Analysis Report adobe.snr.patch.v2.0-painter.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Data Obfuscation: |
---|
Detected unpacking (changes PE section rights) |
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_3_023CE716 | |
Source: | Code function: | 0_3_023CCC0E | |
Source: | Code function: | 0_3_023CCE6E | |
Source: | Code function: | 0_3_023CC5DE |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior |
Source: | File opened / queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Virtualization/Sandbox Evasion1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Software Packing12 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection1 | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information2 | NTDS | Application Window Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | File and Directory Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | System Information Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | Virustotal | Browse | ||
43% | Metadefender | Browse | ||
71% | ReversingLabs | Win32.Hacktool.Patcher | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1116574 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Red Diamond |
Analysis ID: | 330953 |
Start date: | 15.12.2020 |
Start time: | 20:56:58 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | adobe.snr.patch.v2.0-painter.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 24 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal60.evad.winEXE@1/1@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\vgm_player.dll | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Process: | C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exe |
File Type: | |
Category: | modified |
Size (bytes): | 83968 |
Entropy (8bit): | 6.234304945662412 |
Encrypted: | false |
SSDEEP: | 1536:bIkMAKIUVWsbWVdeX/tjjyp8XYXCXCAxPpZsM:bI/IUVWzdevtj+p8IySWp |
MD5: | 47361F2E1CE562953C36C1E3E4509C06 |
SHA1: | 84031B61E761160040C0F02FCDBF5149AFA4CE1C |
SHA-256: | C5F76741A5B02C7373A05C13F44B47AF60D130F2B2D1A510E7DF270BD2E4D62A |
SHA-512: | 0B2FAD69A2786D9934ED55525F67BE6661B9C22CCD3E0E752F60A787E804CE0C475CBA6D672A0507C55334D948E912E2BBD951F23BE19E30553B528B3516FFF2 |
Malicious: | false |
Antivirus: | |
Joe Sandbox View: |
|
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.97199102850528 |
TrID: |
|
File name: | adobe.snr.patch.v2.0-painter.exe |
File size: | 601600 |
MD5: | b31679db7db878992b4553290a9e6c7c |
SHA1: | 7d0d2b434b51abe91e5b16e4c8dc8d26143b138c |
SHA256: | 256c2a409c97448d168f3eb1bfb89af3d259dfc05a510a3f464d8e4b348116d4 |
SHA512: | a9c65a280c5bfcd9a221a47237e96f454c85cf0a2222cd0469d2326a03cfaaa5b69424c4963f128affc91c8861b9aac236289578a94629717d81a7e3b08a75f2 |
SSDEEP: | 12288:0MNVzzbgNRk1Lq+TC0YPxfqswK/EH1WYEmMC+jsEdf8Zdq0Cxmj1A:dLE1+TYPljwK/oY9se8Zd8kJA |
File Content Preview: | MZ@.....................................!..L.!Win32 .EXE...$@...PE..L....^B*............................?S....... ....@..........................................................................P..@....`...k................................................. |
File Icon |
---|
Icon Hash: | 82b2ecccd4b68a94 |
General | |
---|---|
Entrypoint: | 0x5a533f |
Entrypoint Section: | .MPRESS2 |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 416af365bd0075002ad4b3999c9e9a47 |
Instruction |
---|
pushad |
call 00007F14E5033CD5h |
pop eax |
add eax, 00000B5Ah |
mov esi, dword ptr [eax] |
add esi, eax |
sub eax, eax |
mov edi, esi |
lodsw |
shl eax, 0Ch |
mov ecx, eax |
push eax |
lodsd |
sub ecx, eax |
add esi, ecx |
mov ecx, eax |
push edi |
push ecx |
dec ecx |
mov al, byte ptr [ecx+edi+06h] |
mov byte ptr [ecx+esi], al |
jne 00007F14E5033CC8h |
sub eax, eax |
lodsb |
mov ecx, eax |
and cl, FFFFFFF0h |
and al, 0Fh |
shl ecx, 0Ch |
mov ch, al |
lodsb |
or ecx, eax |
push ecx |
add cl, ch |
mov ebp, FFFFFD00h |
shl ebp, cl |
pop ecx |
pop eax |
mov ebx, esp |
lea esp, dword ptr [esp+ebp*2-00000E70h] |
push ecx |
sub ecx, ecx |
push ecx |
push ecx |
mov ecx, esp |
push ecx |
mov dx, word ptr [edi] |
shl edx, 0Ch |
push edx |
push edi |
add ecx, 04h |
push ecx |
push eax |
add ecx, 04h |
push esi |
push ecx |
call 00007F14E5033D33h |
mov esp, ebx |
pop esi |
pop edx |
sub eax, eax |
mov dword ptr [edx+esi], eax |
mov ah, 10h |
sub edx, eax |
sub ecx, ecx |
cmp ecx, edx |
jnc 00007F14E5033CF8h |
mov ebx, ecx |
lodsb |
inc ecx |
and al, FEh |
cmp al, E8h |
jne 00007F14E5033CC4h |
inc ebx |
add ecx, 04h |
lodsd |
or eax, eax |
js 00007F14E5033CD8h |
cmp eax, edx |
jnc 00007F14E5033CB7h |
jmp 00007F14E5033CD8h |
add eax, ebx |
js 00007F14E5033CB1h |
add eax, edx |
sub eax, ebx |
mov dword ptr [esi-04h], eax |
jmp 00007F14E5033CA8h |
call 00007F14E5033CD5h |
pop edi |
add edi, FFFFFF4Dh |
mov al, E9h |
stosb |
mov eax, 00000B56h |
stosd |
call 00007F14E5033CD5h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1a5000 | 0x340 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1a6000 | 0x6be4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1a5eb0 | 0x18 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1a517c | 0x50 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.MPRESS1 | 0x1000 | 0x1a4000 | 0x8b000 | False | 1.0003091277 | data | 7.99967477514 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.MPRESS2 | 0x1a5000 | 0xed8 | 0x1000 | False | 0.506103515625 | data | 5.53506287685 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1a6000 | 0x6be4 | 0x6c00 | False | 0.323712384259 | data | 5.52077721827 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
LIB | 0x15f64c | 0x14800 | empty | English | United States |
RT_CURSOR | 0x173e4c | 0x134 | empty | English | United States |
RT_CURSOR | 0x173f80 | 0x134 | empty | ||
RT_CURSOR | 0x1740b4 | 0x134 | empty | ||
RT_CURSOR | 0x1741e8 | 0x134 | empty | ||
RT_CURSOR | 0x17431c | 0x134 | empty | ||
RT_CURSOR | 0x174450 | 0x134 | empty | ||
RT_CURSOR | 0x174584 | 0x134 | empty | ||
RT_CURSOR | 0x1746b8 | 0x134 | empty | ||
RT_BITMAP | 0x1747ec | 0x1d0 | empty | ||
RT_BITMAP | 0x1749bc | 0x1e4 | empty | ||
RT_BITMAP | 0x174ba0 | 0x1d0 | empty | ||
RT_BITMAP | 0x174d70 | 0x1d0 | empty | ||
RT_BITMAP | 0x174f40 | 0x1d0 | empty | ||
RT_BITMAP | 0x175110 | 0x1d0 | empty | ||
RT_BITMAP | 0x1752e0 | 0x1d0 | empty | ||
RT_BITMAP | 0x1754b0 | 0x1d0 | empty | ||
RT_BITMAP | 0x175680 | 0x1d0 | empty | ||
RT_BITMAP | 0x175850 | 0x1d0 | empty | ||
RT_BITMAP | 0x175a20 | 0x488 | empty | Russian | Russia |
RT_BITMAP | 0x175ea8 | 0xc0 | empty | ||
RT_BITMAP | 0x175f68 | 0xe0 | empty | ||
RT_BITMAP | 0x176048 | 0xe0 | empty | ||
RT_BITMAP | 0x176128 | 0xe0 | empty | ||
RT_BITMAP | 0x176208 | 0xc0 | empty | ||
RT_BITMAP | 0x1762c8 | 0xc0 | empty | ||
RT_BITMAP | 0x176388 | 0xe0 | empty | ||
RT_BITMAP | 0x176468 | 0xc58 | empty | English | United States |
RT_BITMAP | 0x1770c0 | 0x328 | empty | English | United States |
RT_BITMAP | 0x1773e8 | 0xc0 | empty | ||
RT_BITMAP | 0x1774a8 | 0xe0 | empty | ||
RT_BITMAP | 0x177588 | 0xe8 | empty | Russian | Russia |
RT_BITMAP | 0x177670 | 0x328 | empty | English | United States |
RT_BITMAP | 0x177998 | 0xc0 | empty | ||
RT_BITMAP | 0x177a58 | 0x328 | empty | English | United States |
RT_BITMAP | 0x177d80 | 0x328 | empty | English | United States |
RT_BITMAP | 0x1780a8 | 0x328 | empty | English | United States |
RT_BITMAP | 0x1783d0 | 0xe0 | empty | ||
RT_ICON | 0x1a6a04 | 0x11fc | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States |
RT_ICON | 0x1a7c28 | 0x25a8 | data | English | United States |
RT_ICON | 0x1aa1f8 | 0x10a8 | data | English | United States |
RT_ICON | 0x1ab2c8 | 0x468 | GLS_BINARY_LSB_FIRST | English | United States |
RT_DIALOG | 0x17d164 | 0x52 | empty | ||
RT_STRING | 0x17d1b8 | 0x4c | empty | ||
RT_STRING | 0x17d204 | 0xaa | empty | ||
RT_STRING | 0x17d2b0 | 0x186 | empty | ||
RT_STRING | 0x17d438 | 0x1ce | empty | ||
RT_STRING | 0x17d608 | 0x144 | empty | ||
RT_STRING | 0x17d74c | 0x7e | empty | ||
RT_STRING | 0x17d7cc | 0x24 | empty | ||
RT_STRING | 0x17d7f0 | 0x1a0 | empty | ||
RT_STRING | 0x17d990 | 0x1d8 | empty | ||
RT_STRING | 0x17db68 | 0x1ec | empty | ||
RT_STRING | 0x17dd54 | 0xec | empty | ||
RT_STRING | 0x17de40 | 0x370 | empty | ||
RT_STRING | 0x17e1b0 | 0xc0 | empty | ||
RT_STRING | 0x17e270 | 0xfc | empty | ||
RT_STRING | 0x17e36c | 0x120 | empty | ||
RT_STRING | 0x17e48c | 0x4ac | empty | ||
RT_STRING | 0x17e938 | 0x36c | empty | ||
RT_STRING | 0x17eca4 | 0x390 | empty | ||
RT_STRING | 0x17f034 | 0x430 | empty | ||
RT_STRING | 0x17f464 | 0xf0 | empty | ||
RT_STRING | 0x17f554 | 0xd8 | empty | ||
RT_STRING | 0x17f62c | 0x274 | empty | ||
RT_STRING | 0x17f8a0 | 0x3e0 | empty | ||
RT_STRING | 0x17fc80 | 0x388 | empty | ||
RT_STRING | 0x180008 | 0x2d8 | empty | ||
RT_RCDATA | 0x1802e0 | 0xcbf | empty | English | United States |
RT_RCDATA | 0x180fa0 | 0x3a5 | empty | English | United States |
RT_RCDATA | 0x181348 | 0xd58 | empty | Russian | Russia |
RT_RCDATA | 0x1820a0 | 0xd0d | empty | Russian | Russia |
RT_RCDATA | 0x182db0 | 0x10 | empty | ||
RT_RCDATA | 0x182dc0 | 0x684 | empty | ||
RT_RCDATA | 0x183444 | 0x434 | empty | English | United States |
RT_RCDATA | 0x183878 | 0x4b1 | empty | English | United States |
RT_RCDATA | 0x183d2c | 0x1a1 | empty | English | United States |
RT_RCDATA | 0x183ed0 | 0x671 | empty | English | United States |
RT_RCDATA | 0x184544 | 0x7b1 | empty | English | United States |
RT_RCDATA | 0x184cf8 | 0x70b | empty | ||
RT_RCDATA | 0x185404 | 0x1a90b | empty | ||
RT_RCDATA | 0x19fd10 | 0x640 | empty | ||
RT_RCDATA | 0x1a0350 | 0x1bf0 | empty | ||
RT_RCDATA | 0x1a1f40 | 0x1fdb | empty | ||
RT_RCDATA | 0x1a3f1c | 0x2f3 | empty | ||
RT_GROUP_CURSOR | 0x1a4210 | 0x14 | empty | English | United States |
RT_GROUP_CURSOR | 0x1a4224 | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a4238 | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a424c | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a4260 | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a4274 | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a4288 | 0x14 | empty | ||
RT_GROUP_CURSOR | 0x1a429c | 0x14 | empty | ||
RT_GROUP_ICON | 0x1ac2b4 | 0x3e | data | English | United States |
RT_VERSION | 0x1ac334 | 0x2e0 | data | English | United States |
RT_MANIFEST | 0x1ac654 | 0x58f | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
KERNEL32.DLL | GetModuleHandleA, GetProcAddress |
user32.dll | CharNextA |
advapi32.dll | RegCloseKey |
oleaut32.dll | SysFreeString |
version.dll | VerQueryValueA |
gdi32.dll | SaveDC |
ole32.dll | CoInitialize |
comctl32.dll | ImageList_Add |
shell32.dll | SHGetFileInfoA |
comdlg32.dll | GetOpenFileNameA |
Description | Data |
---|---|
LegalCopyright | PainteR |
InternalName | Universal Adobe Patcher |
FileVersion | 2.0.0.0 |
CompanyName | PainteR |
ProductName | Universal Adobe Patcher |
ProductVersion | 2.0.0.0 |
FileDescription | Universal Adobe Patcher |
OriginalFilename | adobesnr.exe |
Translation | 0x0419 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Russian | Russia |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
Start time: | 20:57:48 |
Start date: | 15/12/2020 |
Path: | C:\Users\user\Desktop\adobe.snr.patch.v2.0-painter.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 601600 bytes |
MD5 hash: | B31679DB7DB878992B4553290A9E6C7C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|