Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ada_sec2vep.exe

Overview

General Information

Sample name:ada_sec2vep.exe
Analysis ID:1528215
MD5:b895e8e9a05f32670b728fe042d4d70b
SHA1:520969de78995e685d9044048b1efd3621f6d10c
SHA256:7895ca50cad8e6497a4ec9f46a38a914ef631ae723779c4f5f0e7e3ac59a44eb
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Machine Learning detection for sample
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • ada_sec2vep.exe (PID: 6876 cmdline: "C:\Users\user\Desktop\ada_sec2vep.exe" MD5: B895E8E9A05F32670B728FE042D4D70B)
  • ada_sec2vep.exe (PID: 6696 cmdline: "C:\Users\user\Desktop\ada_sec2vep.exe" MD5: B895E8E9A05F32670B728FE042D4D70B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: ada_sec2vep.exeJoe Sandbox ML: detected
Source: ada_sec2vep.exe, 00000000.00000000.1111280894.0000000000A9C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_eaa96626-5
Source: ada_sec2vep.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: ada_sec2vep.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\Config\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\GatherLogs\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Jump to behavior
Source: ada_sec2vep.exeString found in binary or memory: http://www.essen.ihk24.de
Source: ada_sec2vep.exeString found in binary or memory: http://www.gesetze-im-internet.de
Source: ada_sec2vep.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: ada_sec2vep.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@2/0@0/0
Source: C:\Users\user\Desktop\ada_sec2vep.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ada_sec2vep.exe "C:\Users\user\Desktop\ada_sec2vep.exe"
Source: unknownProcess created: C:\Users\user\Desktop\ada_sec2vep.exe "C:\Users\user\Desktop\ada_sec2vep.exe"
Source: C:\Users\user\Desktop\ada_sec2vep.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeSection loaded: dpapi.dllJump to behavior
Source: ada_sec2vep.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: ada_sec2vep.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ada_sec2vep.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ada_sec2vep.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ada_sec2vep.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ada_sec2vep.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: ada_sec2vep.exeStatic PE information: section name: .code
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\Config\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Applications\Windows\GatherLogs\Jump to behavior
Source: C:\Users\user\Desktop\ada_sec2vep.exeFile opened: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Search\Data\Jump to behavior
Source: ada_sec2vep.exe, 00000000.00000002.1728831671.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, ada_sec2vep.exe, 00000009.00000002.1729050500.0000000000B98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528215 Sample: ada_sec2vep.exe Startdate: 07/10/2024 Architecture: WINDOWS Score: 48 9 Machine Learning detection for sample 2->9 11 AI detected suspicious sample 2->11 5 ada_sec2vep.exe 2->5         started        7 ada_sec2vep.exe 2->7         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ada_sec2vep.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.essen.ihk24.deada_sec2vep.exefalse
    unknown
    http://www.gesetze-im-internet.deada_sec2vep.exefalse
      unknown
      https://curl.haxx.se/docs/http-cookies.htmlada_sec2vep.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1528215
        Start date and time:2024-10-07 16:57:50 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 21s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:ada_sec2vep.exe
        Detection:MAL
        Classification:mal48.winEXE@2/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtOpenFile calls found.
        • VT rate limit hit for: ada_sec2vep.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.634159746800974
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:ada_sec2vep.exe
        File size:560'128 bytes
        MD5:b895e8e9a05f32670b728fe042d4d70b
        SHA1:520969de78995e685d9044048b1efd3621f6d10c
        SHA256:7895ca50cad8e6497a4ec9f46a38a914ef631ae723779c4f5f0e7e3ac59a44eb
        SHA512:922a6f86095ab13d44128af5fdc0ddd3e806d0ef23b4a6a87a5ee717faa5453009655d12af01cac446e28ac43da73ffeaddb62e2d65005e85c8901c1c4acc6a8
        SSDEEP:12288:igMuVdfkkFXbHnDdj7e8Tcs8a6cDw1vLE9m+OJ2/QGimtP2DmTT+arFFgI8:tMyB5cV1vLE9SSQa2Q7gI8
        TLSH:F6C49F06BEC050B1E2E7367515B697725E3D7A2447219AC7E3D44C7A89202E09F3A3BE
        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...H..g.........."...............................@.......................... ............@........................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x469ddd
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6703F648 [Mon Oct 7 14:55:04 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:f889a9d6aca32ba301f36599c6ede1cd
        Instruction
        call 00007FD27C813C53h
        jmp 00007FD27C8137FFh
        push ebp
        mov ebp, esp
        push ecx
        cmp dword ptr [00488160h], 01h
        jl 00007FD27C8139E8h
        cmp dword ptr [ebp+08h], C00002B4h
        je 00007FD27C81398Bh
        cmp dword ptr [ebp+08h], C00002B5h
        jne 00007FD27C8139D6h
        stmxcsr dword ptr [ebp-04h]
        mov eax, dword ptr [ebp-04h]
        xor eax, 3Fh
        test al, 81h
        je 00007FD27C8139C1h
        test eax, 00000204h
        jne 00007FD27C813989h
        mov eax, C000008Eh
        leave
        ret
        test eax, 00000102h
        je 00007FD27C8139ACh
        test eax, 00000408h
        jne 00007FD27C813989h
        mov eax, C0000091h
        leave
        ret
        test eax, 00000810h
        jne 00007FD27C813989h
        mov eax, C0000093h
        leave
        ret
        test eax, 00001020h
        jne 00007FD27C813990h
        mov eax, C000008Fh
        leave
        ret
        mov eax, C0000090h
        leave
        ret
        mov eax, dword ptr [ebp+08h]
        leave
        ret
        push ebp
        mov ebp, esp
        push dword ptr [ebp+08h]
        call 00007FD27C81398Fh
        neg eax
        pop ecx
        sbb eax, eax
        neg eax
        dec eax
        pop ebp
        ret
        push ebp
        mov ebp, esp
        cmp dword ptr [00488F64h], FFFFFFFFh
        push dword ptr [ebp+08h]
        jne 00007FD27C813989h
        call 00007FD27C80C48Bh
        jmp 00007FD27C81398Dh
        push 00488F64h
        call 00007FD27C80C40Eh
        pop ecx
        neg eax
        pop ecx
        sbb eax, eax
        not eax
        and eax, dword ptr [ebp+08h]
        pop ebp
        ret
        push 00000008h
        push 00000030h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x7ddfc0xb4.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x498.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8d0000x4844.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70b780xc0.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x7e1a80x2f8.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x6a1100x6a2003a3099fe44abf567e2e4269944489f26False0.563526023262662data6.584010213561401IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x6c0000x1384c0x13a00ae58beab0c0a69f7ca342d554c4d44a9False0.3890824044585987data5.412988032048491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x800000x90b80x3e00e4db7151ea28f14d21c1c7a27328ce6eFalse0.21156754032258066DOS executable (block device driver)3.691427254147485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .code0x8a0000x1d3d0x1e00197c3ff3cae5514d6393c4ea4d3f6e38False0.48671875data5.814792803440674IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x8c0000x4980x6005ec5e5a98cb31e8020064f0f9680fb27False0.3736979166666667data4.586160103346616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x8d0000x48440x4a0046d7a55318fdbe3d2c2d2783ddaea232False0.7377533783783784data6.670070195874956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x8c0600x433XML 1.0 document, ASCII textEnglishUnited States0.4827906976744186
        DLLImport
        KERNEL32.dllCloseHandle, CompareStringW, CopyFileW, CreateDirectoryW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, DeleteFileW, DuplicateHandle, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExpandEnvironmentStringsA, FileTimeToSystemTime, FindClose, FindFirstFileExW, FindFirstFileW, FindNextFileW, FlushFileBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDriveTypeW, GetEnvironmentStringsW, GetFileAttributesExW, GetFileAttributesW, GetFileInformationByHandle, GetFileSize, GetFileSizeEx, GetFileType, GetFullPathNameW, GetLastError, GetLocalTime, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryA, GetSystemTimeAsFileTime, GetTickCount, GetTimeZoneInformation, GetUserDefaultLCID, HeapAlloc, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, MultiByteToWideChar, PeekNamedPipe, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, RemoveDirectoryW, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFileAttributesW, SetFilePointer, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, Sleep, SleepEx, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UnregisterWait, VerSetConditionMask, VerifyVersionInfoA, WideCharToMultiByte, WriteConsoleW, WriteFile
        SHELL32.dllSHGetSpecialFolderPathW
        USER32.dllCharLowerW, GetForegroundWindow
        WS2_32.dllWSACleanup, WSAGetLastError, WSAIoctl, WSASetLastError, WSAStartup, __WSAFDIsSet, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, gethostname, getpeername, getsockname, getsockopt, htonl, htons, ioctlsocket, listen, ntohl, ntohs, recv, select, send, setsockopt, socket
        SHLWAPI.dllPathMatchSpecW
        ODBC32.dll
        ADVAPI32.dllCryptAcquireContextA, CryptCreateHash, CryptDestroyHash, CryptGenRandom, CryptGetHashParam, CryptHashData, CryptReleaseContext
        CRYPT32.dllCertAddCertificateContextToStore, CertCloseStore, CertCreateCertificateChainEngine, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateChain, CertFreeCertificateChainEngine, CertFreeCertificateContext, CertGetCertificateChain, CertGetNameStringA, CertOpenStore, CryptQueryObject, CryptStringToBinaryA
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:10:58:21
        Start date:07/10/2024
        Path:C:\Users\user\Desktop\ada_sec2vep.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ada_sec2vep.exe"
        Imagebase:0xa30000
        File size:560'128 bytes
        MD5 hash:B895E8E9A05F32670B728FE042D4D70B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:9
        Start time:10:58:49
        Start date:07/10/2024
        Path:C:\Users\user\Desktop\ada_sec2vep.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ada_sec2vep.exe"
        Imagebase:0xa30000
        File size:560'128 bytes
        MD5 hash:B895E8E9A05F32670B728FE042D4D70B
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        No disassembly