ue_of_legends_riot_point_genarator_v1.0.0.exe

Remote Service Application

Microsoft Corp.

The executable ue_of_legends_riot_point_genarator_v1.0.0.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from s5.dosya.tc.
Publisher:
Microsoft Corp.

Product:
Remote Service Application

Version:
1, 0, 0, 1

MD5:
894419be06af8e9c8fce69ced28da813

SHA-1:
d296925e4e8aa04307bc5b9432182281fdc2b6e9

SHA-256:
05528b38a50f66da38b3a1dac5c476caa48aacec96c6681214b0245b69431326

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/26/2024 1:27:50 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Backdoor.Meta (M)
16.7.10.23

File size:
663.5 KB (679,424 bytes)

Product version:
4, 0, 0, 0

Copyright:
Copyright (C) 1999

Original file name:
MSRSAAP.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\ue_of_legends_riot_point_genarator_v1.0.0.exe

File PE Metadata
Compilation timestamp:
6/7/2012 6:59:53 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:I9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hR:8Z1xuVVjfFoynPaVBUR8f+kN10EBf

Entry address:
0x8F888

Entry point:
55, 8B, EC, B9, 30, 00, 00, 00, 6A, 00, 6A, 00, 49, 75, F9, 51, 53, 56, 57, B8, E0, E3, 48, 00, E8, 2F, 7E, F7, FF, 33, C0, 55, 68, 56, 06, 49, 00, 64, FF, 30, 64, 89, 20, 6A, 00, E8, 2A, 07, F8, FF, A1, B0, 48, 49, 00, C6, 00, 01, E8, 21, B7, FF, FF, B2, 01, A1, 80, DE, 48, 00, E8, 19, E6, FF, FF, A3, E8, C3, 49, 00, 33, D2, 55, 68, 09, FA, 48, 00, 64, FF, 32, 64, 89, 22, 8D, 4D, EC, BA, 70, 06, 49, 00, A1, E8, C3, 49, 00, E8, 68, E6, FF, FF, 8B, 55, EC, A1, 38, 4B, 49, 00, E8, 7F, 5C, F7, FF, 8D, 55, E0...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
573 KB (586,752 bytes)

The file ue_of_legends_riot_point_genarator_v1.0.0.exe has been seen being distributed by the following URL.