Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe

Overview

General Information

Sample name:SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Analysis ID:1429058
MD5:6556b3ca424db754337ab375e343eb97
SHA1:4c5477378a6ef695d6ae87019976af94fc5abe37
SHA256:52231c311a10ab3adf5fdf74f8215d24c7a33356d88d442b0ebf638b6a7d8f32
Tags:exe
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Checks for available system drives (often done to infect USB drives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Analysis Advice

Sample is looking for USB drives. Launch the sample with the USB Fake Disk cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • msiexec.exe (PID: 7348 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile created: C:\Users\user~1\AppData\Local\Temp\OCLC.OPEN.FrontendInstaller00000.logJump to behavior
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scasched.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\wixca.pdb0 source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\sfxca.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\setup.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\PrintEula.pdbPRh{ source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\wixca.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scaexec.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\PrintEula.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scasched.pdb| source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: z:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: x:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: v:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: t:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: r:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: p:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: n:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: l:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: j:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: h:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: f:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: b:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: y:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: w:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: u:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: s:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: q:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: o:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: m:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: k:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: i:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: g:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: c:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile opened: a:Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: time.windows.com
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.00000000011F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamescaexec.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.00000000011F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesetup.exeL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.0000000001155000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOCLC.OPEN.CustomActions.dllD vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.0000000001155000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.0000000001155000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameprinteula.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.000000000118B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewixca.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, 00000000.00000000.1371918454.000000000118B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamescasched.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenameOCLC.OPEN.CustomActions.dllD vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenameprinteula.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenamewixca.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenamescasched.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenamescaexec.dllL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeBinary or memory string: OriginalFilenamesetup.exeL vs SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean2.winEXE@2/2@1/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile created: C:\Users\user~1\AppData\Local\Temp\{5BDC703B-E4F6-43C5-8B5F-3A45E826F992}\Jump to behavior
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe "C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56ad4c5d-b908-4f85-8ff1-7940c29b3bcf}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic file information: File size 15797760 > 1048576
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xf01c00
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scasched.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\wixca.pdb0 source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\sfxca.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\setup.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\PrintEula.pdbPRh{ source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\wixca.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scaexec.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\PrintEula.pdb source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: Binary string: C:\delivery\Dev\wix35_public\build\ship\x86\scasched.pdb| source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, OCLC.OPEN.FrontendInstaller.msi.0.dr
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile created: C:\Users\user~1\AppData\Local\Temp\OCLC.OPEN.FrontendInstaller00000.logJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exeCode function: 0_2_00336A2F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00336A2F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory11
Peripheral Device Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe6%VirustotalBrowse
SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
time.windows.com
unknown
unknownfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1429058
    Start date and time:2024-04-20 13:32:15 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 26s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
    Detection:CLEAN
    Classification:clean2.winEXE@2/2@1/0
    EGA Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 168.61.215.74
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe, PID 7280 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
    File Type:data
    Category:dropped
    Size (bytes):69398
    Entropy (8bit):3.775377723433562
    Encrypted:false
    SSDEEP:1536:hTu37PpxUNT4TSMYxVisGYCUSdKA6k646k68yGYCUSdKA6k646k6cSGYCUSdKA6u:w
    MD5:CCAB0468605BE1862D220F5321525AA6
    SHA1:FA13222347D4CBE816A37D17E6D7854BC9780B09
    SHA-256:76542065E5E72EAD586AC758830DC18896EB9316D2FD7556CD6AB90A34F0AF23
    SHA-512:067AB9A673047BCFD415493D3088540887C4023871FDDCB2774870B80107F40DE19C7501AEFA571A9F082221892BB64324DF4BBA1511132588C88D1A92CAE24F
    Malicious:false
    Reputation:low
    Preview:..=.=.=. .V.e.r.b.o.s.e. .l.o.g.g.i.n.g. .s.t.a.r.t.e.d.:. .2.0./.0.4./.2.0.2.4. . .1.3.:.3.3.:.2.5. . .B.u.i.l.d. .t.y.p.e.:. .S.H.I.P. .U.N.I.C.O.D.E. .5...0.0...1.0.0.1.1...0.0. . .C.a.l.l.i.n.g. .p.r.o.c.e.s.s.:. .C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...D.o.w.n.l.o.a.d.e.r...M.S.I.L...g.e.n...r.e.x.p...1.3.8.6.7...1.0.0.3.0...e.x.e. .=.=.=.....M.S.I. .(.c.). .(.7.0.:.7.4.). .[.1.3.:.3.3.:.2.5.:.1.3.7.].:. .F.o.n.t. .c.r.e.a.t.e.d... . .C.h.a.r.s.e.t.:. .R.e.q.=.0.,. .R.e.t.=.0.,. .F.o.n.t.:. .R.e.q.=.M.S. .S.h.e.l.l. .D.l.g.,. .R.e.t.=.M.S. .S.h.e.l.l. .D.l.g.......M.S.I. .(.c.). .(.7.0.:.7.4.). .[.1.3.:.3.3.:.2.5.:.1.3.7.].:. .F.o.n.t. .c.r.e.a.t.e.d... . .C.h.a.r.s.e.t.:. .R.e.q.=.0.,. .R.e.t.=.0.,. .F.o.n.t.:. .R.e.q.=.M.S. .S.h.e.l.l. .D.l.g.,. .R.e.t.=.M.S. .S.h.e.l.l. .D.l.g.......M.S.I. .(.c.). .(.7.0.:.A.4.). .[.1.3.:.3.3.:.2.5.:.2.1.5.].:. .R.e.s.e.t.t.i.n.g. .c.a.c.h.e.d. .p.o.l.i.c.y. .v.a.l.u.e.s.....M.S.I. .(.c.). .(.7.0.
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Open Opac for OCLC Library Systems, Author: OCLC, Keywords: OCLC Open Opac, Comments: Comments: , Template: Intel;1033, Revision Number: {FC2FAF3E-553B-4A13-BA63-B5503B8B6107}, Create Time/Date: Thu Jan 29 07:20:12 2015, Last Saved Time/Date: Thu Jan 29 07:20:12 2015, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.5.2519.0), Security: 2
    Category:modified
    Size (bytes):15678033
    Entropy (8bit):7.970496913376069
    Encrypted:false
    SSDEEP:393216:Y8qx/3tTTCxlYufrfiSHfvP0IBe5uhE0tYIGyQ39oK:pqx/30xlY+rZPE4h3WFyQ39v
    MD5:620656FEFB8339F5DD33606502CBBD3F
    SHA1:125F2A938113F66306EE24354A2925F1F557A83F
    SHA-256:3F2B5749A2032C251066712DC6F55B93ECD91065D89A9F7D41255E34E3E82296
    SHA-512:2E35854491B68F669C2DDE2F03457F7093ACC433E9BCED8D43E865DA4F65A3AFD534477DFB4EFC87B93607932CCBB71CAD7FE162B8D2F1E846499954295E2AA7
    Malicious:false
    Reputation:low
    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.964236546766937
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.42%
    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
    • Windows Screen Saver (13104/52) 0.13%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    File name:SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
    File size:15'797'760 bytes
    MD5:6556b3ca424db754337ab375e343eb97
    SHA1:4c5477378a6ef695d6ae87019976af94fc5abe37
    SHA256:52231c311a10ab3adf5fdf74f8215d24c7a33356d88d442b0ebf638b6a7d8f32
    SHA512:8045c7091960b1d573ba80cf5c08dea0db3d781c56b591f034e632c79aba3f29242a6af9a6f2ea2b11600734f036860b8c366317bc5afa284125b288b6e488d3
    SSDEEP:393216:B8qx/3tTTCxlYufrfiSHfvP0IBe5uhE0tYIGyQ39o:Oqx/30xlY+rZPE4h3WFyQ39
    TLSH:B3F633233EA1913DD1A20E72923BC7305E39BC284F70449A7751BA5DEDF81C59AB63C6
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........JG..+)D.+)D.+)D...D.+)D...D.+)D.S.D.+)D.+(DP+)D...D.+)D...D.+)D...D.+)DRich.+)D................PE..L......P...................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x4038db
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x50D8CCD9 [Mon Dec 24 21:44:57 2012 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:770900936ce89a4cd8279c4d045993fd
    Instruction
    call 00007F5A6C811484h
    jmp 00007F5A6C80E1BEh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    push ebp
    mov ebp, esp
    push edi
    push esi
    mov esi, dword ptr [ebp+0Ch]
    mov ecx, dword ptr [ebp+10h]
    mov edi, dword ptr [ebp+08h]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007F5A6C80E33Ah
    cmp edi, eax
    jc 00007F5A6C80E4D6h
    cmp ecx, 00000080h
    jc 00007F5A6C80E34Eh
    cmp dword ptr [00410AA4h], 00000000h
    je 00007F5A6C80E345h
    push edi
    push esi
    and edi, 0Fh
    and esi, 0Fh
    cmp edi, esi
    pop esi
    pop edi
    jne 00007F5A6C80E337h
    jmp 00007F5A6C8114CBh
    test edi, 00000003h
    jne 00007F5A6C80E346h
    shr ecx, 02h
    and edx, 03h
    cmp ecx, 08h
    jc 00007F5A6C80E35Bh
    rep movsd
    jmp dword ptr [00403A60h+edx*4]
    mov eax, edi
    mov edx, 00000003h
    sub ecx, 04h
    jc 00007F5A6C80E33Eh
    and eax, 03h
    add ecx, eax
    jmp dword ptr [00403974h+eax*4]
    jmp dword ptr [00403A70h+ecx*4]
    nop
    jmp dword ptr [004039F4h+ecx*4]
    nop
    test byte ptr [ecx], bh
    inc eax
    add byte ptr [eax-2BFFBFC7h], dh
    cmp dword ptr [eax+00h], eax
    and edx, ecx
    mov al, byte ptr [esi]
    mov byte ptr [edi], al
    mov al, byte ptr [esi+01h]
    mov byte ptr [edi+01h], al
    mov al, byte ptr [esi+02h]
    shr ecx, 02h
    mov byte ptr [edi+02h], al
    add esi, 03h
    add edi, 03h
    cmp ecx, 08h
    Programming Language:
    • [ASM] VS2010 SP1 build 40219
    • [ C ] VS2010 SP1 build 40219
    • [IMP] VS2008 SP1 build 30729
    • [C++] VS2010 SP1 build 40219
    • [RES] VS2010 SP1 build 40219
    • [LNK] VS2010 SP1 build 40219
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xd3340x8c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000xf01ab0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf130000x8b8.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xb1f00x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcfe00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xb0000x1b0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x9e780xa00020c198d0fd7149070cd8d9c9c71c89b7False0.5892578125data6.501056183644721IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xb0000x2c6e0x2e00fed97113232540fda90b1218fd835f80False0.3429008152173913data4.815990655888614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xe0000x2be00xe00a006087a5a25ccf080e82f2b07485592False0.193359375data2.2475393807554918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x110000xf01ab00xf01c00172f3c79543d5d9f062d4e582256cdb4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xf130000x11780x12000f57f549044687830832f8ac15faa9b3False0.4253472222222222data4.083914579286593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_BITMAP0x112400xcc08Device independent bitmap graphic, 164 x 312 x 8, image size 51168, resolution 3780 x 3780 px/mEnglishUnited States0.05019911165569
    RT_DIALOG0x1de480x210dataEnglishUnited States0.5208333333333334
    RT_STRING0x1e0580x7d4dataEnglishUnited States0.32934131736526945
    RT_STRING0x1e82c0x46Matlab v4 mat-file (little endian) O, numeric, rows 0, columns 0EnglishUnited States0.6428571428571429
    RT_RCDATA0x1e8740xacdataEnglishUnited States0.5581395348837209
    RT_RCDATA0x1e9200xef3a51Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Open Opac for OCLC Library Systems, Author: OCLC, Keywords: OCLC Open Opac, Comments: Comments: , Template: Intel;1033, Revision Number: {FC2FAF3E-553B-4A13-BA63-B5503B8B6107}, Create Time/Date: Thu Jan 29 07:20:12 2015, Last Saved Time/Date: Thu Jan 29 07:20:12 2015, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.5.2519.0), Security: 2EnglishUnited States0.9731807708740234
    RT_VERSION0xf123740x2f4dataEnglishUnited States0.4828042328042328
    RT_MANIFEST0xf126680x446XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5365630712979891
    DLLImport
    COMCTL32.dll
    msi.dll
    USER32.dllSetDlgItemTextW, EnableWindow, MessageBoxW, IsDlgButtonChecked, GetDlgItem, LoadStringW, MessageBoxExW, DialogBoxParamW, EndDialog, SetDlgItemTextA, SetWindowTextW
    SHELL32.dllCommandLineToArgvW, SHGetFolderPathW
    ole32.dllStringFromGUID2
    KERNEL32.dllSetStdHandle, RtlUnwind, WriteConsoleW, LeaveCriticalSection, EnterCriticalSection, GetConsoleMode, GetConsoleCP, GetStringTypeW, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, GetTickCount, QueryPerformanceCounter, HeapCreate, InterlockedDecrement, GetCurrentThreadId, SetLastError, InterlockedIncrement, TlsFree, GetLastError, GetUserDefaultUILanguage, LocalFree, FormatMessageW, GetTempPathW, DeleteFileW, CompareStringW, GetCommandLineW, lstrlenW, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, LockResource, SizeofResource, LoadResource, FindResourceExA, CloseHandle, WriteFile, CreateFileW, GetFileAttributesW, CreateDirectoryW, MoveFileExW, GetTempFileNameW, GetCurrentProcessId, GetModuleFileNameA, SetFilePointer, LoadLibraryW, GetSystemDirectoryW, Sleep, HeapAlloc, GetProcessHeap, HeapReAlloc, HeapSize, HeapFree, GetModuleFileNameW, GetCommandLineA, HeapSetInformation, GetStartupInfoW, DecodePointer, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, TerminateProcess, GetCurrentProcess, GetProcAddress, GetModuleHandleW, ExitProcess, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, FlushFileBuffers
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Apr 20, 2024 13:33:19.441140890 CEST5544453192.168.2.71.1.1.1
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 20, 2024 13:33:19.441140890 CEST192.168.2.71.1.1.10xf2abStandard query (0)time.windows.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 20, 2024 13:33:19.546120882 CEST1.1.1.1192.168.2.70xf2abNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:13:33:24
    Start date:20/04/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Downloader.MSIL.gen.rexp.13867.10030.exe"
    Imagebase:0x330000
    File size:15'797'760 bytes
    MD5 hash:6556B3CA424DB754337AB375E343EB97
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:13:33:25
    Start date:20/04/2024
    Path:C:\Windows\System32\msiexec.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\msiexec.exe /V
    Imagebase:0x7ff6bea70000
    File size:69'632 bytes
    MD5 hash:E5DA170027542E25EDE42FC54C929077
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly