphgukm9Z60hHRBNEL:c+kiKUl1w
        MD5:A20C8EDDC732E30F7EC5A985843388ED
        SHA1:EF87E902739779785A4E3AAF20BE66E78062C199
        SHA-256:CE570D6DBADF7983F7ACE0EBD033E6EF6E5347FCEEAEF512FAF1FC6775B895CE
        SHA-512:B623DE9EB87B432FC86FC68A2D71ACB2E6F66F8586CD6E2E8DE73F970323FADABB3A143B84CF384751525E8E0D2E930C5F8DCE12061BF752B137BB1A4B1051BF
        Malicious:false
        Reputation:low
        Preview:......................>...................$...................................................................................................................................y.......N.......................w.......I...........................................................................................................................................................................................................................................................................................................9....................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Users\user\Desktop\QuickTimeInstaller.exe
        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Instalador do QuickTime, Author: Apple Inc., Keywords: Installer,MSI,Database, Comments: QuickTime 7 - 7.79.80.95, Create Time/Date: Tue Dec 15 15:17:18 2015, Name of Creating Application: Windows Installer XML v2.0.3220.0 (candle/light), Security: 1, Template: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053, Last Saved By: Intel;1033,1036,1031,1041,1043,1040,1028,2052,1034,1030,1035,1042,1044,1045,2070,1046,1049,1053, Revision Number: {FF59BD75-466A-4D5A-AD23-AAD87C5FD44C}7.79.80.95;{FF59BD75-466A-4D5A-AD23-AAD87C5FD44C}7.79.80.95;{AA4138E3-09D5-4256-9207-6DDB76D12955}, Number of Pages: 110, Number of Characters: 153485312
        Category:dropped
        Size (bytes):28397568
        Entropy (8bit):7.224736727747802
        Encrypted:false
        SSDEEP:393216:fZITEjJUqdxjhLy3EYzfshkYbubiu8egOXUp6k:f64qi5J+EesKUubL8poUv
        MD5:5376B2262B6E9773801520B6735C6DE9
        SHA1:FBDDB7E5D7F06FF4E5C65D57C01EF27C0BCA7CA5
        SHA-256:03EA287B99DF2605A9D32B0FE9096D811B8C7ED1654F822FF76F7E172E0ED0B8
        SHA-512:CCE529666D0F33EE347CB001BB0D37D07C25473545B3A6DE6EFA44F93F1326B520A822C7B46061B7DE2690C0144485D62520FBF757217167EC1BBD131F78F826
        Malicious:false
        Reputation:low
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\QuickTimeInstaller.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):80192
        Entropy (8bit):5.751371374875068
        Encrypted:false
        SSDEEP:1536:bOEnMiLSFSvKWEpy9NbxrenOP4XPgt9Vo8:bOEqMB923XPgtPp
        MD5:621ED0E1D558CD598CC423B61BFA1F04
        SHA1:2A0FCA94934E9614AC6AE7C4E0F593F01F17DDAB
        SHA-256:12F4F1D2003AB8DE46C7DD67E885A90C517A0A4596953FE796BF0C3754112043
        SHA-512:F6F1F5C22FD4B10C4A8D69048A47C31C558D6FC8A8ACB14CF37B32F0C3677EA12DC0D5E8BEADA4FEDB059C14029103BB210FD490D85185375EEA3D42FB6E9FF6
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z8w.;V$.;V$.;V$..+$.;V$..8$.;V$.4.$.;V$.C.$.;V$.;W$.;V$..;$.;V$..*$.;V$...$.;V$Rich.;V$........................PE..L.....pV............................n9............@..........................@..............................................<...<.... ............... ..@...............................................@...............T............................text............................... ..`.rdata..^$.......0..................@..@.data...d+..........................@....rsrc........ ... ..................@..@................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):137520
        Entropy (8bit):6.327994423693078
        Encrypted:false
        SSDEEP:1536:bSuNuObZVGVJ/6meO/ynECJZPosGmgZowghEJs1hvd06BCpWo7b:WBVd6WH1Q1hvd06BCpNb
        MD5:FC09FD1C7A4E16AB8A5E9106F1344BF2
        SHA1:8B07A5259B8F3A2ECB4758AB745AE3E8F7B9D652
        SHA-256:F3569339784A54AC40E0BA00B86E225AC0804E8112956DEC6B1EA805D514F638
        SHA-512:D787551CCBFABBF9DCA17E50E1A508DD4AFE124220D201F923E864A0E8F54C4ABC58D1D11D20FC5C1913917C87A78E8E661F3C76B4CC55F77A798D24622257CF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4...4...4..C;..4.....4..C;..4...<..4...4...4.......4.......4.....4.......4..Rich.4..........PE..L.....pV...........!.....P...................`.....e......................... .......$................................................................0.......l....b..................................@............`..@............................text....G.......P.................. ..`.rdata...F...`...P...`..............@..@.data...@0....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):137520
        Entropy (8bit):6.327994423693078
        Encrypted:false
        SSDEEP:1536:bSuNuObZVGVJ/6meO/ynECJZPosGmgZowghEJs1hvd06BCpWo7b:WBVd6WH1Q1hvd06BCpNb
        MD5:FC09FD1C7A4E16AB8A5E9106F1344BF2
        SHA1:8B07A5259B8F3A2ECB4758AB745AE3E8F7B9D652
        SHA-256:F3569339784A54AC40E0BA00B86E225AC0804E8112956DEC6B1EA805D514F638
        SHA-512:D787551CCBFABBF9DCA17E50E1A508DD4AFE124220D201F923E864A0E8F54C4ABC58D1D11D20FC5C1913917C87A78E8E661F3C76B4CC55F77A798D24622257CF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4...4...4..C;..4.....4..C;..4...<..4...4...4.......4.......4.....4.......4..Rich.4..........PE..L.....pV...........!.....P...................`.....e......................... .......$................................................................0.......l....b..................................@............`..@............................text....G.......P.................. ..`.rdata...F...`...P...`..............@..@.data...@0....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):436528
        Entropy (8bit):5.990147069844175
        Encrypted:false
        SSDEEP:6144:gg4X2g/PYMWgAKKkcFXjpmNz8O1QHZkOJpNgoLWrBxJwNKlW8rn8/QdNzp5xvSZE:K2gnLWjGf51Uitk8
        MD5:1F847C95ADF4F7FE0956D815CB17D907
        SHA1:0D3638822942AD4D9C0D492C5DF5FB33F36FA178
        SHA-256:10DB6192B63C7260405597F9F8A1EB54A9F4F49B34A87B68BE04BB8BD815DA1D
        SHA-512:23062DC0D3F1C157615C5679AD03C76242659BFBE08A5EBD8D85CE2AF05925C4FDCC0E789D5E278AFC9235DD9472B038AFF2BCE5E27F4BA8C7F18CF084D81CCF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./.Z(k.4{k.4{k.4{L?I{s.4{..i{i.4{n.k{j.4{k.5{..4{..i{d.4{L?Z{X.4{L?Y{..4{L?N{j.4{L?H{j.4{L?L{j.4{Richk.4{........................PE..L.....pV...........!.....`... ......`e.......p......................................e................................................ ..H...............0....0..........................................@............p..p............................text...*X.......`.................. ..`.rdata...X...p...`...p..............@..@.data....I....... ..................@....rsrc...H.... ......................@..@.reloc......0......................@..B........................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):137520
        Entropy (8bit):6.327994423693078
        Encrypted:false
        SSDEEP:1536:bSuNuObZVGVJ/6meO/ynECJZPosGmgZowghEJs1hvd06BCpWo7b:WBVd6WH1Q1hvd06BCpNb
        MD5:FC09FD1C7A4E16AB8A5E9106F1344BF2
        SHA1:8B07A5259B8F3A2ECB4758AB745AE3E8F7B9D652
        SHA-256:F3569339784A54AC40E0BA00B86E225AC0804E8112956DEC6B1EA805D514F638
        SHA-512:D787551CCBFABBF9DCA17E50E1A508DD4AFE124220D201F923E864A0E8F54C4ABC58D1D11D20FC5C1913917C87A78E8E661F3C76B4CC55F77A798D24622257CF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4...4...4..C;..4.....4..C;..4...<..4...4...4.......4.......4.....4.......4..Rich.4..........PE..L.....pV...........!.....P...................`.....e......................... .......$................................................................0.......l....b..................................@............`..@............................text....G.......P.................. ..`.rdata...F...`...P...`..............@..@.data...@0....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):137520
        Entropy (8bit):6.327994423693078
        Encrypted:false
        SSDEEP:1536:bSuNuObZVGVJ/6meO/ynECJZPosGmgZowghEJs1hvd06BCpWo7b:WBVd6WH1Q1hvd06BCpNb
        MD5:FC09FD1C7A4E16AB8A5E9106F1344BF2
        SHA1:8B07A5259B8F3A2ECB4758AB745AE3E8F7B9D652
        SHA-256:F3569339784A54AC40E0BA00B86E225AC0804E8112956DEC6B1EA805D514F638
        SHA-512:D787551CCBFABBF9DCA17E50E1A508DD4AFE124220D201F923E864A0E8F54C4ABC58D1D11D20FC5C1913917C87A78E8E661F3C76B4CC55F77A798D24622257CF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4...4...4..C;..4.....4..C;..4...<..4...4...4.......4.......4.....4.......4..Rich.4..........PE..L.....pV...........!.....P...................`.....e......................... .......$................................................................0.......l....b..................................@............`..@............................text....G.......P.................. ..`.rdata...F...`...P...`..............@..@.data...@0....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):137520
        Entropy (8bit):6.327994423693078
        Encrypted:false
        SSDEEP:1536:bSuNuObZVGVJ/6meO/ynECJZPosGmgZowghEJs1hvd06BCpWo7b:WBVd6WH1Q1hvd06BCpNb
        MD5:FC09FD1C7A4E16AB8A5E9106F1344BF2
        SHA1:8B07A5259B8F3A2ECB4758AB745AE3E8F7B9D652
        SHA-256:F3569339784A54AC40E0BA00B86E225AC0804E8112956DEC6B1EA805D514F638
        SHA-512:D787551CCBFABBF9DCA17E50E1A508DD4AFE124220D201F923E864A0E8F54C4ABC58D1D11D20FC5C1913917C87A78E8E661F3C76B4CC55F77A798D24622257CF
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4...4...4..C;..4.....4..C;..4...<..4...4...4.......4.......4.....4.......4..Rich.4..........PE..L.....pV...........!.....P...................`.....e......................... .......$................................................................0.......l....b..................................@............`..@............................text....G.......P.................. ..`.rdata...F...`...P...`..............@..@.data...@0....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\msiexec.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):649
        Entropy (8bit):5.002910845915819
        Encrypted:false
        SSDEEP:12:LYaOvg4ozEWl86ozEWl86ozEWl8nQlT0NzWAVAScMK7I97MLJBqpMG4n:LYaOYKCCpMXE97MLMT4
        MD5:B4A4028E173B77D84D9206B754525082
        SHA1:227B62C1E9F8F2A34A7B1B774118D64DAA568FF8
        SHA-256:7E8404A1FADA93368536C90C77BB6543819620CDF03F48163DE434F347B8DC7D
        SHA-512:BBE81D96A04195DD38799C59DC9FD35D7BD9A781ACC9359CE1CB188AA2C3B97AA5BF5E77368B1FE4A00365BCA2AFF36C66FFA96CE551CF5001D30A0A737E3B66
        Malicious:false
        Preview:############################..QuickTimePreInstallProc Enter...Moving QTPrefs file (if necesary) to new location......Getting QT preinstall info......Getting QT process count........Ignoring process 'msiexec.exe' as possible QT process........Ignoring process 'msiexec.exe' as possible QT process........Ignoring process 'msiexec.exe' as possible QT process......Current QT processes = 0..GetQTProcessCount() reported 0 QT active processes...Will check for QT version: 7.79.80.95...WARNING: did not find "C:\Windows\system32\QuickTime.qts"..GetQTInstallInfo: No QuickTime installed..Final result: 2 (error=0)..QuickTimePreInstallProc Exit (error=0)..
        Process:C:\Users\user\Desktop\QuickTimeInstaller.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1440
        Entropy (8bit):5.007739056890997
        Encrypted:false
        SSDEEP:24:ObteIFsgg43MUGLQBVZHYIOGDkiE/CaPczVaPe1g4A1aP+g49DcaPtAfo:ObtF6w3IyVxcChzVzfUT9DcFo
        MD5:2FB45F81402EE99291A3500A7CD7A980
        SHA1:981234E782E22533CF1B72728410239A9E029D42
        SHA-256:1AF02971F9CFABD1B10F642A399AB696F22E32596C828B1FE65F7AA118DBABC0
        SHA-512:AEE27007510FEA1BB0BB0197B5FF024E62ED1DB7EC66EE6864329D367C41E3EE6DC9A01EA777EBF59D837C75CA905D3D5995BCB5748D9B2908D369F49DCC9F04
        Malicious:false
        Preview:=== Logging started: 4/18/2024 15:44:56 ===..Command Line: ..Information on cabinet file 'C:\Users\user\Desktop\QuickTimeInstaller.exe'.. Total length of cabinet file : 41769914.. Number of folders in cabinet : 1.. Number of files in cabinet : 4.. Cabinet set ID : 0.. Cabinet number in set : 0.. RESERVE area in cabinet? : no.. Chained to prev cabinet? : no.. Chained to next cabinet? : no....fdintCABINET_INFO.. next cabinet = .. next disk = .. cabinet path = C:\Users\user\Desktop\.. cabinet set ID = 0.. cabinet # in set = 0 (zero based)....fdintCOPY_FILE.. file name in cabinet = QuickTime.msi.. uncompressed file size = 28397568....fdintCLOSE_FILE_INFO.. file name in cabinet = QuickTime.msi....fdintCOPY_FILE.. file name in cabinet = AppleSoftwareUpdate.msi.. uncompressed file size = 2323456....fdintCLOSE_FILE_INFO.. file name in cabinet = AppleSoftwareUpdate.msi....fdintCOPY_FILE.. file name in cabinet =
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.999680626171731
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:QuickTimeInstaller.exe
        File size:41'896'256 bytes
        MD5:1a762049bef7fc3a53014833757de2d2
        SHA1:e906b9b585a02c08270316fd21f8f5ce0081526a
        SHA256:56eff77b029b5f56c47d11fe58878627065dbeacbc3108d50d98a83420152c2b
        SHA512:b030994a6a0bab58ca135205770cc5bfd1830628573116836b30c7865b91314be767a5b6453a143464bddda263dd3487b763209bee6f1eb94240de74a2613c8e
        SSDEEP:786432:ypGoHCbrFwMp9H25FtfGhJ4wNvMpZzSPwjs9jNdpS1o0K9:yPinmMeQhJhCV49hG1o/
        TLSH:1C97330873EFE893F52FAC32542152C2EB95D69A1534C2F70D4AAB8857BBE610F7E114
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........R..SR..SR..Su`.S@..Su`.Ss..S...SP..S...SG..S[.>SQ..SR..S<..Su`.S<..Su`.SS..Su`.SS..SRichR..S........PE..L.....pV...........
        Icon Hash:06871b0e25331b06
        Entrypoint:0x40a8c4
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x56709FDB [Tue Dec 15 23:18:51 2015 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:c8e2e71ad4038bb5a9afcfbf0dd6003b
        Signature Valid:true
        Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 29/07/2015 01:00:00 28/08/2017 00:59:59
        Subject Chain
        • CN=Apple Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Apple Inc., L=Cupertino, S=California, C=US
        Version:3
        Thumbprint MD5:A5703716C23A6D3C99330D199928D836
        Thumbprint SHA-1:173A28539CA6DAB5AC8C3B995ABAA692F95C5FC4
        Thumbprint SHA-256:16041974BD96FB9A226AD5AF165BF167CA8A30D4200ECA35B9FA0D45EDB25544
        Serial:2B20EB3380792AB011F662C064FDB473
        Instruction
        call 00007F0B1C872A6Eh
        jmp 00007F0B1C86D4FBh
        mov eax, dword ptr [esp+04h]
        mov dword ptr [00417200h], eax
        ret
        push ebp
        lea ebp, dword ptr [esp-000002A8h]
        sub esp, 00000328h
        mov eax, dword ptr [00415000h]
        xor eax, ebp
        mov dword ptr [ebp+000002A4h], eax
        push esi
        mov dword ptr [ebp+00000088h], eax
        mov dword ptr [ebp+00000084h], ecx
        mov dword ptr [ebp+00000080h], edx
        mov dword ptr [ebp+7Ch], ebx
        mov dword ptr [ebp+78h], esi
        mov dword ptr [ebp+74h], edi
        mov word ptr [ebp+000000A0h], ss
        mov word ptr [ebp+00000094h], cs
        mov word ptr [ebp+70h], ds
        mov word ptr [ebp+6Ch], es
        mov word ptr [ebp+68h], fs
        mov word ptr [ebp+64h], gs
        pushfd
        pop dword ptr [ebp+00000098h]
        mov esi, dword ptr [ebp+000002ACh]
        lea eax, dword ptr [ebp+000002ACh]
        mov dword ptr [ebp+0000009Ch], eax
        mov dword ptr [ebp-28h], 00010001h
        mov dword ptr [ebp+00000090h], esi
        mov eax, dword ptr [eax-04h]
        push 00000050h
        mov dword ptr [ebp+0000008Ch], eax
        lea eax, dword ptr [ebp-80h]
        push 00000000h
        push eax
        call 00007F0B1C86A90Ch
        lea eax, dword ptr [ebp-80h]
        mov dword ptr [ebp-30h], eax
        lea eax, dword ptr [ebp-28h]
        add esp, 0Ch
        mov dword ptr [ebp-80h], C000000Dh
        mov dword ptr [ebp-74h], esi
        mov dword ptr [ebp-2Ch], eax
        call dword ptr [004120D4h]
        push 00000000h
        mov esi, eax
        Programming Language:
        • [ASM] VS2005 build 50727
        • [C++] VS2005 build 50727
        • [IMP] VS2008 SP1 build 30729
        • [ C ] VS2005 build 50727
        • [RES] VS2005 build 50727
        • [LNK] VS2005 build 50727
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1438c0x3c.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b0000x27dbd00.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x27f30000x1940.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x121d00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x13de80x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x120000x184.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x10b940x11000f1dd85a564b2f89ac576a2739780389aFalse0.6163545496323529data6.607075950393249IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x120000x2c040x3000a1112ba13446e769176d9c80107bf32eFalse0.3452962239583333data5.191534268442096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x150000x52dc0x200027651544eef4393cae370c6189088a3eFalse0.1092529296875data1.2663070684936601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x1b0000x27dbd000x27dc000ea6d7d3745e45236adb40a76de5a204cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x27f0ea80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.4488272921108742
        RT_ICON0x27f1d500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6042418772563177
        RT_ICON0x27f25f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.759393063583815
        RT_ICON0x27f2b600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.46099585062240667
        RT_ICON0x27f51080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5227485928705441
        RT_ICON0x27f61b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6604609929078015
        RT_RCDATA0x1b2c00x27d5bbaMicrosoft Cabinet archive data, many, 41769914 bytes, 4 files, at 0x2c +A "QuickTime.msi" +A "AppleSoftwareUpdate.msi", number 1, 1594 datablocks, 0xf03 compressionEnglishUnited States0.9994964599609375
        RT_RCDATA0x27f0e800x26ASCII text, with no line terminatorsEnglishUnited States1.2105263157894737
        RT_GROUP_ICON0x27f66180x5adataEnglishUnited States0.7
        RT_VERSION0x27f69f00x310dataEnglishUnited States0.4375
        RT_MANIFEST0x27f66780x374XML 1.0 document, Unicode text, UTF-8 (with BOM) textEnglishUnited States0.47058823529411764
        DLLImport
        msi.dll
        KERNEL32.dllSetEndOfFile, LocalAlloc, LocalFree, SizeofResource, LockResource, LoadResource, FindResourceA, GetModuleFileNameA, FreeResource, SetFileAttributesA, CloseHandle, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, CreateFileA, RemoveDirectoryA, DeleteFileA, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, SetProcessWorkingSetSize, GetCurrentProcess, GetSystemDirectoryA, CreateDirectoryA, GetTickCount, GetLastError, CreateMutexA, GetCurrentProcessId, GetTempPathA, SetStdHandle, GetLocalTime, GetFileType, MultiByteToWideChar, ReadFile, WriteFile, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, SetFilePointer, HeapFree, GetProcAddress, GetModuleHandleA, ExitProcess, EnterCriticalSection, LeaveCriticalSection, GetCommandLineA, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoA, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, SetHandleCount, GetStdHandle, DeleteCriticalSection, Sleep, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, FlushFileBuffers, LoadLibraryA, InitializeCriticalSection, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringA, LCMapStringW, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, RtlUnwind, HeapSize, GetLocaleInfoA, GetStringTypeA, GetStringTypeW
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:15:44:56
        Start date:18/04/2024
        Path:C:\Users\user\Desktop\QuickTimeInstaller.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\QuickTimeInstaller.exe"
        Imagebase:0x400000
        File size:41'896'256 bytes
        MD5 hash:1A762049BEF7FC3A53014833757DE2D2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:15:44:58
        Start date:18/04/2024
        Path:C:\Windows\SysWOW64\msiexec.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\IXP705.TMP\QuickTime.msi"
        Imagebase:0x3c0000
        File size:59'904 bytes
        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:2
        Start time:15:44:59
        Start date:18/04/2024
        Path:C:\Windows\System32\msiexec.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\msiexec.exe /V
        Imagebase:0x7ff61e050000
        File size:69'632 bytes
        MD5 hash:E5DA170027542E25EDE42FC54C929077
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:3
        Start time:15:44:59
        Start date:18/04/2024
        Path:C:\Windows\SysWOW64\msiexec.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding AF7759F71D07749EDCEA18A4E40A5B0C C
        Imagebase:0x3c0000
        File size:59'904 bytes
        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        No disassembly