× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 20da2721f3421615caf9da83f703916f0192edacb7fbc748c34a4dad304ee6d9
File name: PrivaZer.exe
Detection ratio: 0 / 65
Analysis date: 2018-10-15 04:20:54 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20181015
AegisLab 20181015
AhnLab-V3 20181014
Alibaba 20180921
ALYac 20181015
Antiy-AVL 20181015
Arcabit 20181015
Avast 20181015
Avast-Mobile 20181014
AVG 20181015
Avira (no cloud) 20181014
Babable 20180918
Baidu 20181012
BitDefender 20181015
Bkav 20181014
CAT-QuickHeal 20181013
ClamAV 20181014
CMC 20181014
Comodo 20181015
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cyren 20181015
DrWeb 20181015
eGambit 20181015
Emsisoft 20181015
Endgame 20180730
ESET-NOD32 20181015
F-Prot 20181015
F-Secure 20181015
Fortinet 20181015
GData 20181015
Ikarus 20181014
Sophos ML 20180717
Jiangmin 20181015
K7AntiVirus 20181015
K7GW 20181013
Kaspersky 20181015
Kingsoft 20181015
Malwarebytes 20181015
MAX 20181015
McAfee 20181015
McAfee-GW-Edition 20181015
Microsoft 20181015
eScan 20181015
NANO-Antivirus 20181015
Palo Alto Networks (Known Signatures) 20181015
Panda 20181014
Qihoo-360 20181015
Rising 20181012
SentinelOne (Static ML) 20181011
Sophos AV 20181015
SUPERAntiSpyware 20181015
Symantec 20181015
Symantec Mobile Insight 20181001
TACHYON 20181015
Tencent 20181015
TheHacker 20181011
TrendMicro 20181010
TrendMicro-HouseCall 20181010
Trustlook 20181015
VBA32 20181012
ViRobot 20181014
Webroot 20181015
Yandex 20181012
Zillya 20181012
ZoneAlarm by Check Point 20181015
Zoner 20181014
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Goversoft

Product PrivaZer
Original name privaZer
File version 3.0.55.0
Description PrivaZer
Comments All rights reserved
Signature verification Signed file, verified signature
Signing date 10:03 AM 10/14/2018
Signers
[+] Goversoft LLC
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 12:00 AM 01/30/2018
Valid to 11:59 PM 01/29/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 3EABACF7C482E39C6B528DFD7FCE04EA1C40C80D
Serial number 00 CD 80 2F 7B B8 E4 3E 4C E2 97 15 2E A3 BF 92 F6
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 11:00 PM 05/08/2013
Valid to 10:59 PM 05/08/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 12:00 AM 01/19/2010
Valid to 11:59 PM 01/18/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 11:00 PM 10/17/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00653E80
Number of sections 9
PE sections
Overlays
MD5 b7b58b63f2a8c942cc656e5fd97acfbb
File type data
Offset 15298048
Size 6360
Entropy 7.41
PE imports
ConvertSidToStringSidA
SHGetFolderPathA
RegDeleteKeyA
RegCreateKeyExW
LookupPrivilegeValueA
RegCloseKey
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
LookupAccountSidA
RegCreateKeyExA
RegQueryValueExW
SetSecurityDescriptorDacl
LookupAccountNameA
RegFlushKey
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
LookupPrivilegeDisplayNameA
RegEnumKeyA
RegDeleteValueA
GetTokenInformation
GetUserNameA
GetUserNameW
RegOpenKeyExA
LookupPrivilegeNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueW
RegSetValueExW
FreeSid
ChangeServiceConfigA
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
StartServiceA
RegEnumValueA
CloseServiceHandle
OpenSCManagerA
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
InitCommonControls
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
PrintDlgA
GetOpenFileNameA
GetSaveFileNameW
GetSaveFileNameA
GetOpenFileNameW
SetMapMode
GetWindowOrgEx
ResizePalette
GetTextMetricsA
CombineRgn
GetViewportOrgEx
GetTextExtentPointA
SetPixel
EndDoc
SetPaletteEntries
StretchDIBits
CopyEnhMetaFileA
OffsetWindowOrgEx
CreateEllipticRgn
CreatePalette
CreateDIBitmap
GetDIBits
GetEnhMetaFileBits
GetDCOrgEx
StretchBlt
GetTextFaceA
GetPaletteEntries
SetBkColor
SetWinMetaFileBits
GetDIBColorTable
DeleteEnhMetaFile
TextOutW
GetSystemPaletteEntries
SetStretchBltMode
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
BitBlt
GetDeviceCaps
CreateFontA
CreateBrushIndirect
SelectPalette
CreateEnhMetaFileA
CloseEnhMetaFile
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
DeleteObject
CreatePenIndirect
PatBlt
CreatePen
GetClipBox
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetEnhMetaFileDescriptionA
StartPage
RealizePalette
SetEnhMetaFileBits
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
SetWindowOrgEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
MaskBlt
GetEnhMetaFilePaletteEntries
RestoreDC
GetBitmapBits
CreateDIBSection
SetTextColor
MoveToEx
SetViewportOrgEx
ExtTextOutW
CreateCompatibleDC
SetBrushOrgEx
CreateRectRgn
SelectObject
StartDocA
CreateCompatibleBitmap
CreateSolidBrush
Polyline
StartDocW
Ellipse
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
GetComputerNameA
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
FindFirstFileW
DebugBreak
GetFileAttributesW
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
GetSystemTime
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
OpenFileMappingA
SetErrorMode
GetLogicalDrives
GetThreadContext
GetLocaleInfoW
GetFullPathNameA
GetFileTime
GetTempPathA
WideCharToMultiByte
QueryDosDeviceA
InterlockedExchange
WriteFile
GetTimeZoneInformation
GetCommandLineA
GlobalMemoryStatusEx
GetDiskFreeSpaceA
GetThreadPriority
SetFileAttributesA
SetEvent
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
MoveFileW
SetFileAttributesW
GetStringTypeExA
SetLastError
ConnectNamedPipe
VerLanguageNameA
DeviceIoControl
GetEnvironmentVariableA
CopyFileW
WriteProcessMemory
RemoveDirectoryW
Beep
GlobalFindAtomA
ExitProcess
GetSystemDefaultLCID
GetModuleFileNameA
GetStringTypeExW
LoadLibraryA
QueryPerformanceFrequency
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
GetPrivateProfileStringA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
FormatMessageA
CreateRemoteThread
CreateMutexA
GetModuleHandleA
GlobalMemoryStatus
CreateSemaphoreA
CreateThread
GetSystemDirectoryW
DisconnectNamedPipe
GetExitCodeThread
SetNamedPipeHandleState
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ExitThread
MoveFileExA
SetPriorityClass
SetThreadContext
WaitForMultipleObjectsEx
TerminateProcess
FindCloseChangeNotification
VirtualQuery
SearchPathA
VirtualQueryEx
FindNextChangeNotification
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
FlushFileBuffers
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
CallNamedPipeA
VirtualProtect
GetVersionExA
lstrcmpiW
DeleteFileA
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
DosDateTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetFileSize
GetUserDefaultLangID
OpenProcess
CreateDirectoryA
GetModuleHandleW
SetFileValidData
GetWindowsDirectoryA
FormatMessageW
SetThreadExecutionState
ReadProcessMemory
GetCPInfo
DeleteFileW
GetProcAddress
VirtualProtectEx
GetComputerNameW
CompareStringW
GlobalReAlloc
GetModuleFileNameW
ExpandEnvironmentStringsW
lstrcmpA
FindFirstFileA
WaitNamedPipeA
lstrcpyA
ResetEvent
GetProcessWorkingSetSize
FindNextFileA
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
CreateFileMappingW
GetProcessAffinityMask
RemoveDirectoryA
LocalSize
CreateFileW
CreateDirectoryW
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
GlobalDeleteAtom
FindFirstChangeNotificationA
GetSystemInfo
lstrlenA
GlobalFree
FindResourceW
GetProcessTimes
GetThreadLocale
GetVolumeNameForVolumeMountPointA
GlobalUnlock
GlobalAlloc
CreateNamedPipeA
lstrlenW
WinExec
CreateProcessW
FlushViewOfFile
FileTimeToLocalFileTime
SizeofResource
LocalFileTimeToFileTime
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
GetShortPathNameA
SetThreadAffinityMask
GetCurrentThread
SuspendThread
GetSystemDefaultLangID
RaiseException
CompareStringA
MapViewOfFile
SetFilePointer
GetFullPathNameW
ReadFile
PulseEvent
CloseHandle
lstrcpynA
GetPriorityClass
GetACP
GlobalLock
GetVersion
FreeResource
FindNextFileW
GetFileAttributesExW
FindResourceA
CreateProcessA
GetCurrentDirectoryW
UnmapViewOfFile
GetTempPathW
VirtualFree
CreateFileMappingA
Sleep
IsBadReadPtr
GetFileAttributesExA
GetProcessVersion
OpenEventA
VirtualAlloc
CreatePipe
WNetOpenEnumA
WNetGetUniversalNameA
WNetEnumResourceA
WNetCloseEnum
WNetGetConnectionA
MsiQueryProductStateA
RtlCompressBuffer
RtlInitUnicodeString
RtlGetCompressionWorkSpaceSize
NtCreateFile
NtClose
NtSetInformationKey
OleUninitialize
CoUninitialize
StgOpenStorageEx
IsEqualGUID
CoSetProxyBlanket
CreateStreamOnHGlobal
IsAccelerator
CoCreateGuid
StringFromCLSID
CLSIDFromString
CoGetClassObject
ProgIDFromCLSID
OleDraw
CoInitialize
OleInitialize
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CLSIDFromProgID
CoInitializeSecurity
GetHGlobalFromStream
OleSetMenuDescriptor
CoGetMalloc
CoTaskMemFree
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SysStringLen
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayUnaccessData
VariantCopyInd
VariantClear
GetActiveObject
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SafeArrayRedim
GetErrorInfo
SysFreeString
SafeArrayPutElement
VariantInit
SafeArrayGetElement
EmptyWorkingSet
SHGetFileInfoA
SHCreateShellItem
ShellExecuteExA
SHBrowseForFolderA
SHChangeNotify
SHUpdateRecycleBinIcon
ILCombine
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
RedrawWindow
RegisterClipboardFormatA
GetMessagePos
SetWindowRgn
DdeAccessData
DestroyWindow
EnableScrollBar
DrawAnimatedRects
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
DdeDisconnect
DdeCreateStringHandleA
OemToCharBuffA
DispatchMessageA
EndPaint
ScrollWindowEx
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
IsCharAlphaNumericA
GetCursorPos
ReleaseDC
DdeInitializeA
GetClassInfoA
AdjustWindowRectEx
SendMessageW
UnregisterClassA
IsDialogMessageW
SendMessageA
UnregisterClassW
GetClientRect
GetMenuItemInfoW
DrawTextW
DdeFreeStringHandle
SetScrollPos
CallNextHookEx
DdeFreeDataHandle
IsClipboardFormatAvailable
CharUpperA
LoadImageW
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
GetWindowTextW
EnumClipboardFormats
LoadImageA
GetWindowTextLengthW
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
GetKeyState
DdeQueryStringA
PtInRect
GetMessageA
GetParent
UpdateWindow
SetPropA
DdeCmpStringHandles
EqualRect
EnumWindows
DefMDIChildProcA
GetMessageW
ShowWindow
SetClassLongA
GetPropA
GetMenuState
PeekMessageW
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
CharUpperW
DdeQueryConvInfo
PeekMessageA
ChildWindowFromPoint
GetClipboardData
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
ActivateKeyboardLayout
RegisterClassW
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
SetParent
SetClipboardData
GetSystemMetrics
IsZoomed
GetWindowPlacement
LoadStringW
DdeConnect
GetKeyboardLayoutList
DrawMenuBar
CharLowerA
IsWindow
IsIconic
RegisterClassA
GetMenuItemCount
GetWindowLongA
SetTimer
DdeClientTransaction
OemToCharA
DdeUnaccessData
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
WaitForInputIdle
GetSysColorBrush
IsWindowUnicode
DdeNameService
CreateWindowExW
GetWindowLongW
GetMenuStringW
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
DrawEdge
SetCapture
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
MapVirtualKeyW
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
MapWindowPoints
RegisterDeviceNotificationA
SetWindowLongW
SetScrollRange
GetMenuItemInfoA
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
CharLowerW
SetWindowLongA
PostMessageW
GetKeyNameTextW
DrawTextExW
RemovePropA
SetWindowTextA
CheckMenuItem
ChildWindowFromPointEx
GetSubMenu
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateWindowExA
GetDlgItem
CharLowerBuffW
BringWindowToTop
ScreenToClient
GetClassLongA
DdePostAdvise
InsertMenuA
FindWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
DdeUninitialize
AttachThreadInput
ValidateRect
SetWindowsHookExW
GetSystemMenu
GetMenuItemID
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
OpenClipboard
EmptyClipboard
DrawTextA
IntersectRect
GetScrollInfo
GetKeyboardLayout
CreateIcon
GetCapture
WaitMessage
FindWindowA
MessageBeep
DrawTextExA
RemoveMenu
GetWindowThreadProcessId
DdeCreateDataHandle
ShowScrollBar
MessageBoxW
GetMenu
DestroyIcon
DrawFrameControl
UnhookWindowsHookEx
SendMessageCallbackA
DdeSetUserHandle
SetRectEmpty
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
wvsprintfA
LoadKeyboardLayoutA
GetSysColor
DispatchMessageW
SetScrollInfo
RegisterClassExA
SystemParametersInfoA
EnableMenuItem
GetKeyNameTextA
IsWindowVisible
GetDesktopWindow
CharToOemA
GetDCEx
WinHelpA
GetLastInputInfo
GetDC
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
SendMessageTimeoutA
CallWindowProcW
GetClassNameW
CharLowerBuffA
GetClassInfoW
IsRectEmpty
GetCursor
GetFocus
CreateMenu
CloseClipboard
DdeGetLastError
GetKeyboardType
SetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
FindCloseUrlCache
InternetQueryOptionA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
timeEndPeriod
__WSAFDIsSet
htons
socket
bind
setsockopt
recvfrom
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
select
shutdown
sendto
closesocket
ioctlsocket
recv
WSAGetLastError
connect
PE exports
Number of PE resources by type
RT_BITMAP 91
RT_STRING 48
TXT 32
RT_CURSOR 29
RT_GROUP_CURSOR 28
RT_RCDATA 23
RT_ICON 6
EXEFILE 5
MAD 2
RT_DIALOG 1
RT_MANIFEST 1
RT_GROUP_ICON 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 194
ENGLISH US 34
GERMAN 23
FRENCH 10
PORTUGUESE 2
SPANISH MODERN 2
POLISH DEFAULT 1
RUSSIAN 1
ITALIAN 1
PE resources
ExifTool file metadata
LegalTrademarks
PrivaZer

