Edit tour

Windows Analysis Report
http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=s

Overview

General Information

Sample URL:http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn
Analysis ID:1388641
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates files inside the system directory
Downloads executable code via HTTP
Drops PE files
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 2916 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.com MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3528 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6780 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5356 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.63.206.91:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.63.206.91:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 17MB later: 32MB
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKAccept-Ranges: bytesCache-Control: public,max-age=86400Content-Disposition: attachmentContent-Length: 4990512Content-Security-Policy: default-src 'none'Content-Type: application/octet-streamEtag: "2345efd"Server: downloadsX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-Xss-Protection: 0Date: Wed, 07 Feb 2024 19:36:49 GMTAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Last-Modified: Tue, 06 Feb 2024 00:37:52 GMTConnection: keep-aliveVary: OriginCross-Origin-Resource-Policy: cross-originData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 64 86 08 00 97 3a c1 65 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 00 00 32 00 00 00 a2 4b 00 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 50 4c 00 00 04 00 00 f1 e3 4c 00 02 00 60 c1 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a1 58 00 00 50 00 00 00 00 b0 00 00 30 80 4b 00 00 80 00 00 7c 02 00 00 00 da 4b 00 30 4c 00 00 00 40 4c 00 30 00 00 00 e4 57 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 50 00 00 40 01 00 00 00 00 00 00 00 00 00 00 f8 5a 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f6 31 00 00 00 10 00 00 00 32 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 08 14 00 00 00 50 00 00 00 16 00 00 00 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 70 00 00 00 00 70 00 00 00 02 00 00 00 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 7c 02 00 00 00 80 00 00 00 04 00 00 00 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 30 30 63 66 67 00 00 30 00 00 00 00 90 00 00 00 02 00 00 00 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 74 70 6c 6e 65 8c 00 00 00 00 a0 00 00 00 02 00 00 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 72 73 72 63 00 00 00 30 80 4b 00 00 b0 00 00 00 82 4b 00 00 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 30 00 00 00 00 40 4c 00 00 02 00 00 00 d8 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEd:e"2K@PLL`
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.107.21.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.63.206.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: global trafficHTTP traffic detected: GET /edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.com HTTP/1.1Host: r2---sn-j5o7dn7e.gvt1-cn.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?mh=bd&pl=26&shardbypass=sd&redirect_counter=1&rm=sn-j5ok7l&req_id=64241ccfae0a2087&cms_redirect=yes&ipbypass=yes&mip=81.181.57.74&mm=28&mn=sn-p5qlsnrl&ms=nvh&mt=1707333027&mv=u&mvi=5&rmhost=r4---sn-p5qlsnrl.googlevideo.com&smhost=r4---sn-p5qlsn76.googlevideo.com HTTP/1.1Host: r5---sn-p5qlsnrl.googlevideo.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: unknownDNS traffic detected: queries for: r2---sn-j5o7dn7e.gvt1-cn.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 23.63.206.91:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.63.206.91:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_2916_1160959057
Source: classification engineClassification label: clean2.win@16/8@12/108
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\91fa1950-d0f3-4d50-824c-9e32916b428d.tmp
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5356 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5356 --field-trial-handle=1944,i,8710983719684139060,1819975420466054104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\91fa1950-d0f3-4d50-824c-9e32916b428d.tmpJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 507474.crdownloadJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture11
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.com0%Avira URL Cloudsafe
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Unconfirmed 507474.crdownload0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.105.84
truefalse
    high
    r2.sn-j5o7dn7e.gvt1-cn.com
    113.108.239.195
    truefalse
      unknown
      r5.sn-p5qlsnrl.googlevideo.com
      74.125.155.42
      truefalse
        high
        www.google.com
        74.125.136.103
        truefalse
          high
          clients.l.google.com
          172.253.124.100
          truefalse
            high
            clients1.google.com
            unknown
            unknownfalse
              high
              clients2.google.com
              unknown
              unknownfalse
                high
                r2---sn-j5o7dn7e.gvt1-cn.com
                unknown
                unknownfalse
                  unknown
                  r5---sn-p5qlsnrl.googlevideo.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://r5---sn-p5qlsnrl.googlevideo.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?mh=bd&pl=26&shardbypass=sd&redirect_counter=1&rm=sn-j5ok7l&req_id=64241ccfae0a2087&cms_redirect=yes&ipbypass=yes&mip=81.181.57.74&mm=28&mn=sn-p5qlsnrl&ms=nvh&mt=1707333027&mv=u&mvi=5&rmhost=r4---sn-p5qlsnrl.googlevideo.com&smhost=r4---sn-p5qlsn76.googlevideo.comfalse
                      high
                      http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.comfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        172.253.124.100
                        clients.l.google.comUnited States
                        15169GOOGLEUSfalse
                        74.125.138.102
                        unknownUnited States
                        15169GOOGLEUSfalse
                        74.125.136.94
                        unknownUnited States
                        15169GOOGLEUSfalse
                        1.1.1.1
                        unknownAustralia
                        13335CLOUDFLARENETUSfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        142.250.105.84
                        accounts.google.comUnited States
                        15169GOOGLEUSfalse
                        74.125.155.42
                        r5.sn-p5qlsnrl.googlevideo.comUnited States
                        15169GOOGLEUSfalse
                        172.217.215.94
                        unknownUnited States
                        15169GOOGLEUSfalse
                        74.125.136.103
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        113.108.239.195
                        r2.sn-j5o7dn7e.gvt1-cn.comChina
                        58466CT-GUANGZHOU-IDCCHINANETGuangdongprovincenetworkCNfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1388641
                        Start date and time:2024-02-07 20:36:19 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Sample URL:http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&mh=bd&mip=116.6.73.146&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1707331490&mv=u&mvi=2&pl=22&rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&shardbypass=sd&smhost=r2---sn-j5o76n7l.gvt1-cn.com
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Detection:CLEAN
                        Classification:clean2.win@16/8@12/108
                        • Exclude process from analysis (whitelisted): svchost.exe
                        • Excluded IPs from analysis (whitelisted): 172.217.215.94, 34.104.35.123
                        • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenFile calls found.
                        • VT rate limit hit for: http://r2---sn-j5o7dn7e.gvt1-cn.com/edgedl/release2/chrome/ad4gif7s3quypxnza3f6jszozugq_121.0.6167.160/121.0.6167.160_121.0.6167.140_chrome_updater.exe?cms_redirect=yes&amp;mh=bd&amp;mip=116.6.73.146&amp;mm=28&amp;mn=sn-j5o7dn7e&amp;ms=nvh&amp;mt=1707331490&amp;mv=u&amp;mvi=2&amp;pl=22&amp;rmhost=r4---sn-j5o7dn7e.gvt1-cn.com&amp;shardbypass=sd&amp;smhost=r2---sn-j5o76n7l.gvt1-cn.com
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Feb 7 18:36:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.98309676513556
                        Encrypted:false
                        SSDEEP:
                        MD5:17A9BC21116FBD54508716646CED1C4A
                        SHA1:576985CA2E9A52D13965E1AC86E1413B60BCBB03
                        SHA-256:905BA23352661A2E3503ABD8E56808A4F8CB3F7EF8A6F740162CC115A28875BE
                        SHA-512:C81AB671C3775CD70200CBED84DD480F10AC226092F44F2DEF842469C253471004C797D6313617C4868EC01799A239C0FE6872FFE0574430DA0A83378EDF0595
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....j.a..Y..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Feb 7 18:36:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):4.0018966375452285
                        Encrypted:false
                        SSDEEP:
                        MD5:ABABD6C6A773AAFB2C1D157A9D61DAA8
                        SHA1:030B1CB45DAEC2C95442248A6CB2570F186BD50C
                        SHA-256:50DC391BDA90C2E9827025255FD42E6BBBC5AED892D7ED1B370C397FF3E4BA17
                        SHA-512:8E72CBD632891C511F8641E2E7A7CD647394E71D8733357A8FC0F745465D51BEF78C4C4964B65CC039A9A80FA82D6E6D60920671C51C1B8A43FE49CFF4C7F2BE
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....zV..Y..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.006813552852168
                        Encrypted:false
                        SSDEEP:
                        MD5:8EDE2945BB50ABD34AE0BCBA73A8A674
                        SHA1:68E85B330EB5A571A63F361DE36980B14B4753C4
                        SHA-256:B6F5DC772C91C2AE8631FF2A4F604980EA847A003E22B72F553FE3E38F169608
                        SHA-512:C69F4C5939A1A0C1B2DC6C3B001DB9D22AEC7FC5A362A7EDF5F5A879EEDDFAE15C7F2F9BE9B1890EE0A5F10F41B538E2419D1D25923A6DA7037AFE624316AD45
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Feb 7 18:36:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.999063778461231
                        Encrypted:false
                        SSDEEP:
                        MD5:904B4173271BC52454264832C7A8E1F6
                        SHA1:94DF5EC1AFA096971479A661F1ED58DC1B7847BB
                        SHA-256:DC6079BF32FC330B6777CA7EAB6A9336FF9B66CD22492065158D01CD4B7FBA31
                        SHA-512:8C92C4F7FF8DE8B45723D10E9C1C924A9A367A3FEC8803F2BF4C581080515FF2DB958937365067B858B81F658BC52396BB7D40C1D370C2B97F40301AF24EECFC
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....w.P..Y..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Feb 7 18:36:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.984488800884235
                        Encrypted:false
                        SSDEEP:
                        MD5:4CF90101326AD1C371AAEBD9D8A82CDC
                        SHA1:0DDF2B6AC57C549EDCFF6E4E41DFB285ED778714
                        SHA-256:EE134605781A54D502296858DC6F9EC4D04EE22A768AEE3CAC4F562DE50A7C49
                        SHA-512:CF7D55D1F325F19DA08B89768D6FDC8DD4DC460572CED77AC38ADCE20E42778680EE083843D48394217AFFB2C4625B4B4E65D26CC7C6F2A88AA02A73318F9EBB
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....HG\..Y..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Feb 7 18:36:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):3.9971153339471246
                        Encrypted:false
                        SSDEEP:
                        MD5:F4878BF70B86AC7A42473535B8AFCFA7
                        SHA1:47490D0FE4B90241211225F3CBFF23A9B392FBB0
                        SHA-256:13406ECD78B5D185F0D0C3FD78A81EF7B99F800CDE0960FD00BBDF42A2486E55
                        SHA-512:493EB2500B6C1169158F027E7BA56FDF28F44776603B759525F2489D0F79A20FC377DA9D9DAF84B5CBC4E2AEEB9728AA38DBDBCFA682536E79F0CD24E1368028
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....G..Y..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............`.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):50878
                        Entropy (8bit):7.205493699960413
                        Encrypted:false
                        SSDEEP:
                        MD5:FDCE395CF5847E1E5CFC29A9B5FFA428
                        SHA1:93D11FCBD31B954CA4A3EF2300AE0D0B012E0449
                        SHA-256:2643A50282A17681DDBDA4709CE5E5CDC03BA6BE4AA461682138E36B0D8C88C4
                        SHA-512:8A21E141A85FF22DFE3EE189604EEAF69C160BEB859509622E48CDAF404C8CBC2D3EF2B730979D489440AA65F9A6D294CCAE09D7D1E0D3B558ABBA35AA21DB0F
                        Malicious:false
                        Reputation:unknown
                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....:.e.........."......2....K................@.............................PL.......L...`..................................................X..P.......0.K.....|.....K.0L...@L.0....W..............................PP..@............Z...............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...p....p.......L..............@....pdata..|............N..............@..@.00cfg..0............R..............@..@.retplne.............T...................rsrc...0.K.......K..V..............@..@.reloc..0....@L.......K.............@..B........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):4990512
                        Entropy (8bit):7.997991624452836
                        Encrypted:true
                        SSDEEP:
                        MD5:FE6E84B35A840B7870255FE830E8233A
                        SHA1:81F8A4E40BF23D7F89C8B5A72D29E4332CBEC973
                        SHA-256:5D5E6416F44B3904417BBC7455D91B7845E77F1CF38A530F69723F6A982D5D4A
                        SHA-512:4E81600CB460372EAC18D6C15DCDC515BEFF0A5D8620DCB732C7A5694E82833CE181E784B68DF34A78C3DFB4F65262F8DAF49686C41C40E4334449221C4BBA35
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Reputation:unknown
                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....:.e.........."......2....K................@.............................PL.......L...`..................................................X..P.......0.K.....|.....K.0L...@L.0....W..............................PP..@............Z...............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...p....p.......L..............@....pdata..|............N..............@..@.00cfg..0............R..............@..@.retplne.............T...................rsrc...0.K.......K..V..............@..@.reloc..0....@L.......K.............@..B........................................................................................................................................................................................................................................................................................................
                        No static file info