Submission Summary:


Technical Details:

NOTICE: The content shown in the above window is captured automatically and is not controlled or endorsed by ThreatExpert.
Please contact us on this link should any material be offensive or inappropriate and we will ensure any such content is blocked from future viewers of the report.


File System Modifications

#Filename(s)File SizeFile Hash
1 %CommonPrograms%\Resource Hacker\Resource Hacker.lnk 682 bytes MD5: 0xD230C9D10AAFB67A96C3F59AE32751CF
SHA-1: 0x29B2C943808DDE7BD26D407E7F2F28BE0E55FAFE
2 %Temp%\rh_1.tmp 0 bytes MD5: 0xD41D8CD98F00B204E9800998ECF8427E
SHA-1: 0xDA39A3EE5E6B4B0D3255BFEF95601890AFD80709
3 %ProgramFiles%\Resource Hacker\Dialogs.def 14,682 bytes MD5: 0xE0A605CCBB739C7DB39B663A0225CB82
SHA-1: 0x12D4646AE3D971F6BD2F237E4B2EC83BFFB0DDE0
4 %ProgramFiles%\Resource Hacker\ReadMe.txt 4,331 bytes MD5: 0x1DE4BEA70CFF1ECE7D0B7C36EB227B36
SHA-1: 0x2EFACB3B2E93CAC646ACC7ACB4547742DF4881AD
5 %ProgramFiles%\Resource Hacker\ResHacker.cnt 267 bytes MD5: 0xB4B650EAD5B79932E87D51F9449BFC7F
SHA-1: 0x92854E8FDB152034E148DE9175184EC71C643639
6 %ProgramFiles%\Resource Hacker\ResHacker.exe 1,021,440 bytes MD5: 0x2F92EED4E2061AF0961F379E9DED70D6
SHA-1: 0x8B58DCD428759D3633A14BCFC62A8CB6DEB66DE5
7 %ProgramFiles%\Resource Hacker\ResHacker.hlp 507,097 bytes MD5: 0x22D71707A575DB4D33A79B65E1EF48D3
SHA-1: 0x9FE473BAB8679D0F3E31B3D3C769F33F67FFD746
8 %ProgramFiles%\Resource Hacker\unins000.dat 1,755 bytes MD5: 0xB22F62E4D14AC5D932DF6FBDC5EFA438
SHA-1: 0x8675F51B55418830E1DBC079859AAC1129C2FE43
9 %ProgramFiles%\Resource Hacker\unins000.exe 721,694 bytes MD5: 0x2B83A3E9C6C725ECADD50A19E2CEF5CB
SHA-1: 0xD72A0AD0BCFBAAFD3B2342A223D61A89002DD162
10 [file and pathname of the sample #1] 748,246 bytes MD5: 0xA513EACD766673290F1204F467590B7C
SHA-1: 0xBF461D7F5978336CE52B76EC55B53A61BDC68A59


Memory Modifications

Process NameProcess FilenameMain Module Size
reshacker.exe%ProgramFiles%\resource hacker\reshacker.exe1,056,768 bytes


Registry Modifications


Other details




All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2018 ThreatExpert. All rights reserved.