SubsystemVersion
4.0

Comments
All rights reserved

InitializedDataSize
8654336

ImageVersion
0.0

ProductName
PrivaZer

FileVersionNumber
3.0.55.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileTypeExtension
exe

OriginalFileName
privaZer

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.0.55.0

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.0

FileDescription
PrivaZer

OSVersion
4.0

FileOS
Win32

LegalCopyright
Goversoft

MachineType
Intel 386 or later, and compatibles

CompanyName
Goversoft LLC

CodeSize
6642688

FileSubtype
0

ProductVersionNumber
3.0.55.0

EntryPoint
0x653e80

ObjectFileType
Executable application

PE resource-wise parents
File identification
MD5 cbe9e56fba6c6b70f8a9c0d69ce87727
SHA1 8039f32048f1fe0cfcd95c628af1cdb78b2feec4
SHA256 20da2721f3421615caf9da83f703916f0192edacb7fbc748c34a4dad304ee6d9
ssdeep
393216:645fGAzkbEvlVpZYdFSbFmptPmrFN5c6W8UChyxKhLfGH:KAVpNIKhbGH

authentihash 2468e5bdad1db004646f7b6960c6ed07de46e84e62aaf4b45983015e23a2f58a
imphash 3b64aac02866f7bcd568e238e3595193
File size 14.6 MB ( 15304408 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (77.3%)
Win32 Executable (generic) (8.0%)
Win16/32 Executable Delphi generic (3.7%)
OS/2 Executable (generic) (3.6%)
Generic Win/DOS Executable (3.5%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-10-14 09:24:11 UTC ( 7 months, 1 week ago )
Last submission 2018-11-25 18:57:41 UTC ( 5 months, 3 weeks ago )
File names privazer.exe
PrivaZer3055.exe
privazer.exe
privazer.exe
PrivaZer.exe
PrivaZer.exe
privaZer
PrivaZer.exe
PrivaZer.exe
PrivaZer.exe
PrivaZer.exe
privazer.exe
PrivaZer.exe
privazer.exe
privazer.exe
PrivaZer (1).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.