Play interactive tourEdit tour

Windows Analysis Report ngrok.exe

Overview

General Information

Sample Name:ngrok.exe
Analysis ID:445002
MD5:074863c3352d6dda17dcb8bdc6a8929f
SHA1:8a07e8326dec5b754becce68b5b02b85653d6029
SHA256:3e625e20d7f00b6d5121bb0a71cfa61f92d658bcd61af2cf5397e0ae28f4ba56
Infos:

Most interesting Screenshot:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates a process in suspended mode (likely to inject code)
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • ngrok.exe (PID: 3080 cmdline: 'C:\Users\user\Desktop\ngrok.exe' MD5: 074863C3352D6DDA17DCB8BDC6A8929F)
    • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ngrok.exe (PID: 4112 cmdline: C:\Users\user\Desktop\ngrok.exe MD5: 074863C3352D6DDA17DCB8BDC6A8929F)
    • cmd.exe (PID: 6580 cmdline: cmd.exe /K MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: ngrok.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: ngrok.exe, 00000001.00000002.929984551.00000000013A4000.00000002.00020000.sdmp, ngrok.exe, 00000003.00000000.681479977.00000000013A4000.00000002.00020000.sdmpString found in binary or memory: http://127.0.0.1:%d/samplingincompatible
Source: ngrok.exe, 00000003.00000002.694335290.000000C0000A2000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:5778/sampling
Source: ngrok.exe, 00000003.00000002.694358255.000000C0000AA000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:5778/samplingbackendnmarshalingproto:
Source: ngrok.exe, 00000001.00000002.934102399.000000C000038000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:5778/samplingkernel32.dllkernel32.dlladvapi32.dllRegisterServiceCtrlHandlerExWadvap
Source: ngrok.exe, 00000003.00000002.694345640.000000C0000A8000.00000004.00000001.sdmpString found in binary or memory: https://dashboard.ngrok.com/signup
Source: ngrok.exeStatic PE information: Number of sections : 13 > 10
Source: ngrok.exeStatic PE information: Section: /19 ZLIB complexity 0.99954199549
Source: classification engineClassification label: clean2.winEXE@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_01
Source: ngrok.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ngrok.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeFile read: C:\Users\user\Desktop\ngrok.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ngrok.exe 'C:\Users\user\Desktop\ngrok.exe'
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Users\user\Desktop\ngrok.exe C:\Users\user\Desktop\ngrok.exe
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /K
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Users\user\Desktop\ngrok.exe C:\Users\user\Desktop\ngrok.exeJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /KJump to behavior
Source: ngrok.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: ngrok.exeStatic file information: File size 30718976 > 1048576
Source: ngrok.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x9f2800
Source: ngrok.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xa9d400
Source: ngrok.exeStatic PE information: Raw size of /19 is bigger than: 0x100000 < 0x14ca00
Source: ngrok.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x22f200
Source: ngrok.exeStatic PE information: Raw size of /78 is bigger than: 0x100000 < 0x13ba00
Source: ngrok.exeStatic PE information: Raw size of .symtab is bigger than: 0x100000 < 0x230600
Source: ngrok.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: ngrok.exeStatic PE information: section name: /4
Source: ngrok.exeStatic PE information: section name: /19
Source: ngrok.exeStatic PE information: section name: /32
Source: ngrok.exeStatic PE information: section name: /46
Source: ngrok.exeStatic PE information: section name: /65
Source: ngrok.exeStatic PE information: section name: /78
Source: ngrok.exeStatic PE information: section name: /90
Source: ngrok.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\ngrok.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: ngrok.exe, 00000001.00000002.937585409.000002125D4D3000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
Source: ngrok.exe, 00000003.00000002.697405345.00000232DCFEF000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZZ
Source: C:\Users\user\Desktop\ngrok.exeProcess information queried: ProcessInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Users\user\Desktop\ngrok.exe C:\Users\user\Desktop\ngrok.exeJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /KJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeQueries volume information: C:\Users\user\Desktop\ngrok.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ngrok.exeQueries volume information: C:\Users\user\Desktop\ngrok.exe VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Software Packing1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerSystem Information Discovery12SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 445002 Sample: ngrok.exe Startdate: 06/07/2021 Architecture: WINDOWS Score: 2 5 ngrok.exe 1 2->5         started        process3 7 ngrok.exe 1 5->7         started        9 conhost.exe 5->9         started        11 cmd.exe 1 5->11         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
ngrok.exe0%MetadefenderBrowse
ngrok.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://127.0.0.1:5778/samplingkernel32.dllkernel32.dlladvapi32.dllRegisterServiceCtrlHandlerExWadvap0%Avira URL Cloudsafe
http://127.0.0.1:5778/sampling0%Avira URL Cloudsafe
http://127.0.0.1:5778/samplingbackendnmarshalingproto:0%Avira URL Cloudsafe
http://127.0.0.1:%d/samplingincompatible0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://127.0.0.1:5778/samplingkernel32.dllkernel32.dlladvapi32.dllRegisterServiceCtrlHandlerExWadvapngrok.exe, 00000001.00000002.934102399.000000C000038000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://dashboard.ngrok.com/signupngrok.exe, 00000003.00000002.694345640.000000C0000A8000.00000004.00000001.sdmpfalse
    high
    http://127.0.0.1:5778/samplingngrok.exe, 00000003.00000002.694335290.000000C0000A2000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://127.0.0.1:5778/samplingbackendnmarshalingproto:ngrok.exe, 00000003.00000002.694358255.000000C0000AA000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://127.0.0.1:%d/samplingincompatiblengrok.exe, 00000001.00000002.929984551.00000000013A4000.00000002.00020000.sdmp, ngrok.exe, 00000003.00000000.681479977.00000000013A4000.00000002.00020000.sdmpfalse
    • Avira URL Cloud: safe
    low
    No contacted IP infos

