Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://lyddemper.com

Overview

General Information

Sample URL:http://lyddemper.com
Analysis ID:1431663
Infos:
Errors
  • URL not reachable

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic

Classification

  • System is w10x64
  • chrome.exe (PID: 5548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3940 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1984,i,4208091234545265804,13901424910785776037,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6372 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://lyddemper.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:04/25/24-15:44:05.888809
SID:2051794
Source Port:54758
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-15:44:05.889007
SID:2051794
Source Port:63931
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://lyddemper.comAvira URL Cloud: detection malicious, Label: malware
Source: http://lyddemper.comVirustotal: Detection: 16%Perma Link

Networking

barindex
Source: TrafficSnort IDS: 2051794 ET CURRENT_EVENTS TA569 Middleware Domain in DNS Lookup (lyddemper .com) 192.168.2.4:54758 -> 1.1.1.1:53
Source: TrafficSnort IDS: 2051794 ET CURRENT_EVENTS TA569 Middleware Domain in DNS Lookup (lyddemper .com) 192.168.2.4:63931 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: lyddemper.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: classification engineClassification label: mal64.win@18/0@4/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1984,i,4208091234545265804,13901424910785776037,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://lyddemper.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1984,i,4208091234545265804,13901424910785776037,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://lyddemper.com100%Avira URL Cloudmalware
http://lyddemper.com16%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    www.google.com
    108.177.122.106
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalse
        unknown
        lyddemper.com
        173.44.141.131
        truefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          173.44.141.131
          lyddemper.comUnited States
          62904EONIX-COMMUNICATIONS-ASBLOCK-62904USfalse
          108.177.122.106
          www.google.comUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          IP
          192.168.2.4
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1431663
          Start date and time:2024-04-25 15:43:14 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 14s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://lyddemper.com
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal64.win@18/0@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.105.94, 172.253.124.101, 172.253.124.138, 172.253.124.139, 172.253.124.100, 172.253.124.113, 172.253.124.102, 108.177.122.84, 34.104.35.123, 23.220.189.216, 40.127.169.103, 199.232.214.172, 192.229.211.108, 20.3.187.198, 52.165.164.15
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          04/25/24-15:44:05.888809UDP2051794ET CURRENT_EVENTS TA569 Middleware Domain in DNS Lookup (lyddemper .com)5475853192.168.2.41.1.1.1
          04/25/24-15:44:05.889007UDP2051794ET CURRENT_EVENTS TA569 Middleware Domain in DNS Lookup (lyddemper .com)6393153192.168.2.41.1.1.1
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2024 15:43:56.881652117 CEST49678443192.168.2.4104.46.162.224
          Apr 25, 2024 15:43:57.959568977 CEST49675443192.168.2.4173.222.162.32
          Apr 25, 2024 15:44:06.031346083 CEST4973580192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:06.031672001 CEST4973680192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:06.163346052 CEST4973780192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:07.036997080 CEST4973680192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:07.037009954 CEST4973580192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:07.163469076 CEST4973780192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:07.567295074 CEST49675443192.168.2.4173.222.162.32
          Apr 25, 2024 15:44:08.889698029 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:08.889765978 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:08.889868021 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:08.890311956 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:08.890350103 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.039334059 CEST4973680192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:09.039338112 CEST4973580192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:09.128519058 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.133821964 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:09.133879900 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.135482073 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.135566950 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:09.138312101 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:09.138411045 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.176242113 CEST4973780192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:09.194585085 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:09.194610119 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:09.240617990 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:13.046746969 CEST4973580192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:13.046782017 CEST4973680192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:13.177781105 CEST4973780192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:19.114413977 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:19.114572048 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:19.114747047 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:20.900429964 CEST49740443192.168.2.4108.177.122.106
          Apr 25, 2024 15:44:20.900459051 CEST44349740108.177.122.106192.168.2.4
          Apr 25, 2024 15:44:21.058206081 CEST4973580192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:21.058218956 CEST4973680192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:21.180294991 CEST4973780192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:28.220067978 CEST4974980192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:28.220403910 CEST4975080192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:28.492799044 CEST4975180192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:29.224919081 CEST4974980192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:29.224947929 CEST4975080192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:29.504172087 CEST4975180192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:31.232259989 CEST4974980192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:31.232269049 CEST4975080192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:31.507339001 CEST4975180192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:35.245281935 CEST4975080192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:35.245286942 CEST4974980192.168.2.4173.44.141.131
          Apr 25, 2024 15:44:35.513741970 CEST4975180192.168.2.4173.44.141.131
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2024 15:44:04.447088957 CEST53651621.1.1.1192.168.2.4
          Apr 25, 2024 15:44:04.512713909 CEST53524791.1.1.1192.168.2.4
          Apr 25, 2024 15:44:05.172287941 CEST53554161.1.1.1192.168.2.4
          Apr 25, 2024 15:44:05.888808966 CEST5475853192.168.2.41.1.1.1
          Apr 25, 2024 15:44:05.889007092 CEST6393153192.168.2.41.1.1.1
          Apr 25, 2024 15:44:06.015588045 CEST53639311.1.1.1192.168.2.4
          Apr 25, 2024 15:44:06.030735970 CEST53547581.1.1.1192.168.2.4
          Apr 25, 2024 15:44:08.452836037 CEST5185053192.168.2.41.1.1.1
          Apr 25, 2024 15:44:08.453213930 CEST5494253192.168.2.41.1.1.1
          Apr 25, 2024 15:44:08.563519955 CEST53518501.1.1.1192.168.2.4
          Apr 25, 2024 15:44:08.563540936 CEST53549421.1.1.1192.168.2.4
          Apr 25, 2024 15:44:23.754160881 CEST53500871.1.1.1192.168.2.4
          Apr 25, 2024 15:44:27.446077108 CEST138138192.168.2.4192.168.2.255
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 25, 2024 15:44:05.888808966 CEST192.168.2.41.1.1.10xcf0Standard query (0)lyddemper.comA (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:05.889007092 CEST192.168.2.41.1.1.10xd224Standard query (0)lyddemper.com65IN (0x0001)false
          Apr 25, 2024 15:44:08.452836037 CEST192.168.2.41.1.1.10x569bStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.453213930 CEST192.168.2.41.1.1.10x316fStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 25, 2024 15:44:06.030735970 CEST1.1.1.1192.168.2.40xcf0No error (0)lyddemper.com173.44.141.131A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.106A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.104A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.103A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.105A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.99A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563519955 CEST1.1.1.1192.168.2.40x569bNo error (0)www.google.com108.177.122.147A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:08.563540936 CEST1.1.1.1192.168.2.40x316fNo error (0)www.google.com65IN (0x0001)false
          Apr 25, 2024 15:44:20.565274000 CEST1.1.1.1192.168.2.40x8d37No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:20.565274000 CEST1.1.1.1192.168.2.40x8d37No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:20.920754910 CEST1.1.1.1192.168.2.40xcbc9No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 25, 2024 15:44:20.920754910 CEST1.1.1.1192.168.2.40xcbc9No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          Apr 25, 2024 15:44:34.179768085 CEST1.1.1.1192.168.2.40x4503No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 25, 2024 15:44:34.179768085 CEST1.1.1.1192.168.2.40x4503No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:15:44:00
          Start date:25/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:15:44:02
          Start date:25/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1984,i,4208091234545265804,13901424910785776037,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:15:44:05
          Start date:25/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://lyddemper.com"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly