Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
download.exe

Overview

General Information

Sample Name:download.exe
Analysis ID:606090
MD5:a2c883b0e7a1b002b088f52f647f2e2f
SHA1:0ed075b4c2163cac0463f4f6b7961d0850e1fc05
SHA256:27d4749a0db6fffdcc3744cb2ed29e8ffa8cc00140ee61faa3a4b0446d512076
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Program does not show much activity (idle)

Classification

  • System is w10x64
  • download.exe (PID: 6644 cmdline: "C:\Users\user\Desktop\download.exe" -install MD5: A2C883B0E7A1B002B088F52F647F2E2F)
  • download.exe (PID: 6696 cmdline: "C:\Users\user\Desktop\download.exe" /install MD5: A2C883B0E7A1B002B088F52F647F2E2F)
  • download.exe (PID: 6724 cmdline: "C:\Users\user\Desktop\download.exe" /load MD5: A2C883B0E7A1B002B088F52F647F2E2F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: download.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: download.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: download.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: download.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: download.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: download.exe, 00000000.00000003.251830348.0000000002258000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs download.exe
Source: download.exe, 00000000.00000000.220189376.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs download.exe
Source: download.exe, 00000001.00000000.225614313.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs download.exe
Source: download.exe, 00000001.00000003.246708963.0000000002248000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs download.exe
Source: download.exe, 00000002.00000002.243058852.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs download.exe
Source: download.exe, 00000002.00000003.242637775.0000000002228000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs download.exe
Source: download.exeBinary or memory string: OriginalFileName vs download.exe
Source: download.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: download.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004323DC
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004255DC
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0040E9C4
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_004323DC
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_004255DC
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_0040E9C4
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_004323DC
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_004255DC
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_0040E9C4
Source: C:\Users\user\Desktop\download.exeCode function: String function: 00427848 appears 63 times
Source: C:\Users\user\Desktop\download.exeCode function: String function: 0040CC60 appears 51 times
Source: C:\Users\user\Desktop\download.exeCode function: String function: 0040873C appears 54 times
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\download.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: unknownProcess created: C:\Users\user\Desktop\download.exe "C:\Users\user\Desktop\download.exe" -install
Source: unknownProcess created: C:\Users\user\Desktop\download.exe "C:\Users\user\Desktop\download.exe" /install
Source: unknownProcess created: C:\Users\user\Desktop\download.exe "C:\Users\user\Desktop\download.exe" /load
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_004AF110 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004AF9F0 FindResourceW,SizeofResource,LoadResource,LockResource,
Source: download.exeString found in binary or memory: Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file af
Source: download.exeString found in binary or memory: Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file af
Source: download.exeString found in binary or memory: Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file af
Source: download.exeString found in binary or memory: /LOADINF="filename"
Source: classification engineClassification label: clean5.winEXE@3/0@0/0
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0041A4DC GetDiskFreeSpaceW,
Source: C:\Users\user\Desktop\download.exeAutomated click: OK
Source: C:\Users\user\Desktop\download.exeAutomated click: OK
Source: C:\Users\user\Desktop\download.exeAutomated click: OK
Source: download.exeStatic file information: File size 1735928 > 1048576
Source: download.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004B5000 push 004B50DEh; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004B5980 push 004B5A48h; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00458000 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0049B03C push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004A00F8 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00458084 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004B1084 push 004B10ECh; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004A1094 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0041A0B4 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004270BC push 00427104h; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00458108 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004321C8 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004A21D8 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0049E1B8 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0049A260 push 0049A378h; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00455268 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004252D4 push ecx; mov dword ptr [esp], eax
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004592FC push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0045B284 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00430358 push ecx; mov dword ptr [esp], eax
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00430370 push ecx; mov dword ptr [esp], eax
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00459394 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004A1428 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0049B424 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004A24D8 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004224F0 push 004225F4h; ret
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004304F0 push ecx; mov dword ptr [esp], eax
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00499490 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00458564 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00458574 push ecx; mov dword ptr [esp], edx
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00457574 push ecx; mov dword ptr [esp], ecx
Source: download.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\download.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\download.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\download.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004AF91C GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 1_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_0040AEF4 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\download.exeCode function: 2_2_0040A928 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\download.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_00405AE0 cpuid
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_004B5114 GetModuleHandleW,GetVersion,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDEPPolicy,
Source: C:\Users\user\Desktop\download.exeCode function: 0_2_0041C3D8 GetLocalTime,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path Interception1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Process Injection
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager25
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 606090 Sample: download.exe Startdate: 08/04/2022 Architecture: WINDOWS Score: 5 4 download.exe 2->4         started        6 download.exe 2->6         started        8 download.exe 2->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
download.exe4%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUdownload.exefalse
    high
    https://jrsoftware.org/ishelp/index.php?topic=setupcmdlinedownload.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:606090
      Start date and time: 08/04/202223:58:492022-04-08 23:58:49 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 2s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:download.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Run name:Cmdline fuzzy
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean5.winEXE@3/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 19.7% (good quality ratio 19.5%)
      • Quality average: 77.6%
      • Quality standard deviation: 22.4%
      HCA Information:
      • Successful, ratio: 88%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Adjust boot time
      • Enable AMSI
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 20.82.210.154, 20.54.89.106, 52.152.110.14, 40.112.88.60, 20.54.110.249
      • Excluded domains from analysis (whitelisted): www.bing.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, sls.update.microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.547049237301527
      TrID:
      • Win32 Executable (generic) a (10002005/4) 98.04%
      • Inno Setup installer (109748/4) 1.08%
      • InstallShield setup (43055/19) 0.42%
      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
      • Win16/32 Executable Delphi generic (2074/23) 0.02%
      File name:download.exe
      File size:1735928
      MD5:a2c883b0e7a1b002b088f52f647f2e2f
      SHA1:0ed075b4c2163cac0463f4f6b7961d0850e1fc05
      SHA256:27d4749a0db6fffdcc3744cb2ed29e8ffa8cc00140ee61faa3a4b0446d512076
      SHA512:4894c7fc90c85a1e1d62a712688e39b3809e090653cf126fc36fe0555843206443612676ec2c9ab5a6df5cb0d62966624e4633abfe0a3f8a7a2e360f2c748dd1
      SSDEEP:24576:N4nXubIQGyxbPV0db26p2iInkk7vhTCxMLM05Zl3dWzXh35FqF+ahOIZDNJxjNh2:Nqe3f6JIPuxMA05Zl3EFqDEoN3jNhntU
      TLSH:0F85CF3FB268653FD4AE0B3245B39350997BBA61A81A8C2F07F0094DCF665701F3B656
      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
      Icon Hash:a2a0b496b2caca72
      Entrypoint:0x4b5eec
      Entrypoint Section:.itext
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
      DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x5FB0F96E [Sun Nov 15 09:48:30 2020 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:1
      File Version Major:6
      File Version Minor:1
      Subsystem Version Major:6
      Subsystem Version Minor:1
      Import Hash:5a594319a0d69dbc452e748bcf05892e
      Instruction
      push ebp
      mov ebp, esp
      add esp, FFFFFFA4h
      push ebx
      push esi
      push edi
      xor eax, eax
      mov dword ptr [ebp-3Ch], eax
      mov dword ptr [ebp-40h], eax
      mov dword ptr [ebp-5Ch], eax
      mov dword ptr [ebp-30h], eax
      mov dword ptr [ebp-38h], eax
      mov dword ptr [ebp-34h], eax
      mov dword ptr [ebp-2Ch], eax
      mov dword ptr [ebp-28h], eax
      mov dword ptr [ebp-14h], eax
      mov eax, 004B10F0h
      call 00007FA8C8A17D65h
      xor eax, eax
      push ebp
      push 004B65E2h
      push dword ptr fs:[eax]
      mov dword ptr fs:[eax], esp
      xor edx, edx
      push ebp
      push 004B659Eh
      push dword ptr fs:[edx]
      mov dword ptr fs:[edx], esp
      mov eax, dword ptr [004BE634h]
      call 00007FA8C8ABA48Fh
      call 00007FA8C8AB9FE2h
      lea edx, dword ptr [ebp-14h]
      xor eax, eax
      call 00007FA8C8A2D7D8h
      mov edx, dword ptr [ebp-14h]
      mov eax, 004C1D84h
      call 00007FA8C8A12957h
      push 00000002h
      push 00000000h
      push 00000001h
      mov ecx, dword ptr [004C1D84h]
      mov dl, 01h
      mov eax, dword ptr [004237A4h]
      call 00007FA8C8A2E83Fh
      mov dword ptr [004C1D88h], eax
      xor edx, edx
      push ebp
      push 004B654Ah
      push dword ptr fs:[edx]
      mov dword ptr fs:[edx], esp
      call 00007FA8C8ABA517h
      mov dword ptr [004C1D90h], eax
      mov eax, dword ptr [004C1D90h]
      cmp dword ptr [eax+0Ch], 01h
      jne 00007FA8C8AC0AFAh
      mov eax, dword ptr [004C1D90h]
      mov edx, 00000028h
      call 00007FA8C8A2F134h
      mov edx, dword ptr [004C1D90h]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xf36.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x4800.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xc22e40x244.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xb361c0xb3800False0.344863934105data6.35605820433IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .itext0xb50000x16880x1800False0.544921875data5.97275005522IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0xb70000x37a40x3800False0.360979352679data5.04440056201IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .bss0xbb0000x6de80x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .idata0xc20000xf360x1000False0.3681640625data4.89870464796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .didata0xc30000x1a40x200False0.345703125data2.75636286825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .edata0xc40000x9a0x200False0.2578125data1.87222286659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .tls0xc50000x180x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rdata0xc60000x5d0x200False0.189453125data1.38389437522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0xc70000x48000x4800False0.314832899306data4.41298427192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0xc74c80x128GLS_BINARY_LSB_FIRSTDutchNetherlands
      RT_ICON0xc75f00x568GLS_BINARY_LSB_FIRSTDutchNetherlands
      RT_ICON0xc7b580x2e8dataDutchNetherlands
      RT_ICON0xc7e400x8a8dataDutchNetherlands
      RT_STRING0xc86e80x360data
      RT_STRING0xc8a480x260data
      RT_STRING0xc8ca80x45cdata
      RT_STRING0xc91040x40cdata
      RT_STRING0xc95100x2d4data
      RT_STRING0xc97e40xb8data
      RT_STRING0xc989c0x9cdata
      RT_STRING0xc99380x374data
      RT_STRING0xc9cac0x398data
      RT_STRING0xca0440x368data
      RT_STRING0xca3ac0x2a4data
      RT_RCDATA0xca6500x10data
      RT_RCDATA0xca6600x2c4data
      RT_RCDATA0xca9240x2cdata
      RT_GROUP_ICON0xca9500x3edataEnglishUnited States
      RT_VERSION0xca9900x584dataEnglishUnited States
      RT_MANIFEST0xcaf140x726XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
      DLLImport
      kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
      comctl32.dllInitCommonControls
      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
      netapi32.dllNetWkstaGetInfo, NetApiBufferFree
      advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
      NameOrdinalAddress
      TMethodImplementationIntercept30x454060
      __dbk_fcall_wrapper20x40d0a0
      dbkFCallWrapperAddr10x4be63c
      DescriptionData
      LegalCopyright
      FileVersion
      CompanyName
      CommentsThis installation was built with Inno Setup.
      ProductNameInno Script Studio
      ProductVersion1.0
      FileDescriptionInno Script Studio Setup
      OriginalFileName
      Translation0x0000 0x04b0
      Language of compilation systemCountry where language is spokenMap
      DutchNetherlands
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Target ID:0
      Start time:23:59:45
      Start date:08/04/2022
      Path:C:\Users\user\Desktop\download.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\download.exe" -install
      Imagebase:0x400000
      File size:1735928 bytes
      MD5 hash:A2C883B0E7A1B002B088F52F647F2E2F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Borland Delphi
      Reputation:low

      Target ID:1
      Start time:23:59:48
      Start date:08/04/2022
      Path:C:\Users\user\Desktop\download.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\download.exe" /install
      Imagebase:0x400000
      File size:1735928 bytes
      MD5 hash:A2C883B0E7A1B002B088F52F647F2E2F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Borland Delphi
      Reputation:low

      Target ID:2
      Start time:23:59:50
      Start date:08/04/2022
      Path:C:\Users\user\Desktop\download.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\download.exe" /load
      Imagebase:0x400000
      File size:1735928 bytes
      MD5 hash:A2C883B0E7A1B002B088F52F647F2E2F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Borland Delphi
      Reputation:low

      No disassembly