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:445002
    Start date:06.07.2021
    Start time:23:11:31
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 44s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:ngrok.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:18
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean2.winEXE@6/0@0/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    Warnings:
    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/445002/sample/ngrok.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found

    Static File Info

    General

    File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
    Entropy (8bit):6.679004473128721
    TrID:
    • Win64 Executable (generic) (12005/4) 74.95%
    • Generic Win/DOS Executable (2004/3) 12.51%
    • DOS Executable Generic (2002/1) 12.50%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
    File name:ngrok.exe
    File size:30718976
    MD5:074863c3352d6dda17dcb8bdc6a8929f
    SHA1:8a07e8326dec5b754becce68b5b02b85653d6029
    SHA256:3e625e20d7f00b6d5121bb0a71cfa61f92d658bcd61af2cf5397e0ae28f4ba56
    SHA512:0ac975a182d29aa2ac8186cfffcde728cee083c98f30bd1ad11cb397699628911a2713f952155ecbdcb2a0aff55a169ea1ca1e7b22c6c029de1d0848f661ceab
    SSDEEP:196608:So+5seL+Vnj4EYkAm/r7IJCTXx2Yb+pew/iHRJiVF2SxqGBxVTmopHg1zsnYYJtF:SL+1jxA8IPpe83YsPdgJHYJMuhxoy
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."......(...*...... ^........@...........................................`... ............................

    File Icon

    Icon Hash:00828e8e8686b000

    General

    Entrypoint:0x475e20
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:1
    File Version Major:6
    File Version Minor:1
    Subsystem Version Major:6
    Subsystem Version Minor:1
    Import Hash:4d028340f95202ab4f8ed495dd117513
    Instruction
    jmp 00007FAFE4A57030h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    pushfd
    dec eax
    sub esp, 70h
    dec eax
    mov dword ptr [esp+50h], edi
    dec eax
    mov dword ptr [esp+48h], esi
    dec eax
    mov dword ptr [esp+40h], ebp
    dec eax
    mov dword ptr [esp+38h], ebx
    dec esp
    mov dword ptr [esp+30h], esp
    dec esp
    mov dword ptr [esp+28h], ebp
    dec esp
    mov dword ptr [esp+20h], esi
    dec esp
    mov dword ptr [esp+58h], edi
    dec ecx
    mov edi, eax
    dec eax
    mov edx, dword ptr [00000028h]
    dec eax
    cmp edx, 00000000h
    jne 00007FAFE4A5A7FEh
    dec eax
    mov eax, 00000000h
    jmp 00007FAFE4A5A880h
    dec eax
    mov edx, dword ptr [edx+00000000h]
    dec eax
    cmp edx, 00000000h
    jne 00007FAFE4A5A7F7h
    call 00007FAFE4A5A938h
    dec eax
    mov dword ptr [esp+60h], edx
    dec eax
    mov dword ptr [esp+68h], esp
    dec eax
    mov ebx, dword ptr [edx+30h]
    dec eax
    mov ebx, dword ptr [ebx]
    dec eax
    cmp edx, ebx
    je 00007FAFE4A5A81Fh
    dec eax
    mov ebp, dword ptr [00000028h]
    dec eax
    mov dword ptr [ebp+00000000h], ebx
    dec eax
    mov edi, dword ptr [ebx+38h]
    dec eax
    sub edi, 08h
    dec eax
    lea esi, dword ptr [FFFCB32Eh]
    dec eax
    mov dword ptr [edi], esi
    dec eax
    sub edi, 78h
    dec eax
    mov dword ptr [edi+68h], esp
    dec eax
    mov esp, edi
    dec eax
    mov ebx, dword ptr [ecx]
    dec eax
    mov ecx, dword ptr [ecx+08h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1aff0000x4b2.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b000000x7770c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x14920200x150.data
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x9f26d00x9f2800unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x9f40000xa9d3a80xa9d400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x14920000xf7eb00xa2a00False0.354308284493data5.69601710367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    /40x158a0000x1190x200False0.595703125data4.82921592007IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /190x158b0000x14c9be0x14ca00False0.99954199549data7.99735464395IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /320x16d80000x4fddc0x4fe00False0.984051007433data7.93386247871IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /460x17280000x5b0x200False0.185546875data1.52153877317IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /650x17290000x22f0f20x22f200unknownunknownunknownunknownIMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /780x19590000x13b9eb0x13ba00False0.984021503713data7.99704263406IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    /900x1a950000x692c20x69400False0.964444774347data7.81311590232IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    .idata0x1aff0000x4b20x600False0.338541666667data3.85190508087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .reloc0x1b000000x7770c0x77800False0.169069936585data5.45923036543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    .symtab0x1b780000x2305e80x230600unknownunknownunknownunknownIMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, Sleep, SetWaitableTimer, SetUnhandledExceptionFilter, SetThreadPriority, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateWaitableTimerA, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    CPU Usage

    050100s020406080100

    Click to jump to process

    Memory Usage

    050100s0.002040MB

    Click to jump to process

    High Level Behavior Distribution

    • File
    • Registry

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    Start time:23:12:26
    Start date:06/07/2021
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff724c50000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Start time:23:12:43
    Start date:06/07/2021
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /K
    Imagebase:0x7ff622070000
    File size:273920 bytes
    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis