Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6ruXkfgh.js

Overview

General Information

Sample name:6ruXkfgh.js
Analysis ID:1587364
MD5:e90ae8ec16ea2056caaa64ac13a31373
SHA1:8041a1bda3769b97d8e8b980c6a77fcd2829d715
SHA256:df215a01f6a83014a148c6e407cdc8422e9119a88b4220a1321b2986ea9aef63
Tags:jsuser-threatinte1
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected obfuscated html page
Detected non-DNS traffic on DNS port
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)

Classification

  • System is w10x64
  • chrome.exe (PID: 1352 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\6ruXkfgh.js" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5104 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2220,i,8543604240175508167,3100527296868294820,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
6ruXkfgh.jsJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 6ruXkfgh.jsVirustotal: Detection: 9%Perma Link
    Source: 6ruXkfgh.jsReversingLabs: Detection: 18%

    Phishing

    barindex
    Source: Yara matchFile source: 6ruXkfgh.js, type: SAMPLE
    Source: file:///C:/Users/user/Desktop/6ruXkfgh.jsHTTP Parser: No favicon
    Source: global trafficTCP traffic: 192.168.2.4:60153 -> 1.1.1.1:53
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
    Source: unknownTCP traffic detected without corresponding DNS query: 217.20.57.20
    Source: unknownTCP traffic detected without corresponding DNS query: 217.20.57.20
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: 6ruXkfgh.jsInitial sample: Strings found which are bigger than 50
    Source: classification engineClassification label: mal56.phis.winJS@24/0@2/3
    Source: 6ruXkfgh.jsVirustotal: Detection: 9%
    Source: 6ruXkfgh.jsReversingLabs: Detection: 18%
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\6ruXkfgh.js"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2220,i,8543604240175508167,3100527296868294820,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2220,i,8543604240175508167,3100527296868294820,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid AccountsWindows Management Instrumentation1
    Scripting
    1
    Process Injection
    1
    Process Injection
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    6ruXkfgh.js10%VirustotalBrowse
    6ruXkfgh.js18%ReversingLabsWin32.Phishing.Generic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    file:///C:/Users/user/Desktop/6ruXkfgh.js0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    www.google.com
    142.250.185.196
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      file:///C:/Users/user/Desktop/6ruXkfgh.jstrue
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.185.196
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1587364
      Start date and time:2025-01-10 09:22:04 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowshtmlcookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:6ruXkfgh.js
      Detection:MAL
      Classification:mal56.phis.winJS@24/0@2/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .js
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.186.35, 142.250.184.206, 142.251.168.84, 142.250.186.174, 142.250.181.238, 216.58.206.74, 172.217.16.138, 216.58.212.170, 172.217.18.106, 142.250.185.170, 142.250.185.106, 172.217.18.10, 142.250.181.234, 172.217.16.202, 142.250.184.234, 216.58.206.42, 142.250.186.42, 142.250.184.202, 216.58.212.138, 142.250.185.74, 142.250.186.106, 199.232.214.172, 192.229.221.95, 172.217.18.14, 142.250.186.46, 142.250.185.206, 142.250.186.78, 142.250.185.99, 172.217.16.206, 142.250.185.174, 142.250.81.238, 74.125.0.102, 2.23.242.162, 4.175.87.197, 13.107.253.45, 20.12.23.50
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, r1.sn-t0aekn7e.gvt1.com, clients.l.google.com, r1---sn-t0aekn7e.gvt1.com, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250http://18ofcontents.shopGet hashmaliciousUnknownBrowse
        https://www.dcamarketintelligence.com/tdtGet hashmaliciousUnknownBrowse
          http://steamcommunuiity.comGet hashmaliciousUnknownBrowse
            https://cdn.btmessage.com/Get hashmaliciousHTMLPhisherBrowse
              https://stoss3.libooc.comGet hashmaliciousUnknownBrowse
                http://stoss3.libooc.comGet hashmaliciousUnknownBrowse
                  http://45.125.67.168/stelin/Crawl.exeGet hashmaliciousUnknownBrowse
                    https://delivery-pack.com/checkout/?add-to-cart=12Get hashmaliciousUnknownBrowse
                      http://www.austrata.net.auGet hashmaliciousUnknownBrowse
                        https://www.cineuserdad.ecGet hashmaliciousUnknownBrowse
                          No context
                          No context
                          No context
                          No context
                          No created / dropped files found
                          File type:HTML document, ASCII text, with very long lines (47158), with CRLF line terminators
                          Entropy (8bit):2.4415296098792627
                          TrID:
                          • HyperText Markup Language (13008/1) 61.90%
                          • HTML Application (8008/1) 38.10%
                          File name:6ruXkfgh.js
                          File size:47'975 bytes
                          MD5:e90ae8ec16ea2056caaa64ac13a31373
                          SHA1:8041a1bda3769b97d8e8b980c6a77fcd2829d715
                          SHA256:df215a01f6a83014a148c6e407cdc8422e9119a88b4220a1321b2986ea9aef63
                          SHA512:0e2387a7813adf066dab3ec72b4525cfb4965c3d124595165de42ea17e35055a2e5c7bbf9eae70568e2290cec9d627f742c23129730ec730a947175916c8fc7b
                          SSDEEP:384:gLezlvdbmgM8m956YSmzBB5CtbHA7lvRvw:gOlvBvm956YfwTARZ4
                          TLSH:E923CE7B9442E09BA5278BBFFDEC2C6116015C77ADF86F4961F8800F3AFC5C66124989
                          File Content Preview:<script>.. ..(function() {.. var d = unescape("%61%61%64%34%35%30%62%36%62%39%66%64%39%31%35%36%20%64%28%33%27%38%3d%34%29%63%4c%58%51%50%22%0a%20%51%49%58%45%63%4c%58%58%54%70%49%55%59%4d%5a%21%65%3c%70%39%25%70%27%53%51%54%45%58%4d%46%50%49%65%63%
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 10, 2025 09:23:05.903208017 CET49675443192.168.2.4173.222.162.32
                          Jan 10, 2025 09:23:10.537070990 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:10.537111044 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:10.537178993 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:10.537384033 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:10.537395000 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.169635057 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.292959929 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:11.308568001 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:11.308593035 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.309911966 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.309921980 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.310062885 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:11.423671007 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:11.423871994 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.496032953 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:11.496062040 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:11.683590889 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:16.720328093 CET8049723217.20.57.20192.168.2.4
                          Jan 10, 2025 09:23:16.721317053 CET4972380192.168.2.4217.20.57.20
                          Jan 10, 2025 09:23:16.772032022 CET4972380192.168.2.4217.20.57.20
                          Jan 10, 2025 09:23:16.776964903 CET8049723217.20.57.20192.168.2.4
                          Jan 10, 2025 09:23:21.082103968 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:21.082175970 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:23:21.082223892 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:21.450263977 CET49737443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:23:21.450304031 CET44349737142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:10.590600014 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:10.590620041 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:10.590697050 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:10.590924978 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:10.590935946 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:11.222259998 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:11.222628117 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:11.222646952 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:11.223834991 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:11.224106073 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:11.224281073 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:11.264571905 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:21.121654987 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:21.121730089 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:21.121786118 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:21.454016924 CET49838443192.168.2.4142.250.185.196
                          Jan 10, 2025 09:24:21.454044104 CET44349838142.250.185.196192.168.2.4
                          Jan 10, 2025 09:24:42.708079100 CET6015353192.168.2.41.1.1.1
                          Jan 10, 2025 09:24:42.713054895 CET53601531.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:42.713186026 CET6015353192.168.2.41.1.1.1
                          Jan 10, 2025 09:24:42.728018999 CET6015353192.168.2.41.1.1.1
                          Jan 10, 2025 09:24:42.734405994 CET53601531.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:43.166317940 CET53601531.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:43.168251991 CET6015353192.168.2.41.1.1.1
                          Jan 10, 2025 09:24:43.173461914 CET53601531.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:43.173536062 CET6015353192.168.2.41.1.1.1
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 10, 2025 09:23:06.785136938 CET53608641.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:07.086105108 CET53578241.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:08.116935015 CET53560501.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:10.529067993 CET5567553192.168.2.41.1.1.1
                          Jan 10, 2025 09:23:10.529227972 CET5569953192.168.2.41.1.1.1
                          Jan 10, 2025 09:23:10.535758018 CET53556991.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:10.536194086 CET53556751.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:17.460005045 CET138138192.168.2.4192.168.2.255
                          Jan 10, 2025 09:23:19.504913092 CET53496301.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:25.176282883 CET53594471.1.1.1192.168.2.4
                          Jan 10, 2025 09:23:44.036295891 CET53607361.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:06.615747929 CET53549701.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:07.004276991 CET53630691.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:37.645251036 CET53493401.1.1.1192.168.2.4
                          Jan 10, 2025 09:24:42.707386971 CET53539311.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 10, 2025 09:23:10.529067993 CET192.168.2.41.1.1.10x8d72Standard query (0)www.google.comA (IP address)IN (0x0001)false
                          Jan 10, 2025 09:23:10.529227972 CET192.168.2.41.1.1.10xe344Standard query (0)www.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 10, 2025 09:23:10.535758018 CET1.1.1.1192.168.2.40xe344No error (0)www.google.com65IN (0x0001)false
                          Jan 10, 2025 09:23:10.536194086 CET1.1.1.1192.168.2.40x8d72No error (0)www.google.com142.250.185.196A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:03:23:01
                          Start date:10/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\6ruXkfgh.js"
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:1
                          Start time:03:23:04
                          Start date:10/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2220,i,8543604240175508167,3100527296868294820,262144 /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly