c760bd81062f3428d2f8fa48782f6ddd

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2018-May-21 01:49:42
CompanyName WhiteDeath & Co
FileDescription Crack for Acrobat Pro x64
FileVersion 2.0.0.0
InternalName Crack for Acrobat Pro x64
LegalCopyright WhiteDeath & Co
OriginalFilename crack.exe
ProductName Crack for Acrobat Pro x64
ProductVersion 2.0.0.0

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • sc.exe
  • schtask
Looks for Qemu presence:
  • QeMU
May have dropper capabilities:
  • %Temp%
Info Cryptographic algorithms detected in the binary: Uses constants related to SHA256
Uses constants related to AES
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Possibly launches other programs:
  • ShellExecuteW
  • CreateProcessW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Functions related to the privilege level:
  • CheckTokenMembership
Enumerates local disk drives:
  • GetDriveTypeW
Can take screenshots:
  • CreateCompatibleDC
  • GetDC
Suspicious The PE header may have been manually modified. The resource timestamps differ from the PE header:
  • 2030-Jan-12 04:51:30
Suspicious The file contains overlay data. 26580466 bytes of data starting at offset 0x84a00.
The overlay data has an entropy of 7.99999 and is possibly compressed or encrypted.
Overlay data amounts for 97.9972% of the executable.
Malicious VirusTotal score: 18/72 (Scanned on 2024-10-30 17:55:15) Bkav: W64.AIDetectMalware
DeepInstinct: MALICIOUS
ESET-NOD32: Win64/HackTool.Crack.DL potentially unsafe
Elastic: malicious (high confidence)
Fortinet: Riskware/Crack
GData: Win64.Application.Agent.6K25TJ
Google: Detected
Ikarus: PUA.HackTool.Crack
K7AntiVirus: Riskware ( 0040eff71 )
K7GW: Riskware ( 0040eff71 )
Malwarebytes: RiskWare.Crack
McAfee: Artemis!C760BD81062F
Microsoft: Program:Win32/Wacapew.C!ml
Paloalto: generic.ml
Skyhigh: Artemis
Sophos: CrackTool (PUA)
Symantec: ML.Attribute.HighConfidence
alibabacloud: HackTool:Win/Crack.DE

Hashes

MD5 c760bd81062f3428d2f8fa48782f6ddd
SHA1 e7eb54c9f78b8b03af2ac998b4f3465c8cca3423
SHA256 c8cbe30c098c2b131a7791145c3eb54fc433cb9e1bc19e82a359d304b9f41601
SHA3 1f800b54f6ca610fb73c9e3ca1ee94bcdb61b14d852faf6d22237a1afb9e5121
SSDeep 393216:Ed206fntpw5LPt+sjLeRdmkrLxq0a6tRFJqhTz2lip0J3P6WTFAbNqx:Ed2hQ5Tt+UyRoSq0nJq9Yi63PUw
Imports Hash 6d9c27ca5008bc63e9fbc102659734db

DOS Header

e_magic MZ
e_cblp 0x60
e_cp 0x1
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x60

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2018-May-21 01:49:42
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 10.0
SizeOfCode 0x1fe00
SizeOfInitializedData 0x68e00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000020360 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.2
ImageVersion 0.0
SubsystemVersion 5.2
Win32VersionValue 0
SizeOfImage 0x8c000
SizeOfHeaders 0x400
Checksum 0x8b37e
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 34880ded82a53af6388ca6a6e73c7163
SHA1 8bafaa6c06dc2864862acf8dc8de0dde6af51deb
SHA256 68664d4202cbb92a9fb2f0912f975bbaecd89a369135597c738baf39b5041236
SHA3 90886035936ac605d807c7274c1b60c1a77319554c1bc6550dda576e282314a9
VirtualSize 0x1fd9c
VirtualAddress 0x1000
SizeOfRawData 0x1fe00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.41418

.rdata

MD5 885fc665d6a943b5ea1e6af33363c9a7
SHA1 56f283d92aa6bdfc01c0a2713ee9d7acbac4af25
SHA256 3c93c2abd34d6552ac271db31a059dba249d467401406f521dab077ce2fa13ac
SHA3 e839cc3ae86edbdfc450fdfbd9af2f0b82d462b49e566d9ca76fa63a15584459
VirtualSize 0x654a
VirtualAddress 0x21000
SizeOfRawData 0x6600
PointerToRawData 0x20200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.1928

.data

MD5 c08192134f5c5cbe4dbe153f0f637630
SHA1 19b9a28f22a5f0c6300d669c588061efd64e3e49
SHA256 804b7230084cb62fe64d930a4f65682506550563883ce9e6836c12f97715b432
SHA3 0db2138197e952bcbbf91e70dd3ce9304a0938ba4462b1781fc9b1f597082466
VirtualSize 0x5178
VirtualAddress 0x28000
SizeOfRawData 0xc00
PointerToRawData 0x26800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.80735

.pdata

MD5 d5f72adb04088181ab06b1b6d38e12a6
SHA1 6c07ad6915005ee59c7fed12e678b911e9860a44
SHA256 4f32c43eba6c7638b923ffc6fd3542e2f9d697e954c9bd5548bff7ae4852d898
SHA3 95b038572f7764a5e4f7196990fd9a2a7a6bbabad2810008409b8f0f9b0bbd31
VirtualSize 0x1c74
VirtualAddress 0x2e000
SizeOfRawData 0x1e00
PointerToRawData 0x27400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.08487

.rsrc

MD5 45b0319d072cd9453c422b81856114b9
SHA1 f6f14ee2ea6042e38e9cea70df20c6fcdf6e68fc
SHA256 339dccdabb81c9fd36c94d7314f522390150ca37456862b410ab1f37768a931f
SHA3 3f4d62a596d661e37e518c8d6e68469ab1c04aafc86335d603eefb568d51a52a
VirtualSize 0x5adbb
VirtualAddress 0x30000
SizeOfRawData 0x5ae00
PointerToRawData 0x29200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.39089

.reloc

MD5 5af5ec830e68530fb5050cbd595715df
SHA1 c0abca82ee011f3a7ebb24e517abadc92977fb48
SHA256 9e0e6a69912bded8879203d309d1a17f6c6dc3446ff726c6691eaec7db819587
SHA3 dd21c1431d46a2dde1e5bfb467ad604aee188d8ea807bfaaa82fd6502ec73c26
VirtualSize 0x8ca
VirtualAddress 0x8b000
SizeOfRawData 0xa00
PointerToRawData 0x84000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 3.75975

Imports

COMCTL32.dll #17
SHELL32.dll ShellExecuteW
SHBrowseForFolderW
ShellExecuteExW
SHGetPathFromIDListW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetMalloc
GDI32.dll CreateCompatibleDC
CreateFontIndirectW
DeleteObject
DeleteDC
GetCurrentObject
StretchBlt
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
GetObjectW
ADVAPI32.dll FreeSid
AllocateAndInitializeSid
CheckTokenMembership
USER32.dll GetSystemMenu
EnableMenuItem
EnableWindow
MessageBeep
LoadIconW
LoadImageW
SetWindowsHookExW
PtInRect
CallNextHookEx
DefWindowProcW
CallWindowProcW
DrawIconEx
DialogBoxIndirectParamW
GetWindow
ClientToScreen
GetDC
DrawTextW
SystemParametersInfoW
SetFocus
UnhookWindowsHookEx
GetWindowLongPtrW
SetWindowLongPtrW
GetSystemMetrics
GetClientRect
GetDlgItem
IsWindow
CreateWindowExA
MessageBoxA
DestroyWindow
GetSysColor
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
wsprintfA
GetClassNameA
GetWindowLongW
GetMenu
GetWindowDC
ReleaseDC
CopyImage
GetParent
ScreenToClient
CreateWindowExW
GetDesktopWindow
wvsprintfW
SetWindowPos
SetTimer
GetMessageW
DispatchMessageW
GetWindowRect
CharUpperW
SendMessageW
ShowWindow
BringWindowToTop
wsprintfW
MessageBoxW
EndDialog
SetWindowLongW
GetKeyState
KillTimer
ole32.dll CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
OLEAUT32.dll SysFreeString
VariantClear
SysAllocStringLen
OleLoadPicture
SysAllocString
KERNEL32.dll ReadFile
SetFileTime
SetEndOfFile
VirtualAlloc
VirtualFree
GetFileInformationByHandle
WaitForMultipleObjects
SetFilePointer
GetFileSize
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FormatMessageW
lstrcpyW
LocalFree
IsBadReadPtr
GetSystemDirectoryW
GetCurrentThreadId
SuspendThread
TerminateThread
InitializeCriticalSection
ResetEvent
SetEvent
CreateEventW
GetVersionExW
GetModuleFileNameW
GetCurrentProcess
SetProcessWorkingSetSize
SetEnvironmentVariableW
GetDriveTypeW
CreateFileW
LoadLibraryA
SetThreadLocale
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
CompareFileTime
WideCharToMultiByte
GetTempPathW
GetCurrentDirectoryW
GetEnvironmentVariableW
lstrcmpiW
GetLocaleInfoW
MultiByteToWideChar
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetSystemDefaultLCID
lstrcmpiA
GlobalAlloc
GlobalFree
MulDiv
FindResourceExA
SizeofResource
LoadResource
LockResource
GetProcAddress
GetModuleHandleW
FindFirstFileW
lstrcmpW
DeleteFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetStdHandle
WriteFile
lstrlenA
CreateDirectoryW
GetFileAttributesW
SetCurrentDirectoryW
GetLocalTime
SystemTimeToFileTime
CreateThread
GetExitCodeThread
Sleep
SetFileAttributesW
GetDiskFreeSpaceExW
SetLastError
GetCommandLineW
GetStartupInfoW
GetTickCount
lstrlenW
ExitProcess
lstrcatW
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
CloseHandle
WaitForSingleObject
GetExitCodeProcess
GetQueuedCompletionStatus
ResumeThread
SetInformationJobObject
CreateIoCompletionPort
AssignProcessToJobObject
CreateJobObjectW
GetLastError
CreateProcessW
GetStartupInfoA
msvcrt.dll free
__set_app_type
??3@YAXPEAX@Z
_purecall
??2@YAPEAX_K@Z
_wtol
__CxxFrameHandler
memset
memmove
memcpy
_wcsnicmp
memcmp
strncpy
wcsncpy
wcsncmp
strncmp
?_set_new_handler@@YAP6AH_K@ZP6AH0@Z@Z
_beginthreadex
_CxxThrowException
wcsstr
_fmode
realloc
malloc
__dllonexit
_onexit
??1type_info@@UEAA@XZ
__C_specific_handler
_XcptFilter
_c_exit
_exit
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_commode
?terminate@@YAXXZ

