crackme_zn15_02.exe

Kaspersky Lab

This is a setup program which is used to install the application. The file has been seen being downloaded from www.kaspersky.ru.
Publisher:
Kaspersky Lab  (signed and verified)

MD5:
7a3fc4b56ea11119dcef6902abb5cfe3

SHA-1:
841b0bdf2b19e5c5563daa5185186113273bee35

SHA-256:
94016a8aa500afd83bceb0b81ed61e02b97b18363ad5f39456cd5a319d576f21

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 4:34:53 AM UTC  (today)

File size:
573.8 KB (587,520 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
10/27/2014 7:00:00 AM

Valid to:
11/3/2017 7:00:00 PM

Subject:
CN=Kaspersky Lab, O=Kaspersky Lab, L=Moscow, S=Moscow City, C=RU, PostalCode=125212, STREET=39A/3 Leningradskoe shosse, SERIALNUMBER=1027739867473, OID.1.3.6.1.4.1.311.60.2.1.2=Moscow, OID.1.3.6.1.4.1.311.60.2.1.3=RU, OID.2.5.4.15=Private Organization

Issuer:
CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0D0C681CE3699DB3F3234F70A5CDD362

File PE Metadata
Compilation timestamp:
11/17/2015 7:27:23 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
12.0

CTPH (ssdeep):
6144:IDfpxjMnk4o8//3I1cqAjZNIwXOftDZLgxjPegdZZKqsBYxaTSuPkxLr/a8SyTBY:I0nk4oMwyVT+VDZ4nwTpirn5Vqnoqf

Entry address:
0x1D81

Entry point:
E8, 1C, 13, 00, 00, E9, 7B, FE, FF, FF, 55, 8B, EC, FF, 15, 30, C0, 40, 00, 6A, 01, A3, E4, 23, 41, 00, E8, 34, 16, 00, 00, FF, 75, 08, E8, DC, 19, 00, 00, 83, 3D, E4, 23, 41, 00, 00, 59, 59, 75, 08, 6A, 01, E8, 1A, 16, 00, 00, 59, 68, 09, 04, 00, C0, E8, AA, 19, 00, 00, 59, 5D, C3, 55, 8B, EC, 81, EC, 24, 03, 00, 00, 6A, 17, E8, 52, 96, 00, 00, 85, C0, 74, 05, 6A, 02, 59, CD, 29, A3, C8, 21, 41, 00, 89, 0D, C4, 21, 41, 00, 89, 15, C0, 21, 41, 00, 89, 1D, BC, 21, 41, 00, 89, 35, B8, 21, 41, 00, 89, 3D, B4...
 
[+]

Entropy:
7.9212  (probably packed)

Code size:
41.5 KB (42,496 bytes)

The file crackme_zn15_02.exe has been seen being distributed by the following URL.