× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: 314b5c1f8f0aa5dae951d0f6780cbcb9543208351878489b0ffc531de29c2fc1
Nom du fichier : PrivaZer.exe
Ratio de détection : 0 / 67
Date d'analyse : 2018-04-20 19:01:26 UTC (il y a 11 mois) Voir les derniers
Antivirus Résultat Mise à jour
Ad-Aware 20180420
AegisLab 20180420
AhnLab-V3 20180420
Alibaba 20180420
ALYac 20180420
Antiy-AVL 20180418
Arcabit 20180420
Avast 20180420
Avast-Mobile 20180420
AVG 20180420
Avira (no cloud) 20180420
AVware 20180420
Babable 20180406
Baidu 20180419
BitDefender 20180420
Bkav 20180410
CAT-QuickHeal 20180419
ClamAV 20180420
CMC 20180420
Comodo 20180420
CrowdStrike Falcon (ML) 20180418
Cybereason 20180225
Cylance 20180420
Cyren 20180420
DrWeb 20180420
eGambit 20180420
Emsisoft 20180420
Endgame 20180403
ESET-NOD32 20180420
F-Prot 20180420
F-Secure 20180420
Fortinet 20180420
GData 20180420
Ikarus 20180420
Sophos ML 20180121
Jiangmin 20180420
K7AntiVirus 20180420
K7GW 20180420
Kaspersky 20180420
Kingsoft 20180420
Malwarebytes 20180420
MAX 20180420
McAfee 20180420
McAfee-GW-Edition 20180420
Microsoft 20180420
eScan 20180420
NANO-Antivirus 20180420
nProtect 20180420
Palo Alto Networks (Known Signatures) 20180420
Panda 20180419
Qihoo-360 20180420
Rising 20180420
SentinelOne (Static ML) 20180225
Sophos AV 20180420
SUPERAntiSpyware 20180420
Symantec 20180420
Symantec Mobile Insight 20180419
Tencent 20180420
TheHacker 20180415
TrendMicro 20180420
TrendMicro-HouseCall 20180420
Trustlook 20180420
VBA32 20180420
VIPRE 20180420
ViRobot 20180420
Webroot 20180420
Yandex 20180420
Zillya 20180420
ZoneAlarm by Check Point 20180420
Zoner 20180419
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Goversoft

Product PrivaZer
Original name privaZer
File version 3.0.45.0
Description PrivaZer
Comments All rights reserved
Signature verification Signed file, verified signature
Signing date 2:01 PM 4/12/2018
Signers
[+] Goversoft LLC
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 12:00 AM 01/30/2018
Valid to 11:59 PM 01/29/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 3EABACF7C482E39C6B528DFD7FCE04EA1C40C80D
Serial number 00 CD 80 2F 7B B8 E4 3E 4C E2 97 15 2E A3 BF 92 F6
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 11:00 PM 05/08/2013
Valid to 10:59 PM 05/08/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 12:00 AM 01/19/2010
Valid to 11:59 PM 01/18/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 11:00 PM 10/17/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00675D60
Number of sections 9
PE sections
Overlays
MD5 cd8c2662ab5e67b740942be23b236a4d
File type data
Offset 15398912
Size 6360
Entropy 7.40
PE imports
ConvertSidToStringSidA
SHGetFolderPathA
RegDeleteKeyA
RegCreateKeyExW
LookupPrivilegeValueA
RegCloseKey
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
LookupAccountSidA
RegCreateKeyExA
RegQueryValueExW
SetSecurityDescriptorDacl
LookupAccountNameA
RegFlushKey
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
LookupPrivilegeDisplayNameA
RegEnumKeyA
RegDeleteValueA
GetTokenInformation
GetUserNameA
GetUserNameW
RegOpenKeyExA
LookupPrivilegeNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueW
RegSetValueExW
FreeSid
ChangeServiceConfigA
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
StartServiceA
RegEnumValueA
CloseServiceHandle
OpenSCManagerA
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
InitCommonControls
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
PrintDlgA
GetOpenFileNameA
GetSaveFileNameW
GetSaveFileNameA
GetOpenFileNameW
SetMapMode
GetWindowOrgEx
ResizePalette
GetTextMetricsA
CombineRgn
GetViewportOrgEx
GetTextExtentPointA
SetPixel
EndDoc
SetPaletteEntries
StretchDIBits
CopyEnhMetaFileA
OffsetWindowOrgEx
CreateEllipticRgn
CreatePalette
CreateDIBitmap
GetDIBits
GetEnhMetaFileBits
GetDCOrgEx
StretchBlt
GetTextFaceA
GetPaletteEntries
SetBkColor
SetWinMetaFileBits
GetDIBColorTable
DeleteEnhMetaFile
TextOutW
GetSystemPaletteEntries
SetStretchBltMode
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
BitBlt
GetDeviceCaps
CreateFontA
CreateBrushIndirect
SelectPalette
CreateEnhMetaFileA
CloseEnhMetaFile
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
DeleteObject
CreatePenIndirect
PatBlt
CreatePen
GetClipBox
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetEnhMetaFileDescriptionA
StartPage
RealizePalette
SetEnhMetaFileBits
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
SetWindowOrgEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
MaskBlt
GetEnhMetaFilePaletteEntries
RestoreDC
GetBitmapBits
CreateDIBSection
SetTextColor
MoveToEx
SetViewportOrgEx
ExtTextOutW
CreateCompatibleDC
SetBrushOrgEx
CreateRectRgn
SelectObject
StartDocA
CreateCompatibleBitmap
CreateSolidBrush
Polyline
StartDocW
Ellipse
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
GetComputerNameA
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
FindFirstFileW
DebugBreak
GetFileAttributesW
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
GetSystemTime
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
OpenFileMappingA
SetErrorMode
GetLogicalDrives
GetThreadContext
GetLocaleInfoW
GetFullPathNameA
GetFileTime
GetTempPathA
WideCharToMultiByte
QueryDosDeviceA
InterlockedExchange
WriteFile
GetTimeZoneInformation
GetCommandLineA
GlobalMemoryStatusEx
GetDiskFreeSpaceA
GetThreadPriority
SetFileAttributesA
SetEvent
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
MoveFileW
SetFileAttributesW
GetStringTypeExA
SetLastError
ConnectNamedPipe
VerLanguageNameA
DeviceIoControl
GetEnvironmentVariableA
CopyFileW
WriteProcessMemory
RemoveDirectoryW
Beep
GlobalFindAtomA
ExitProcess
GetSystemDefaultLCID
GetModuleFileNameA
GetStringTypeExW
LoadLibraryA
QueryPerformanceFrequency
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
GetPrivateProfileStringA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
FormatMessageA
CreateRemoteThread
CreateMutexA
GetModuleHandleA
GlobalMemoryStatus
CreateSemaphoreA
CreateThread
GetSystemDirectoryW
DisconnectNamedPipe
GetExitCodeThread
SetNamedPipeHandleState
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ExitThread
MoveFileExA
SetPriorityClass
SetThreadContext
WaitForMultipleObjectsEx
TerminateProcess
FindCloseChangeNotification
VirtualQuery
SearchPathA
VirtualQueryEx
FindNextChangeNotification
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
FlushFileBuffers
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
CallNamedPipeA
VirtualProtect
GetVersionExA
lstrcmpiW
DeleteFileA
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
DosDateTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetFileSize
GetUserDefaultLangID
OpenProcess
CreateDirectoryA
GetModuleHandleW
SetFileValidData
GetWindowsDirectoryA
FormatMessageW
SetThreadExecutionState
ReadProcessMemory
GetCPInfo
DeleteFileW
GetProcAddress
VirtualProtectEx
GetComputerNameW
CompareStringW
GlobalReAlloc
GetModuleFileNameW
ExpandEnvironmentStringsW
lstrcmpA
FindFirstFileA
WaitNamedPipeA
lstrcpyA
ResetEvent
GetProcessWorkingSetSize
FindNextFileA
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
CreateFileMappingW
GetProcessAffinityMask
RemoveDirectoryA
LocalSize
CreateFileW
CreateDirectoryW
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
GlobalDeleteAtom
FindFirstChangeNotificationA
GetSystemInfo
lstrlenA
GlobalFree
FindResourceW
GetProcessTimes
GetThreadLocale
GetVolumeNameForVolumeMountPointA
GlobalUnlock
GlobalAlloc
CreateNamedPipeA
lstrlenW
WinExec
CreateProcessW
FlushViewOfFile
FileTimeToLocalFileTime
SizeofResource
LocalFileTimeToFileTime
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
GetShortPathNameA
SetThreadAffinityMask
GetCurrentThread
SuspendThread
GetSystemDefaultLangID
RaiseException
CompareStringA
MapViewOfFile
SetFilePointer
GetFullPathNameW
ReadFile
PulseEvent
CloseHandle
lstrcpynA
GetPriorityClass
GetACP
GlobalLock
GetVersion
FreeResource
FindNextFileW
GetFileAttributesExW
FindResourceA
CreateProcessA
GetCurrentDirectoryW
UnmapViewOfFile
GetTempPathW
VirtualFree
CreateFileMappingA
Sleep
IsBadReadPtr
GetFileAttributesExA
GetProcessVersion
OpenEventA
VirtualAlloc
CreatePipe
WNetOpenEnumA
WNetGetUniversalNameA
WNetEnumResourceA
WNetCloseEnum
WNetGetConnectionA
MsiQueryProductStateA
RtlCompressBuffer
RtlInitUnicodeString
RtlGetCompressionWorkSpaceSize
NtCreateFile
NtClose
NtSetInformationKey
OleUninitialize
CoUninitialize
StgOpenStorageEx
IsEqualGUID
CoSetProxyBlanket
CreateStreamOnHGlobal
IsAccelerator
CoCreateGuid
StringFromCLSID
CLSIDFromString
CoGetClassObject
ProgIDFromCLSID
OleDraw
CoInitialize
OleInitialize
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CLSIDFromProgID
CoInitializeSecurity
GetHGlobalFromStream
OleSetMenuDescriptor
CoGetMalloc
CoTaskMemFree
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SysStringLen
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayUnaccessData
VariantCopyInd
VariantClear
GetActiveObject
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SafeArrayRedim
GetErrorInfo
SysFreeString
SafeArrayPutElement
VariantInit
SafeArrayGetElement
EmptyWorkingSet
SHGetFileInfoA
SHCreateShellItem
ShellExecuteExA
SHBrowseForFolderA
SHChangeNotify
SHUpdateRecycleBinIcon
ILCombine
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
RedrawWindow
RegisterClipboardFormatA
GetMessagePos
SetWindowRgn
DdeAccessData
DestroyWindow
EnableScrollBar
DrawAnimatedRects
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
DdeDisconnect
DdeCreateStringHandleA
OemToCharBuffA
DispatchMessageA
EndPaint
ScrollWindowEx
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
IsCharAlphaNumericA
GetCursorPos
ReleaseDC
DdeInitializeA
GetClassInfoA
AdjustWindowRectEx
SendMessageW
UnregisterClassA
IsDialogMessageW
SendMessageA
UnregisterClassW
GetClientRect
GetMenuItemInfoW
DrawTextW
DdeFreeStringHandle
SetScrollPos
CallNextHookEx
DdeFreeDataHandle
IsClipboardFormatAvailable
CharUpperA
LoadImageW
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
GetWindowTextW
EnumClipboardFormats
LoadImageA
GetWindowTextLengthW
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
GetKeyState
DdeQueryStringA
PtInRect
GetMessageA
GetParent
UpdateWindow
SetPropA
DdeCmpStringHandles
EqualRect
EnumWindows
DefMDIChildProcA
GetMessageW
ShowWindow
SetClassLongA
GetPropA
GetMenuState
PeekMessageW
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
CharUpperW
DdeQueryConvInfo
PeekMessageA
ChildWindowFromPoint
GetClipboardData
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
ActivateKeyboardLayout
RegisterClassW
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
SetParent
SetClipboardData
GetSystemMetrics
IsZoomed
GetWindowPlacement
LoadStringW
DdeConnect
GetKeyboardLayoutList
DrawMenuBar
CharLowerA
IsWindow
IsIconic
RegisterClassA
GetMenuItemCount
GetWindowLongA
SetTimer
DdeClientTransaction
OemToCharA
DdeUnaccessData
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
WaitForInputIdle
GetSysColorBrush
IsWindowUnicode
DdeNameService
CreateWindowExW
GetWindowLongW
GetMenuStringW
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
DrawEdge
SetCapture
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
MapVirtualKeyW
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
MapWindowPoints
RegisterDeviceNotificationA
SetWindowLongW
SetScrollRange
GetMenuItemInfoA
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
CharLowerW
SetWindowLongA
PostMessageW
GetKeyNameTextW
DrawTextExW
RemovePropA
SetWindowTextA
CheckMenuItem
ChildWindowFromPointEx
GetSubMenu
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateWindowExA
GetDlgItem
CharLowerBuffW
BringWindowToTop
ScreenToClient
GetClassLongA
DdePostAdvise
InsertMenuA
FindWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
DdeUninitialize
AttachThreadInput
ValidateRect
SetWindowsHookExW
GetSystemMenu
GetMenuItemID
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
OpenClipboard
EmptyClipboard
DrawTextA
IntersectRect
GetScrollInfo
GetKeyboardLayout
CreateIcon
GetCapture
WaitMessage
FindWindowA
MessageBeep
DrawTextExA
RemoveMenu
GetWindowThreadProcessId
DdeCreateDataHandle
ShowScrollBar
MessageBoxW
GetMenu
DestroyIcon
DrawFrameControl
UnhookWindowsHookEx
SendMessageCallbackA
DdeSetUserHandle
SetRectEmpty
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
wvsprintfA
LoadKeyboardLayoutA
GetSysColor
DispatchMessageW
SetScrollInfo
RegisterClassExA
SystemParametersInfoA
EnableMenuItem
GetKeyNameTextA
IsWindowVisible
GetDesktopWindow
CharToOemA
GetDCEx
WinHelpA
GetLastInputInfo
GetDC
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
SendMessageTimeoutA
CallWindowProcW
GetClassNameW
CharLowerBuffA
GetClassInfoW
IsRectEmpty
GetCursor
GetFocus
CreateMenu
CloseClipboard
DdeGetLastError
GetKeyboardType
SetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
FindCloseUrlCache
InternetQueryOptionA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
timeEndPeriod
__WSAFDIsSet
htons
socket
bind
setsockopt
recvfrom
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
select
shutdown
sendto
closesocket
ioctlsocket
recv
WSAGetLastError
connect
PE exports
Number of PE resources by type
RT_BITMAP 91
RT_STRING 48
TXT 32
RT_CURSOR 29
RT_GROUP_CURSOR 28
RT_RCDATA 23
RT_ICON 6
EXEFILE 5
MAD 2
RT_DIALOG 1
RT_MANIFEST 1
RT_GROUP_ICON 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 194
ENGLISH US 34
GERMAN 23
FRENCH 10
PORTUGUESE 2
SPANISH MODERN 2
POLISH DEFAULT 1
RUSSIAN 1
ITALIAN 1
PE resources
ExifTool file metadata
LegalTrademarks
PrivaZer

SubsystemVersion
4.0

Comments
All rights reserved

InitializedDataSize
8615936

ImageVersion
0.0

ProductName
PrivaZer

FileVersionNumber
3.0.45.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileTypeExtension
exe

OriginalFileName
privaZer

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.0.45.0

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.0

FileDescription
PrivaZer

OSVersion
4.0

FileOS
Win32

LegalCopyright
Goversoft

MachineType
Intel 386 or later, and compatibles

CompanyName
Goversoft LLC

CodeSize
6781952

FileSubtype
0

ProductVersionNumber
3.0.45.0

EntryPoint
0x675d60

ObjectFileType
Executable application

PE resource-wise parents
File identification
MD5 5313eca07f820fdf6ce2ea243de37190
SHA1 ff7dc2d0a67c9cbe7ac643a586f0b4921a937434
SHA256 314b5c1f8f0aa5dae951d0f6780cbcb9543208351878489b0ffc531de29c2fc1
ssdeep
393216:bqbLDlH9cClczaBzFc2mABkufPaQVXNpbXOuMUhbtRXc6ul2n:0lIW/jXg2n

authentihash b9b35ceb8f1d3ace696af73706481286f97b315bfdc6f8dd967551b2fbe78620
imphash 3b64aac02866f7bcd568e238e3595193
File size 14.7 MB ( 15405272 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (77.3%)
Win32 Executable (generic) (8.0%)
Win16/32 Executable Delphi generic (3.7%)
OS/2 Executable (generic) (3.6%)
Generic Win/DOS Executable (3.5%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-04-12 13:24:16 UTC (il y a 11 mois, 1 semaine)
Last submission 2018-07-09 10:20:42 UTC (il y a 8 mois, 1 semaine)
Noms du fichier PrivaZer_v3.0.45.exe
privazer.exe
privazer.exe
privazer (3).exe
PrivaZer.exe
privaZer
314B5C1F8F0AA5DAE951D0F6780CBCB9543208351878489B0FFC531DE29C2FC1.exe
PrivaZer.exe
PrivaZer.exe
PrivaZer.exe
PrivaZer portable.exe
privazer.exe
privazer.exe
privazer.exe
PrivaZer.exe
PrivaZer.exe
PrivaZer.exe
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.