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.22992
MD5 2b185f3a5dc437afe193ac976b5d8c6c
SHA1 74de5bc5cf9ecd716290a984b646aa3d5879836d
SHA256 4abe6eb74417a00ce22d7df97a849366ca44c2b9edf01b82f5d4f55091c8fafa
SHA3 e71d9196a6cbd9f24dd8b028bd7419e2a03726b513db41924fbf09935e2231b2

2

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.85284
MD5 b51fe8b56d46bcce8d15456923576ec6
SHA1 2536dd239e01a28c293d9f5587011d1cce2710c3
SHA256 1d10bf658cef69c1be58ae06449187bf1702dfc4bd4a0b0b8a0a13ee5bb2f991
SHA3 10c99edf2dbba074ae051beb518a2cc2f52bd3667201abcb4e240e1d08cfc823

3

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.74729
MD5 36d6a1eeabee58314784d083eac47453
SHA1 902c4715e441a254f390418a748926fa60268d1c
SHA256 a4e74ba9850a4a285328f682ff3eb7fe4fcb0158163dc24bdb25cf83a3fdd7ea
SHA3 9dba4ea0bde819f64563e854ce1d420ac6212913f27d21887c73ebfea296bfdf

4

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.63424
MD5 294b8b407c075e5ce8fbabb590afb5ae
SHA1 bed9a59b264d796b16e4c28deec49c12369fc47b
SHA256 d782489aa6d7d6373d9ffcc41033701e89d8fb0479210d39ff778753f8d6a670
SHA3 97e0bb4be49c4508e85acde46c0fb413f47e1d6979e2290313c78a4b9425a8a3

5

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 2030-Jan-12 04:51:30
Entropy 2.43635
MD5 d9b36f73c798e21656f1250384fafae3
SHA1 171b091bd8c647328dddfdf6d2c0727835629bae
SHA256 6504e00794feae03bc67e8942c974c4e22e2a5aec694fac4a710c666d5e924e1
SHA3 2d6a3d510ab5b98ede587d8c09dd2ad970ae30cd06c96c88fb62354e76a3e6e6

6

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 2030-Jan-12 04:51:30
Entropy 2.26732
MD5 08769e87feabe38699b81a5d770c93b9
SHA1 e4ff99db0b8531d773ef039a353011fd5044a7db
SHA256 83a9a13adb3b22f20f3fd046472e39e5172619cd3d0f89e48814e2b2b021dcbd
SHA3 71363ae6f6eeb03bb960c35f22b9302717c76e129ded74fa900d5604e87fbfd5

101

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.76511
Detected Filetype Icon file
MD5 61e58469fe660c213ebc6e2cc66cbafc
SHA1 c47479da87d8390f935b337e91bdbedcc739b3eb
SHA256 c369bebe3271775e43301281caa7efcd03938e3bc1f620212d6c5617edaad403
SHA3 7c04647ad931cbf1b5c005cebc686d11b461a50e14ba9aa560e6cc1749adcb2f

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x304
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.31487
MD5 c0da3c074d138bb048f6ccd703521e1e
SHA1 633c84beb7d01298f3a4b3505dddc586bf4e947e
SHA256 fa2601d3b603064de5c8475250bfd23466d419abb49d5e3ab4d43b0bfaee1a79
SHA3 150d891d136b1e1474637fb0644cc8eeb4dad52e9798ce37553189aff2d10992

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x30b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.19301
MD5 d9d7e35ab54ea04956f61058b6081147
SHA1 4eaab43a93e26b4dc7e0ca769371dedb64c1ae12
SHA256 c0958598860e1b8e1d103e1690de8e231db774dc835707365b8177750b14c5c7
SHA3 dc325bdd0b296125068882311fdc0996fd88689e1759b22db036ff02b5b20821

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 2.0.0.0
ProductVersion 2.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
CompanyName WhiteDeath & Co
FileDescription Crack for Acrobat Pro x64
FileVersion (#2) 2.0.0.0
InternalName Crack for Acrobat Pro x64
LegalCopyright WhiteDeath & Co
OriginalFilename crack.exe
ProductName Crack for Acrobat Pro x64
ProductVersion (#2) 2.0.0.0
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->