Play interactive tourEdit tour

Analysis Report adobe.snr.patch.v2.0-painter.exe

Overview

General Information

Sample Name:adobe.snr.patch.v2.0-painter.exe
Analysis ID:330953
MD5:b31679db7db878992b4553290a9e6c7c
SHA1:7d0d2b434b51abe91e5b16e4c8dc8d26143b138c
SHA256:256c2a409c97448d168f3eb1bfb89af3d259dfc05a510a3f464d8e4b348116d4

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains sections with non-standard names
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: adobe.snr.patch.v2.0-painter.exeVirustotal: Detection: 65%Perma Link
Source: adobe.snr.patch.v2.0-painter.exeMetadefender: Detection: 43%Perma Link
Source: adobe.snr.patch.v2.0-painter.exeReversingLabs: Detection: 70%
Machine Learning detection for sample
Source: adobe.snr.patch.v2.0-painter.exeJoe Sandbox ML: detected
Source: adobe.snr.patch.v2.0-painter.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000000.233240197.00000000005A6000.00000008.00020000.sdmpBinary or memory string: OriginalFilenameadobesnr.exeP vs adobe.snr.patch.v2.0-painter.exe
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.530105572.000000006DAC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamevgm_play.dllD vs adobe.snr.patch.v2.0-painter.exe
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.529566137.0000000004AA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewdmaud.drv.muij% vs adobe.snr.patch.v2.0-painter.exe
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.518766183.0000000002630000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs adobe.snr.patch.v2.0-painter.exe
Source: adobe.snr.patch.v2.0-painter.exeBinary or memory string: OriginalFilenameadobesnr.exeP vs adobe.snr.patch.v2.0-painter.exe
Source: adobe.snr.patch.v2.0-painter.exeStatic PE information: Section: .MPRESS1 ZLIB complexity 1.0003091277
Source: classification engineClassification label: mal60.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeFile created: C:\Users\user~1\AppData\Local\Temp\vgm_player.dllJump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: adobe.snr.patch.v2.0-painter.exeVirustotal: Detection: 65%
Source: adobe.snr.patch.v2.0-painter.exeMetadefender: Detection: 43%
Source: adobe.snr.patch.v2.0-painter.exeReversingLabs: Detection: 70%
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeWindow found: window name: TButtonJump to behavior

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeUnpacked PE file: 0.2.adobe.snr.patch.v2.0-painter.exe.400000.0.unpack .MPRESS1:EW;.MPRESS2:EW;.rsrc:W; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: .MPRESS2
Source: adobe.snr.patch.v2.0-painter.exeStatic PE information: section name: .MPRESS1
Source: adobe.snr.patch.v2.0-painter.exeStatic PE information: section name: .MPRESS2
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeCode function: 0_3_023CE715 push esi; ret 0_3_023CE716
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeCode function: 0_3_023CCC0C push eax; ret 0_3_023CCC0E
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeCode function: 0_3_023CCE6D push cs; retf 0_3_023CCE6E
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeCode function: 0_3_023CC5D6 push es; iretd 0_3_023CC5DE
Source: initial sampleStatic PE information: section name: .MPRESS1 entropy: 7.99967477514
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeFile created: C:\Users\user\AppData\Local\Temp\vgm_player.dllJump to dropped file
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeWindow / User API: threadDelayed 5849Jump to behavior
Source: C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exeLast function: Thread delayed
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.517643832.0000000000F70000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.517643832.0000000000F70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.517643832.0000000000F70000.00000002.00000001.sdmpBinary or memory string: Progman
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.517643832.0000000000F70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.511387843.0000000000401000.00000040.00020000.sdmpBinary or memory string: Shell_TrayWndS
Source: adobe.snr.patch.v2.0-painter.exe, 00000000.00000002.511387843.0000000000401000.00000040.00020000.sdmpBinary or memory string: Shell_TrayWndReBarWindow32MSTaskSwWClassToolbarWindow32SV

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing12LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 330953 Sample: adobe.snr.patch.v2.0-painter.exe Startdate: 15/12/2020 Architecture: WINDOWS Score: 60 11 Multi AV Scanner detection for submitted file 2->11 13 Machine Learning detection for sample 2->13 5 adobe.snr.patch.v2.0-painter.exe 1 3 2->5         started        process3 file4 9 C:\Users\user\AppData\...\vgm_player.dll, PE32 5->9 dropped 15 Detected unpacking (changes PE section rights) 5->15 signatures5

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
adobe.snr.patch.v2.0-painter.exe66%VirustotalBrowse
adobe.snr.patch.v2.0-painter.exe43%MetadefenderBrowse
adobe.snr.patch.v2.0-painter.exe71%ReversingLabsWin32.Hacktool.Patcher
adobe.snr.patch.v2.0-painter.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\vgm_player.dll2%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\vgm_player.dll0%MetadefenderBrowse
C:\Users\user\AppData\Local\Temp\vgm_player.dll0%ReversingLabs
SourceDetectionScannerLabelLinkDownload
0.2.adobe.snr.patch.v2.0-painter.exe.400000.0.unpack100%AviraHEUR/AGEN.1116574Download File
0.1.adobe.snr.patch.v2.0-painter.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:330953
Start date:15.12.2020
Start time:20:56:58
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 26s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:adobe.snr.patch.v2.0-painter.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:24
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.evad.winEXE@1/1@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Execution Graph export aborted for target adobe.snr.patch.v2.0-painter.exe, PID 6860 because there are no executed function
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
C:\Users\user\AppData\Local\Temp\vgm_player.dllvHQYvz88iw.exeGet hashmaliciousBrowse
    adobe.snr.patch.v2.0-painter.exeGet hashmaliciousBrowse
      kkTsu5q9ua.exeGet hashmaliciousBrowse
        ASP_v2_0_P.exeGet hashmaliciousBrowse
          adobe.snr.patch.v2.0-painter.exeGet hashmaliciousBrowse
            adobe.snr.patch.v2.0-painter.exeGet hashmaliciousBrowse
              C:\Users\user\AppData\Local\Temp\vgm_player.dll
              Process:C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:modified
              Size (bytes):83968
              Entropy (8bit):6.234304945662412
              Encrypted:false
              SSDEEP:1536:bIkMAKIUVWsbWVdeX/tjjyp8XYXCXCAxPpZsM:bI/IUVWzdevtj+p8IySWp
              MD5:47361F2E1CE562953C36C1E3E4509C06
              SHA1:84031B61E761160040C0F02FCDBF5149AFA4CE1C
              SHA-256:C5F76741A5B02C7373A05C13F44B47AF60D130F2B2D1A510E7DF270BD2E4D62A
              SHA-512:0B2FAD69A2786D9934ED55525F67BE6661B9C22CCD3E0E752F60A787E804CE0C475CBA6D672A0507C55334D948E912E2BBD951F23BE19E30553B528B3516FFF2
              Malicious:false
              Antivirus:
              • Antivirus: Virustotal, Detection: 2%, Browse
              • Antivirus: Metadefender, Detection: 0%, Browse
              • Antivirus: ReversingLabs, Detection: 0%
              Joe Sandbox View:
              • Filename: vHQYvz88iw.exe, Detection: malicious, Browse
              • Filename: adobe.snr.patch.v2.0-painter.exe, Detection: malicious, Browse
              • Filename: kkTsu5q9ua.exe, Detection: malicious, Browse
              • Filename: ASP_v2_0_P.exe, Detection: malicious, Browse
              • Filename: adobe.snr.patch.v2.0-painter.exe, Detection: malicious, Browse
              • Filename: adobe.snr.patch.v2.0-painter.exe, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j...........n..............0......1..................Y.......G...........Rich...........................PE..L....M/X...........!................P........ ...............................@............@..........................7..a...T8..<.... ..p....................0....................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data........@......................@....rsrc...p.... .......4..............@..@.reloc.......0.......:..............@..B................................................................................................................................................................................................................................................................................................................

              Static File Info

              General

              File type:MS-DOS executable, MZ for MS-DOS
              Entropy (8bit):7.97199102850528
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:adobe.snr.patch.v2.0-painter.exe
              File size:601600
              MD5:b31679db7db878992b4553290a9e6c7c
              SHA1:7d0d2b434b51abe91e5b16e4c8dc8d26143b138c
              SHA256:256c2a409c97448d168f3eb1bfb89af3d259dfc05a510a3f464d8e4b348116d4
              SHA512:a9c65a280c5bfcd9a221a47237e96f454c85cf0a2222cd0469d2326a03cfaaa5b69424c4963f128affc91c8861b9aac236289578a94629717d81a7e3b08a75f2
              SSDEEP:12288:0MNVzzbgNRk1Lq+TC0YPxfqswK/EH1WYEmMC+jsEdf8Zdq0Cxmj1A:dLE1+TYPljwK/oY9se8Zd8kJA
              File Content Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L....^B*............................?S....... ....@..........................................................................P..@....`...k.................................................

              File Icon

              Icon Hash:82b2ecccd4b68a94

              General

              Entrypoint:0x5a533f
              Entrypoint Section:.MPRESS2
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
              DLL Characteristics:
              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:416af365bd0075002ad4b3999c9e9a47
              Instruction
              pushad
              call 00007F14E5033CD5h
              pop eax
              add eax, 00000B5Ah
              mov esi, dword ptr [eax]
              add esi, eax
              sub eax, eax
              mov edi, esi
              lodsw
              shl eax, 0Ch
              mov ecx, eax
              push eax
              lodsd
              sub ecx, eax
              add esi, ecx
              mov ecx, eax
              push edi
              push ecx
              dec ecx
              mov al, byte ptr [ecx+edi+06h]
              mov byte ptr [ecx+esi], al
              jne 00007F14E5033CC8h
              sub eax, eax
              lodsb
              mov ecx, eax
              and cl, FFFFFFF0h
              and al, 0Fh
              shl ecx, 0Ch
              mov ch, al
              lodsb
              or ecx, eax
              push ecx
              add cl, ch
              mov ebp, FFFFFD00h
              shl ebp, cl
              pop ecx
              pop eax
              mov ebx, esp
              lea esp, dword ptr [esp+ebp*2-00000E70h]
              push ecx
              sub ecx, ecx
              push ecx
              push ecx
              mov ecx, esp
              push ecx
              mov dx, word ptr [edi]
              shl edx, 0Ch
              push edx
              push edi
              add ecx, 04h
              push ecx
              push eax
              add ecx, 04h
              push esi
              push ecx
              call 00007F14E5033D33h
              mov esp, ebx
              pop esi
              pop edx
              sub eax, eax
              mov dword ptr [edx+esi], eax
              mov ah, 10h
              sub edx, eax
              sub ecx, ecx
              cmp ecx, edx
              jnc 00007F14E5033CF8h
              mov ebx, ecx
              lodsb
              inc ecx
              and al, FEh
              cmp al, E8h
              jne 00007F14E5033CC4h
              inc ebx
              add ecx, 04h
              lodsd
              or eax, eax
              js 00007F14E5033CD8h
              cmp eax, edx
              jnc 00007F14E5033CB7h
              jmp 00007F14E5033CD8h
              add eax, ebx
              js 00007F14E5033CB1h
              add eax, edx
              sub eax, ebx
              mov dword ptr [esi-04h], eax
              jmp 00007F14E5033CA8h
              call 00007F14E5033CD5h
              pop edi
              add edi, FFFFFF4Dh
              mov al, E9h
              stosb
              mov eax, 00000B56h
              stosd
              call 00007F14E5033CD5h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1a50000x340.MPRESS2
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a60000x6be4.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x1a5eb00x18.MPRESS2
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x1a517c0x50.MPRESS2
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .MPRESS10x10000x1a40000x8b000False1.0003091277data7.99967477514IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .MPRESS20x1a50000xed80x1000False0.506103515625data5.53506287685IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0x1a60000x6be40x6c00False0.323712384259data5.52077721827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              LIB0x15f64c0x14800emptyEnglishUnited States
              RT_CURSOR0x173e4c0x134emptyEnglishUnited States
              RT_CURSOR0x173f800x134empty
              RT_CURSOR0x1740b40x134empty
              RT_CURSOR0x1741e80x134empty
              RT_CURSOR0x17431c0x134empty
              RT_CURSOR0x1744500x134empty
              RT_CURSOR0x1745840x134empty
              RT_CURSOR0x1746b80x134empty
              RT_BITMAP0x1747ec0x1d0empty
              RT_BITMAP0x1749bc0x1e4empty
              RT_BITMAP0x174ba00x1d0empty
              RT_BITMAP0x174d700x1d0empty
              RT_BITMAP0x174f400x1d0empty
              RT_BITMAP0x1751100x1d0empty
              RT_BITMAP0x1752e00x1d0empty
              RT_BITMAP0x1754b00x1d0empty
              RT_BITMAP0x1756800x1d0empty
              RT_BITMAP0x1758500x1d0empty
              RT_BITMAP0x175a200x488emptyRussianRussia
              RT_BITMAP0x175ea80xc0empty
              RT_BITMAP0x175f680xe0empty
              RT_BITMAP0x1760480xe0empty
              RT_BITMAP0x1761280xe0empty
              RT_BITMAP0x1762080xc0empty
              RT_BITMAP0x1762c80xc0empty
              RT_BITMAP0x1763880xe0empty
              RT_BITMAP0x1764680xc58emptyEnglishUnited States
              RT_BITMAP0x1770c00x328emptyEnglishUnited States
              RT_BITMAP0x1773e80xc0empty
