magicplus_setup.exe

乐助手

LENOVO

This is a setup and installation application. The file has been seen being downloaded from api.sj.lenovomm.com.
Publisher:
联想  (signed by LENOVO)

Product:
乐助手

Version:
1.0.0.1

MD5:
9cf720b3db5a69e2479366292fafb216

SHA-1:
0c6f83f8a4a6dc960ad1fa2b5621e5684b50269b

SHA-256:
448425dfe9b264627ae462f8555ceef654f738f186f7f3d6d6245503435596d2

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/24/2024 8:07:24 AM UTC  (today)

File size:
30.6 MB (32,114,312 bytes)

Product version:
1.0.0.1

Copyright:
联想保留所有权利。

Original file name:
BootStrap.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese (Simplified, China)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/3/2014 5:30:00 AM

Valid to:
3/3/2017 5:29:59 AM

Subject:
CN=LENOVO, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=LENOVO, L=Morrisville, S=North Carolina, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
51B8043B2DED3142A7C38F95BCD765F0

File PE Metadata
Compilation timestamp:
4/30/2015 10:42:24 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
786432:JF3vJ3ur330jFvPp5sc2wW006riVgzMpBWaaTu:JF31uL0jpPp5PWH6riPpcy

Entry address:
0x10D4B9

Entry point:
E8, 8A, 89, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, 90, BE, 58, 00, 75, 02, F3, C3, E9, 11, 8A, 00, 00, 8B, FF, 51, C7, 01, 98, 16, 56, 00, E8, 09, 8B, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, F1, E8, E3, FF, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 72, 09, F0, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 83, C1, 09, 51, 83, C0, 09, 50, E8, 48, 8B, 00, 00, F7, D8, 59, 1B, C0, 59, 40, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 83, EC, 20, 53, 57, 33, DB, 6A, 07, 33, C0, 59, 8D, 7D, E4, 89, 5D...
 
[+]

Entropy:
7.7938  (probably packed)

Code size:
1.2 MB (1,283,584 bytes)

The file magicplus_setup.exe has been seen being distributed by the following URL.