Hacktool.Crack.MahjongSolitaire
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 2,049 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 18,336 |
| First Seen: | July 27, 2021 |
| Last Seen: | April 10, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Hacktool.Crack.MahjongSolitaire |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
6436443fcb8fc337410dfef6cc5a73ef
SHA1:
8e9c20303bc5fa2130c0003e6935381a5e4751ce
File Size:
3.01 MB, 3010090 bytes
|
|
MD5:
46959ec0a1aa01cb0f29158880b9eeb8
SHA1:
6c53a3d936bbc662aded7eedc5ddaefb9c56c858
SHA256:
4EFC1CE22504C3ACF922D8062D81D5EFCADE5EFBBC9D5B120A4BC00A5A54CAE3
File Size:
4.27 MB, 4272682 bytes
|
|
MD5:
72b3260f791506421b79da672294be32
SHA1:
36a06e7a3adff8402ea940c660f7f00b351037b4
SHA256:
43869E470E59BFCDFE260E8F8B1738671E6856F145F7292ED8AE36B3E86471F3
File Size:
1.59 MB, 1592320 bytes
|
|
MD5:
4262204a03037f467a29e70eec28edf7
SHA1:
705aa309dd46d62fe99d0cc5c3e7b822a49198db
SHA256:
509496C3DBB5E2F097E4E116E63A843E9307DCD77EF1B2053472A14225F69FB2
File Size:
6.64 MB, 6635520 bytes
|
|
MD5:
678b3df4ce29672de6c21c0a3c67a00e
SHA1:
17056f39afff7f9bf39330c5c2e0d516ed66a71b
SHA256:
1FE5EAFD01D2B0F3CDC29B4B85284F91C16781346F4D8525ABCF505A669C65A0
File Size:
2.24 MB, 2240853 bytes
|
Show More
|
MD5:
6e7691e197e3a95267bccefbf7efffd0
SHA1:
f6798c8b10055c1717e80cf9c374c892233bf823
SHA256:
E7D30134A9DCC6B8009CD1F26FF490E02F1E1BC82D46F21CF7EBC7632BFAF768
File Size:
868.76 KB, 868756 bytes
|
|
MD5:
bef4509fe09c3cbc76887ba6acf8a8e4
SHA1:
31fb7a4bf053754801e8e572d862f6e099a1ae41
SHA256:
D39007E980427D322A893150251696421D8241B750D5ED6CCEFB93ECF9DCD143
File Size:
2.38 MB, 2380288 bytes
|
|
MD5:
c96b74b51640b3b2d7ee9c1364c7a5cb
SHA1:
fb933dfa95d614707c94669de7e560edbbc8e862
SHA256:
8EE4ACFA4176C2E882526DA686CDA66A548C4AAB540AA6D41839C43C08DFE063
File Size:
888.99 KB, 888988 bytes
|
|
MD5:
0cd4a314645a413b491d67a71b5fad30
SHA1:
1b1af606bafe3f7fef686c35f6bd3bd5694997c9
SHA256:
B0B31894C1D53F6A7A6337DBAA023684DD2B8C05B433B3C949873D50814BD561
File Size:
2.56 MB, 2561066 bytes
|
|
MD5:
d7918a90b23521ab489ae0a077dd6e0c
SHA1:
c16a9a3c895134a124455298049f1cbc888d3a66
SHA256:
FC34298F3CE4DA79330C7D2848DADDA7D0B460058782F3B94F6EA7B0E61F385C
File Size:
1.67 MB, 1666048 bytes
|
|
MD5:
6857d4f3e9436161d35e6fcd5144ad6b
SHA1:
4aa577f81bbd0ae82c68d47f2a31c9bff9804282
SHA256:
018C0D3BA9240F3918A75A17DB22FFA80D20C16DC3F28F2A3D6F7479A98FBCE8
File Size:
344.06 KB, 344064 bytes
|
|
MD5:
01fccd0ae87f2cc9b2842d81835a6c2c
SHA1:
a2d6c83f53335bd4a181d5c004aaeb8597c5726f
SHA256:
EE9F9B8E6A663709690927E2FC5D7B36A5338B4168BCAD0E6E66973AD0459A1D
File Size:
3.45 MB, 3451130 bytes
|
|
MD5:
9dcbbba51c1931075eb3bc75a84bb0da
SHA1:
59b2046e2d9fafb549f2228cee1b4fb165bd4b83
SHA256:
6B8AA871DFC12938FFBAC5D91B1E2495106C8B5BB390AA18BA6A463CDEEE0B64
File Size:
1.27 MB, 1271266 bytes
|
|
MD5:
a2dd6bdfa65c1de172ba0b9232b8965b
SHA1:
f59816c98736d141db45ec70d524e62478cce6d1
SHA256:
D98B1D73B47120E69CFAE95F564F23E887B90D278B36C3381E49545ECC9F372B
File Size:
7.24 MB, 7242065 bytes
|
|
MD5:
78ad9842676967880f672285faa279b2
SHA1:
277634fe7397c47d012785b2ba523cf01fdb72e2
SHA256:
376309BA8B03F2362D4769916FED858D08D00215D005902B1E18663802E0E7DA
File Size:
2.14 MB, 2138453 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Build Date | 21 December 2012 10:05:40 |
| Comments |
|
| Company Website | http://www.labcenter.com |
| Company Name |
|
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
File Traits
- .adata
- 2+ executable sections
- dll
- Enigma
- HighEntropy
- imgui
- No Version Info
- ntdll
- themida
- themida section variant
Show More
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 7,527 |
|---|---|
| Potentially Malicious Blocks: | 30 |
| Whitelisted Blocks: | 3,485 |
| Unknown Blocks: | 4,012 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.FRC
- ClipBanker.J
- Ramnit.HD
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\705aa309dd46d62fe99d0cc5c3e7b822a49198db_0006635520.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\fb933dfa95d614707c94669de7e560edbbc8e862_0000888988.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\4aa577f81bbd0ae82c68d47f2a31c9bff9804282_0000344064.,LiQMAxHB
|