              RT_BITMAP0x1774a80xe0empty
              RT_BITMAP0x1775880xe8emptyRussianRussia
              RT_BITMAP0x1776700x328emptyEnglishUnited States
              RT_BITMAP0x1779980xc0empty
              RT_BITMAP0x177a580x328emptyEnglishUnited States
              RT_BITMAP0x177d800x328emptyEnglishUnited States
              RT_BITMAP0x1780a80x328emptyEnglishUnited States
              RT_BITMAP0x1783d00xe0empty
              RT_ICON0x1a6a040x11fcPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_ICON0x1a7c280x25a8dataEnglishUnited States
              RT_ICON0x1aa1f80x10a8dataEnglishUnited States
              RT_ICON0x1ab2c80x468GLS_BINARY_LSB_FIRSTEnglishUnited States
              RT_DIALOG0x17d1640x52empty
              RT_STRING0x17d1b80x4cempty
              RT_STRING0x17d2040xaaempty
              RT_STRING0x17d2b00x186empty
              RT_STRING0x17d4380x1ceempty
              RT_STRING0x17d6080x144empty
              RT_STRING0x17d74c0x7eempty
              RT_STRING0x17d7cc0x24empty
              RT_STRING0x17d7f00x1a0empty
              RT_STRING0x17d9900x1d8empty
              RT_STRING0x17db680x1ecempty
              RT_STRING0x17dd540xecempty
              RT_STRING0x17de400x370empty
              RT_STRING0x17e1b00xc0empty
              RT_STRING0x17e2700xfcempty
              RT_STRING0x17e36c0x120empty
              RT_STRING0x17e48c0x4acempty
              RT_STRING0x17e9380x36cempty
              RT_STRING0x17eca40x390empty
              RT_STRING0x17f0340x430empty
              RT_STRING0x17f4640xf0empty
              RT_STRING0x17f5540xd8empty
              RT_STRING0x17f62c0x274empty
              RT_STRING0x17f8a00x3e0empty
              RT_STRING0x17fc800x388empty
              RT_STRING0x1800080x2d8empty
              RT_RCDATA0x1802e00xcbfemptyEnglishUnited States
              RT_RCDATA0x180fa00x3a5emptyEnglishUnited States
              RT_RCDATA0x1813480xd58emptyRussianRussia
              RT_RCDATA0x1820a00xd0demptyRussianRussia
              RT_RCDATA0x182db00x10empty
              RT_RCDATA0x182dc00x684empty
              RT_RCDATA0x1834440x434emptyEnglishUnited States
              RT_RCDATA0x1838780x4b1emptyEnglishUnited States
              RT_RCDATA0x183d2c0x1a1emptyEnglishUnited States
              RT_RCDATA0x183ed00x671emptyEnglishUnited States
              RT_RCDATA0x1845440x7b1emptyEnglishUnited States
              RT_RCDATA0x184cf80x70bempty
              RT_RCDATA0x1854040x1a90bempty
              RT_RCDATA0x19fd100x640empty
              RT_RCDATA0x1a03500x1bf0empty
              RT_RCDATA0x1a1f400x1fdbempty
              RT_RCDATA0x1a3f1c0x2f3empty
              RT_GROUP_CURSOR0x1a42100x14emptyEnglishUnited States
              RT_GROUP_CURSOR0x1a42240x14empty
              RT_GROUP_CURSOR0x1a42380x14empty
              RT_GROUP_CURSOR0x1a424c0x14empty
              RT_GROUP_CURSOR0x1a42600x14empty
              RT_GROUP_CURSOR0x1a42740x14empty
              RT_GROUP_CURSOR0x1a42880x14empty
              RT_GROUP_CURSOR0x1a429c0x14empty
              RT_GROUP_ICON0x1ac2b40x3edataEnglishUnited States
              RT_VERSION0x1ac3340x2e0dataEnglishUnited States
              RT_MANIFEST0x1ac6540x58fXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              KERNEL32.DLLGetModuleHandleA, GetProcAddress
              user32.dllCharNextA
              advapi32.dllRegCloseKey
              oleaut32.dllSysFreeString
              version.dllVerQueryValueA
              gdi32.dllSaveDC
              ole32.dllCoInitialize
              comctl32.dllImageList_Add
              shell32.dllSHGetFileInfoA
              comdlg32.dllGetOpenFileNameA
              DescriptionData
              LegalCopyrightPainteR
              InternalNameUniversal Adobe Patcher
              FileVersion2.0.0.0
              CompanyNamePainteR
              ProductNameUniversal Adobe Patcher
              ProductVersion2.0.0.0
              FileDescriptionUniversal Adobe Patcher
              OriginalFilenameadobesnr.exe
              Translation0x0419 0x04b0
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              RussianRussia

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              CPU Usage

              050100s020406080100

              Click to jump to process

              Memory Usage

              050100s0.0010203040MB

              Click to jump to process

              High Level Behavior Distribution

              • File
              • Registry

              Click to dive into process behavior distribution

              System Behavior

              Start time:20:57:48
              Start date:15/12/2020
              Path:C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exe'
              Imagebase:0x400000
              File size:601600 bytes
              MD5 hash:B31679DB7DB878992B4553290A9E6C7C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low

              Disassembly

              Code Analysis