Loading ...

Play interactive tourEdit tour

Analysis Report E7CThb0bFa

Overview

General Information

Sample Name:E7CThb0bFa (renamed file extension from none to exe)
Analysis ID:381780
MD5:ba28a06e2aae1052319541d4124122c5
SHA1:20613e49ee5b14dc04c7b045900f1d0e1b4173be
SHA256:9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46
Tags:uncategorized
Infos:

Most interesting Screenshot:

Detection

ZeusVM
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected ZeusVM e-Banking Trojan
Multi AV Scanner detection for submitted file
Contains VNC / remote desktop functionality (version string found)
Contains functionality to detect sleep reduction / modifications
Injects a PE file into a foreign processes
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
May initialize a security null descriptor
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • E7CThb0bFa.exe (PID: 6988 cmdline: 'C:\Users\user\Desktop\E7CThb0bFa.exe' MD5: BA28A06E2AAE1052319541D4124122C5)
    • E7CThb0bFa.exe (PID: 7048 cmdline: C:\Users\user\Desktop\E7CThb0bFa.exe MD5: BA28A06E2AAE1052319541D4124122C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: E7CThb0bFa.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: E7CThb0bFa.exeVirustotal: Detection: 84%Perma Link
Source: E7CThb0bFa.exeReversingLabs: Detection: 92%
Machine Learning detection for sampleShow sources
Source: E7CThb0bFa.exeJoe Sandbox ML: detected
Source: 1.2.E7CThb0bFa.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 0.2.E7CThb0bFa.exe.24e0000.2.unpackAvira: Label: TR/Patched.Ren.Gen
Source: 1.1.E7CThb0bFa.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00408558 CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00412FA3 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00408558 CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00412FA3 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: E7CThb0bFa.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_004113A5 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_004113A5 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00405304 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00417437 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041737C FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00417437 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0041737C FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00414C41 select,recv,
Source: E7CThb0bFa.exeString found in binary or memory: http://www.google.com/webhp
Source: E7CThb0bFa.exe, 00000000.00000002.637292990.00000000024E0000.00000004.00000001.sdmp, E7CThb0bFa.exe, 00000001.00000001.636690147.0000000000400000.00000040.00020000.sdmpString found in binary or memory: http://www.google.com/webhpbc
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041047C GetClipboardData,GlobalLock,EnterCriticalSection,LeaveCriticalSection,GlobalUnlock,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0042D190 GetKeyboardState,

E-Banking Fraud:

barindex
Detected ZeusVM e-Banking TrojanShow sources
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00419084 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00419084 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_004108EC OpenWindowStationW,CreateWindowStationW,GetProcessWindowStation,OpenDesktopW,CreateDesktopW,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044A56C NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00430020 NtdllDefWindowProc_A,GetCapture,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00424C58 NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044AD10 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044ADC0 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0043F83C GetSubMenu,SaveDC,RestoreDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00413620 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00418801 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041D21C CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00418801 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0041D21C CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00444A1C
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0043F83C
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00414A51
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0040D6D4
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00412EAF
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0040171B
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00414A51
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0040D6D4
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00412EAF
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0040171B
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: String function: 004041E0 appears 68 times
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: String function: 00406324 appears 61 times
Source: E7CThb0bFa.exe, 00000000.00000002.637101486.0000000000A90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs E7CThb0bFa.exe
Source: E7CThb0bFa.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: classification engineClassification label: mal80.bank.troj.evad.winEXE@3/0@0/0
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0041DA04 GetLastError,FormatMessageA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00405554 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_004053DF CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00405554 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_004053DF CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_004133CA GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_004133CA GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_004085C0 GetDiskFreeSpaceA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0040647F CloseHandle,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,CloseHandle,GetLengthSid,CloseHandle,Process32NextW,CloseHandle,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00408C77 CoCreateInstance,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00406179 CompareStringA,RtlEnterCriticalSection,FindResourceA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\E7CThb0bFa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: E7CThb0bFa.exeVirustotal: Detection: 84%
Source: E7CThb0bFa.exeReversingLabs: Detection: 92%
Source: unknownProcess created: C:\Users\user\Desktop\E7CThb0bFa.exe 'C:\Users\user\Desktop\E7CThb0bFa.exe'
Source: C:\Users\user\Desktop\E7CThb0bFa.exeProcess created: C:\Users\user\Desktop\E7CThb0bFa.exe C:\Users\user\Desktop\E7CThb0bFa.exe
Source: C:\Users\user\Desktop\E7CThb0bFa.exeProcess created: C:\Users\user\Desktop\E7CThb0bFa.exe C:\Users\user\Desktop\E7CThb0bFa.exe
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00424218 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232BE08 push FAF50000h; retn 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232CB68 push ds; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232D354 push ds; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02327FA0 pushad ; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232741D pushfd ; retn 0003h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329865 push edx; iretd
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232ACA4 pushad ; retf
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02328C9C push ss; retf 004Ch
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329100 push eax; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232E57F push ss; iretd
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232C550 pushfd ; retf
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232D9B3 push edx; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232BDF4 push ds; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_023289E0 push ebx; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329DEB push ebx; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232BE08 push FAF50000h; retn 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232CB68 push ds; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232D354 push ds; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02327FA0 pushad ; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232741D pushfd ; retn 0003h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329865 push edx; iretd
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232ACA4 pushad ; retf
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02328C9C push ss; retf 004Ch
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329100 push eax; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232E57F push ss; iretd
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232C550 pushfd ; retf
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232D9B3 push edx; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_0232BDF4 push ds; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_023289E0 push ebx; ret
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_3_02329DEB push ebx; retf 0000h
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00437334 push 004373C1h; ret
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044A5F4 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_004225DC IsIconic,GetWindowPlacement,GetWindowRect,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00432878 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044AD10 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0044ADC0 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_004475DC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00431744 IsIconic,GetCapture,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00431FF8 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00424218 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,

Malware Analysis System Evasion:

barindex
Contains functionality to detect sleep reduction / modificationsShow sources
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00426D88
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00426D88
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00405304 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00417437 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041737C FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_00417437 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0041737C FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_0041DFA0 GetSystemInfo,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00424218 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041C2AE mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_1_0041C2AE mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041C5F3 GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\E7CThb0bFa.exeMemory written: C:\Users\user\Desktop\E7CThb0bFa.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\E7CThb0bFa.exeProcess created: C:\Users\user\Desktop\E7CThb0bFa.exe C:\Users\user\Desktop\E7CThb0bFa.exe
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_004152ED InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetLocaleInfoA,GetACP,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00409924 GetLocalTime,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00407242 GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00411E28 GetTimeZoneInformation,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 0_2_00437334 GetVersion,
Source: E7CThb0bFa.exe, 00000000.00000002.637292990.00000000024E0000.00000004.00000001.sdmpBinary or memory string: S:(ML;;NRNWNX;;;LW)SeSecurityPrivilegeS:(ML;CIOI;NRNWNX;;;LW)?O?I?Tcabcabinet.dllFCICreateFCIAddFileFCIFlushCabinetFCIDestroybcdfghklmnpqrstvwxzaeiouyGlobal\Local\

Remote Access Functionality:

barindex
Contains VNC / remote desktop functionality (version string found)Show sources
Source: E7CThb0bFa.exe, 00000000.00000002.637292990.00000000024E0000.00000004.00000001.sdmpString found in binary or memory: RFB 003.003
Source: E7CThb0bFa.exe, 00000000.00000002.637292990.00000000024E0000.00000004.00000001.sdmpString found in binary or memory: .exe-fSysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXMERFB 003.003
Source: E7CThb0bFa.exeString found in binary or memory: RFB 003.003
Source: E7CThb0bFa.exeString found in binary or memory: RFB 003.003
Source: E7CThb0bFa.exe, 00000001.00000001.636690147.0000000000400000.00000040.00020000.sdmpString found in binary or memory: .exe-fSysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXMERFB 003.003
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_0041511E socket,bind,closesocket,
Source: C:\Users\user\Desktop\E7CThb0bFa.exeCode function: 1_2_00414E40 socket,bind,listen,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information1Input Capture11System Time Discovery2Remote Desktop Protocol1Archive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobCreate Account1Valid Accounts1Obfuscated Files or Information21LSASS MemoryAccount Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Valid Accounts1Access Token Manipulation11Install Root Certificate1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Process Injection111Software Packing11NTDSSystem Information Discovery15Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptValid Accounts1LSA SecretsNetwork Share Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation11Cached Domain CredentialsSecurity Software Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection111DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
E7CThb0bFa.exe85%VirustotalBrowse
E7CThb0bFa.exe93%ReversingLabsWin32.Trojan.Zeus
E7CThb0bFa.exe100%AviraTR/Crypt.ZPACK.Gen
E7CThb0bFa.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
1.0.E7CThb0bFa.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.2.E7CThb0bFa.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.2.E7CThb0bFa.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
0.2.E7CThb0bFa.exe.24e0000.2.unpack100%AviraTR/Patched.Ren.GenDownload File
1.1.E7CThb0bFa.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
0.0.E7CThb0bFa.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:381780
Start date:05.04.2021
Start time:02:53:56
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 12s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:E7CThb0bFa (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal80.bank.troj.evad.winEXE@3/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 83.4% (good quality ratio 78.9%)
  • Quality average: 82.1%
  • Quality standard deviation: 27.6%
HCA Information:
  • Successful, ratio: 52%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.927240072544305
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.37%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
File name:E7CThb0bFa.exe
File size:275968
MD5:ba28a06e2aae1052319541d4124122c5
SHA1:20613e49ee5b14dc04c7b045900f1d0e1b4173be
SHA256:9738c7021fdded8bb03e1588d17386dc175328630ecb0f1a3d671dfc4fb18d46
SHA512:9aaaa26c106043d56c48f89b3dd7b84ba9bbf7951c5e82a622d0eb93169e9520643bd5cb6b49dbd1cce7f5cd776e6b62b855266c099304acd3b9faa703187f25
SSDEEP:3072:q4ep6/R4I4NdnFubGtt89Z0pVaCv86giQvBjR4DtHuLUGbcQTaQQ0tQPUy8xVFQR:qmGfubsi0pVaDL4B0bcQTXJxVsGhxMI0
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x48d160
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:92644df84cdbba7637462c128671f148

Entrypoint Preview

Instruction
pushad
mov esi, 0044B000h
lea edi, dword ptr [esi-0004A000h]
mov dword ptr [edi+0007809Ch], 9DB73737h
push edi
or ebp, FFFFFFFFh
jmp 00007F094CCB2920h
nop
nop
nop
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F094CCB28FFh
mov eax, 00000001h
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007F094CCB291Dh
jne 00007F094CCB293Ah
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F094CCB2931h
dec eax
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
jmp 00007F094CCB28E6h
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jmp 00007F094CCB2964h
xor ecx, ecx
sub eax, 03h
jc 00007F094CCB2923h
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007F094CCB2987h
sar eax, 1
mov ebp, eax
jmp 00007F094CCB291Dh
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F094CCB28DEh
inc ecx
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F094CCB28D0h
add ebx, ebx
jne 00007F094CCB2919h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007F094CCB2901h
jne 00007F094CCB291Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F094CCB28F6h
add ecx, 02h
cmp ebp, 00000000h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8e9c80x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x9c8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x8d3180x18UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x4a0000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
UPX10x4b0000x430000x42400False0.982060731132data7.9419130638IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x8e0000x10000xc00False0.3330078125data3.33000850621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_CURSOR0x869c80x134data
RT_CURSOR0x86afc0x134data
RT_CURSOR0x86c300x134data
RT_CURSOR0x86d640x134data
RT_CURSOR0x86e980x134data
RT_CURSOR0x86fcc0x134data
RT_CURSOR0x871000x134data
RT_BITMAP0x872340x1d0data
RT_BITMAP0x874040x1e4data
RT_BITMAP0x875e80x1d0data
RT_BITMAP0x877b80x1d0data
RT_BITMAP0x879880x1d0data
RT_BITMAP0x87b580x1d0data
RT_BITMAP0x87d280x1d0data
RT_BITMAP0x87ef80x1d0data
RT_BITMAP0x880c80x1d0data
RT_BITMAP0x882980x1d0data
RT_BITMAP0x884680xe8data
RT_DIALOG0x885500x52data
RT_STRING0x885a40xfcdata
RT_STRING0x886a00x1ecdata
RT_STRING0x8888c0x148data
RT_STRING0x889d40x274data
RT_STRING0x88c480x150data
RT_STRING0x88d980xecdata
RT_STRING0x88e840x1b0data
RT_STRING0x890340x450data
RT_STRING0x894840x364data
RT_STRING0x897e80x440data
RT_STRING0x89c280x1b0data
RT_STRING0x89dd80xecdata
RT_STRING0x89ec40x1e4data
RT_STRING0x8a0a80x3f4data
RT_STRING0x8a49c0x340data
RT_STRING0x8a7dc0x2c8data
RT_RCDATA0x8aaa40x10Non-ISO extended-ASCII text, with no line terminators
RT_RCDATA0x8aab40x25cdata
RT_GROUP_CURSOR0x8ad100x14data
RT_GROUP_CURSOR0x8ad240x14Non-ISO extended-ASCII text, with no line terminators
RT_GROUP_CURSOR0x8ad380x14data
RT_GROUP_CURSOR0x8ad4c0x14data
RT_GROUP_CURSOR0x8ad600x14data
RT_GROUP_CURSOR0x8ad740x14data
RT_GROUP_CURSOR0x8ad880x14data

Imports

DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
advapi32.dllRegCloseKey
comctl32.dllImageList_Add
gdi32.dllSaveDC
oleaut32.dllVariantCopy
user32.dllGetDC
version.dllVerQueryValueA

Network Behavior

No network behavior found

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:02:54:36
Start date:05/04/2021
Path:C:\Users\user\Desktop\E7CThb0bFa.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\E7CThb0bFa.exe'
Imagebase:0x400000
File size:275968 bytes
MD5 hash:BA28A06E2AAE1052319541D4124122C5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

General

Start time:02:54:38
Start date:05/04/2021
Path:C:\Users\user\Desktop\E7CThb0bFa.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\E7CThb0bFa.exe
Imagebase:0x400000
File size:275968 bytes
MD5 hash:BA28A06E2AAE1052319541D4124122C5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >