Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1376168
MD5:27b6f3b8e8bdce591e5164edba28584d
SHA1:3a150c9db17a94feddec8268073336d030b97dad
SHA256:46d06d06984466e0e8082f8bba8d274c37145ec71f26da0904dd93ea2e7f3087
Tags:exe
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries keyboard layouts
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • file.exe (PID: 6516 cmdline: C:\Users\user\Desktop\file.exe MD5: 27B6F3B8E8BDCE591E5164EDBA28584D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1989063116.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      0.0.file.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: file.exeStatic PE information: certificate valid
        Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0K
        Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
        Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
        Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
        Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
        Source: file.exeString found in binary or memory: http://epscd.catcert.net/crl/ec-acc.crl0.
        Source: file.exeString found in binary or memory: http://epscd2.catcert.net/crl/ec-acc.crl0
        Source: file.exeString found in binary or memory: http://madExcept.comU
        Source: file.exeString found in binary or memory: http://ocsp.catcert.cat0
        Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
        Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: file.exeString found in binary or memory: http://ocsp.digicert.com0I
        Source: file.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
        Source: file.exeString found in binary or memory: http://www.catcert.cat/descarrega/acc.crt0#
        Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
        Source: file.exeString found in binary or memory: https://stats.reportcpanel.com/iusage_v2.php
        Source: file.exeString found in binary or memory: https://www.catcert.cat/verCIT-10
        Source: file.exeString found in binary or memory: https://www.catcert.net/verarrel
        Source: file.exeString found in binary or memory: https://www.itopvpn.com/ied-surveryf
        Source: file.exeStatic PE information: Number of sections : 11 > 10
        Source: file.exe, 00000000.00000000.1989063116.0000000000447000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs file.exe
        Source: file.exe, 00000000.00000000.1989063116.0000000000447000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: LegalTrademarks OriginalFileName vs file.exe
        Source: file.exe, 00000000.00000000.1989407994.0000000000769000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIEDSurvey.exeF vs file.exe
        Source: file.exeBinary or memory string: OriginalFileName vs file.exe
        Source: file.exeBinary or memory string: LegalTrademarks OriginalFileName vs file.exe
        Source: file.exeBinary or memory string: OriginalFilenameIEDSurvey.exeF vs file.exe
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: sus23.winEXE@1/0@0/0
        Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1974
        Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\DPMHelper
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\file.madExceptJump to behavior
        Source: Yara matchFile source: file.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.file.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1989063116.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: file.exeString found in binary or memory: 250-STARTTLS
        Source: file.exeStatic PE information: certificate valid
        Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: file.exeStatic file information: File size 3955760 > 1048576
        Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x305a00
        Source: file.exeStatic PE information: More than 200 imports for user32.dll
        Source: file.exeStatic PE information: More than 200 imports for kernel32.dll
        Source: file.exeStatic PE information: section name: .didata

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 57B484 value: E9 F3 D3 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 57AE58 value: E9 0B D8 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 56DE98 value: E9 5F F8 12 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 56DEBC value: E9 BF F8 12 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 56DECC value: E9 37 FA 12 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 575FC0 value: E9 0B 7B 12 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 60C8CC value: E9 73 1A 0B 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 664260 value: E9 DB 9B 04 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59C1B8 value: E9 AF 62 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59C084 value: E9 9B 60 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59BFF4 value: E9 03 60 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59DA54 value: E9 EF 44 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59F7A4 value: E9 CB DB 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59F694 value: E9 77 DE 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59CB8C value: E9 FF 65 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59BA0C value: E9 3B 27 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59BAD0 value: E9 CF 24 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59BF10 value: E9 4F 1F 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59BF30 value: E9 B3 1F 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59E838 value: E9 F7 F9 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59E93C value: E9 13 FC 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59E558 value: E9 07 FE 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59E8F8 value: E9 3B FB 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 5A3914 value: E9 03 BD 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 5A3A00 value: E9 B7 BA 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59EC20 value: E9 C7 F6 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59B7B8 value: E9 D3 7B 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 65D2E4 value: E9 DB 14 05 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 59A9A8 value: E9 73 3F 11 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory written: PID: 6516 base: 5A2470 value: E9 B3 C4 10 00 Jump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: file.exeBinary or memory string: Shell_TrayWndUser32GetDpiForWindow
        Source: file.exeBinary or memory string: Progman
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
        Valid Accounts2
        Command and Scripting Interpreter
        Path Interception1
        Process Injection
        1
        Process Injection
        1
        Credential API Hooking
        2
        Process Discovery
        Remote Services1
        Credential API Hooking
        Exfiltration Over Other Network MediumData ObfuscationExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 process2 2 Behavior Graph ID: 1376168 Sample: file.exe Startdate: 17/01/2024 Architecture: WINDOWS Score: 23 4 file.exe 2 2->4         started        signatures3 7 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 4->7

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://www.catcert.net/verarrel0%URL Reputationsafe
        https://stats.reportcpanel.com/iusage_v2.php0%Avira URL Cloudsafe
        https://www.itopvpn.com/ied-surveryf0%Avira URL Cloudsafe
        https://www.catcert.cat/verCIT-100%Avira URL Cloudsafe
        http://epscd2.catcert.net/crl/ec-acc.crl00%Avira URL Cloudsafe
        http://madExcept.comU0%Avira URL Cloudsafe
        http://ocsp.catcert.cat00%Avira URL Cloudsafe
        http://www.catcert.cat/descarrega/acc.crt0#0%Avira URL Cloudsafe
        http://epscd.catcert.net/crl/ec-acc.crl0.0%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.catcert.cat/descarrega/acc.crt0#file.exefalse
        • Avira URL Cloud: safe
        unknown
        https://stats.reportcpanel.com/iusage_v2.phpfile.exefalse
        • Avira URL Cloud: safe
        unknown
        https://www.itopvpn.com/ied-surveryffile.exefalse
        • Avira URL Cloud: safe
        unknown
        http://ocsp.catcert.cat0file.exefalse
        • Avira URL Cloud: safe
        unknown
        https://www.catcert.net/verarrelfile.exefalse
        • URL Reputation: safe
        unknown
        http://epscd.catcert.net/crl/ec-acc.crl0.file.exefalse
        • Avira URL Cloud: safe
        unknown
        https://www.catcert.cat/verCIT-10file.exefalse
        • Avira URL Cloud: safe
        unknown
        http://epscd2.catcert.net/crl/ec-acc.crl0file.exefalse
        • Avira URL Cloud: safe
        unknown
        http://madExcept.comUfile.exefalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/soap/envelope/file.exefalse
          high
          No contacted IP infos
          Joe Sandbox version:38.0.0 Ammolite
          Analysis ID:1376168
          Start date and time:2024-01-17 16:58:06 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 15s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:2
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:file.exe
          Detection:SUS
          Classification:sus23.winEXE@1/0@0/0
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Execution Graph export aborted for target file.exe, PID 6516 because there are no executed function
          • VT rate limit hit for: file.exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.770270000311977
          TrID:
          • Win32 Executable (generic) a (10002005/4) 98.45%
          • Inno Setup installer (109748/4) 1.08%
          • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
          • Win16/32 Executable Delphi generic (2074/23) 0.02%
          • Generic Win/DOS Executable (2004/3) 0.02%
          File name:file.exe
          File size:3'955'760 bytes
          MD5:27b6f3b8e8bdce591e5164edba28584d
          SHA1:3a150c9db17a94feddec8268073336d030b97dad
          SHA256:46d06d06984466e0e8082f8bba8d274c37145ec71f26da0904dd93ea2e7f3087
          SHA512:f91aea8e4dc987703926fef287178fc680d450597ad524ea0ca44255c7e3e7127c5dce8362be2f241d7a7aace2b7760467bdfc6117ce467d2bc1459045bb842f
          SSDEEP:49152:QDdgK6jyazbFza8IBn2cpi7cSgWVh07Z2GBc024xF6QKRTTzLAUd+JOugbW:+OK62azbMB2kZ2rUF6QKR3Vd+JAb
          TLSH:04066C23F345A43BD0671A3A987793A0983FBB316956AC577EF41C4C4F39A81293B607
          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
          Icon Hash:4dececfccccccc01
          Entrypoint:0x708e4c
          Entrypoint Section:.itext
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          DLL Characteristics:
          Time Stamp:0x653882A1 [Wed Oct 25 02:51:13 2023 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:d616587ce45db3428d976ab19d1f3438
          Signature Valid:true
          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
          Signature Validation Error:The operation completed successfully
          Error Number:0
          Not Before, Not After
          • 25/10/2023 02:00:00 27/10/2026 00:59:59
          Subject Chain
          • CN=ORANGE VIEW LIMITED, O=ORANGE VIEW LIMITED, L=Kowloon, C=HK, SERIALNUMBER=2770852, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=HK
          Version:3
          Thumbprint MD5:6BEDBA3AAEEB1A50C5025F4F56DC18F3
          Thumbprint SHA-1:354338515A6E3E631093C2F922405132FA9A2DBB
          Thumbprint SHA-256:38C85F29040D4C184D4E4F6D3126496F15A5E5F196433C10E99E21563CDADFCB
          Serial:0A249111115AEF70A2800BAA9217EF6D
          Instruction
          push ebp
          mov ebp, esp
          mov ecx, 00000005h
          push 00000000h
          push 00000000h
          dec ecx
          jne 00007F4170DCA5BBh
          push ebx
          mov eax, 006FF49Ch
          call 00007F4170AD0467h
          xor eax, eax
          push ebp
          push 00709005h
          push dword ptr fs:[eax]
          mov dword ptr fs:[eax], esp
          push 00709014h
          push FFFFFFFFh
          push 00000000h
          call 00007F4170AD4277h
          mov ebx, eax
          lea edx, dword ptr [ebp-28h]
          xor eax, eax
          call 00007F4170AC803Fh
          mov eax, dword ptr [ebp-28h]
          lea edx, dword ptr [ebp-24h]
          call 00007F4170B13DA0h
          lea eax, dword ptr [ebp-24h]
          mov edx, 00709034h
          call 00007F4170ACC4EFh
          mov eax, dword ptr [ebp-24h]
          xor edx, edx
          call 00007F4170D971C1h
          test al, al
          je 00007F4170DCA5CCh
          mov eax, 006E4EF4h
          call 00007F4170D9768Bh
          call 00007F4170DC0866h
          test al, al
          jne 00007F4170DCA6E5h
          call 00007F4170AD44ADh
          cmp eax, 000000B7h
          je 00007F4170DCA6CFh
          lea eax, dword ptr [ebp-14h]
          mov edx, 00709070h
          call 00007F4170ACB765h
          lea edx, dword ptr [ebp-18h]
          mov eax, 00000001h
          call 00007F4170AC7FD8h
          mov eax, dword ptr [ebp-14h]
          cmp eax, dword ptr [ebp-18h]
          jne 00007F4170DCA5C6h
          mov al, 01h
          jmp 00007F4170DCA5E2h
          cmp dword ptr [ebp-14h], 00000000h
          je 00007F4170DCA5C8h
          cmp dword ptr [ebp-18h], 00000000h
          jne 00007F4170DCA5C6h
          xor eax, eax
          jmp 00007F4170DCA5D2h
          mov edx, dword ptr [ebp-18h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x3660000x50.edata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x3600000x4488.idata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a50000x69410.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x3c0e000x4e30.rsrc
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3690000x3ba34.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x3680000x18.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x360bb40xa9c.idata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3650000x944.didata
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x3058340x305a00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .itext0x3070000x209c0x2200False0.5314797794117647data6.211533774923295IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .data0x30a0000xe6ac0xe800False0.5351730872844828data6.19157612897437IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .bss0x3190000x46a540x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .idata0x3600000x44880x4600False0.30362723214285714PDP-11 overlaid pure executable5.20156645904221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .didata0x3650000x9440xa00False0.351171875data4.069790185331062IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .edata0x3660000x500x200False0.13671875data0.8942524260212368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .tls0x3670000x65c0x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rdata0x3680000x180x200False0.0546875data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x3690000x3ba340x3bc00False0.5838250196129707data6.735654485203693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .rsrc0x3a50000x694100x69600False0.5443866770462633data7.126317927760289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          MAD0x3a63a40x14data1.25
          MAD0x3a63b80x286b4data1.000368455386697
          RT_CURSOR0x3cea6c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
          RT_CURSOR0x3ceba00x134dataEnglishUnited States0.4642857142857143
          RT_CURSOR0x3cecd40x134dataEnglishUnited States0.4805194805194805
          RT_CURSOR0x3cee080x134dataEnglishUnited States0.38311688311688313
          RT_CURSOR0x3cef3c0x134dataEnglishUnited States0.36038961038961037
          RT_CURSOR0x3cf0700x134dataEnglishUnited States0.4090909090909091
          RT_CURSOR0x3cf1a40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
          RT_BITMAP0x3cf2d80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
          RT_BITMAP0x3cf4a80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
          RT_BITMAP0x3cf68c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
          RT_BITMAP0x3cf85c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
          RT_BITMAP0x3cfa2c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
          RT_BITMAP0x3cfbfc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
          RT_BITMAP0x3cfdcc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
          RT_BITMAP0x3cff9c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
          RT_BITMAP0x3d016c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
          RT_BITMAP0x3d033c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
          RT_BITMAP0x3d050c0x1028Device independent bitmap graphic, 32 x 32 x 32, image size 40960.41392649903288203
          RT_BITMAP0x3d15340x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.2161654135338346
          RT_BITMAP0x3d195c0x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.5018796992481203
          RT_BITMAP0x3d1d840x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.3167293233082707
          RT_BITMAP0x3d21ac0x1028Device independent bitmap graphic, 32 x 32 x 32, image size 40960.5548839458413927
          RT_BITMAP0x3d31d40x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.5582706766917294
          RT_BITMAP0x3d35fc0x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.48402255639097747
          RT_BITMAP0x3d3a240x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.5469924812030075
          RT_BITMAP0x3d3e4c0x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.4906015037593985
          RT_BITMAP0x3d42740x1028Device independent bitmap graphic, 32 x 32 x 32, image size 40960.3034332688588008
          RT_BITMAP0x3d529c0x428Device independent bitmap graphic, 16 x 16 x 32, image size 10240.48872180451127817
          RT_ICON0x3d56c40x2774PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9957425742574257
          RT_ICON0x3d7e380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.11229740920383297
          RT_ICON0x3e86600x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.1606842547824259
          RT_ICON0x3f1b080x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.21104436229205176
          RT_ICON0x3f6f900x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.2375413320736892
          RT_ICON0x3fb1b80x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 14880EnglishUnited States0.26005361930294907
          RT_ICON0x3fec000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3196058091286307
          RT_ICON0x4011a80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.36863905325443785
          RT_ICON0x402c100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4892120075046904
          RT_ICON0x403cb80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6012295081967213
          RT_ICON0x4046400x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.6813953488372093
          RT_ICON0x404cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5416666666666666
          RT_STRING0x4051600x3fcdata0.40588235294117647
          RT_STRING0x40555c0xb5cdata0.24793672627235214
          RT_STRING0x4060b80x448data0.36496350364963503
          RT_STRING0x4065000x38cdata0.31167400881057267
          RT_STRING0x40688c0x3ccdata0.4434156378600823
          RT_STRING0x406c580x324data0.44402985074626866
          RT_STRING0x406f7c0xacdata0.7209302325581395
          RT_STRING0x4070280xecdata0.6398305084745762
          RT_STRING0x4071140x198data0.5294117647058824
          RT_STRING0x4072ac0x3e8data0.38
          RT_STRING0x4076940x3f0data0.3888888888888889
          RT_STRING0x407a840x4f0data0.30063291139240506
          RT_STRING0x407f740x2acdata0.3654970760233918
          RT_STRING0x4082200x408data0.39825581395348836
          RT_STRING0x4086280x680data0.3251201923076923
          RT_STRING0x408ca80x4b4data0.3089700996677741
          RT_STRING0x40915c0x300data0.40625
          RT_STRING0x40945c0x36cdata0.363013698630137
          RT_STRING0x4097c80x3e0data0.40524193548387094
          RT_STRING0x409ba80x290data0.4024390243902439
          RT_STRING0x409e380xc0data0.625
          RT_STRING0x409ef80x9cdata0.6282051282051282
          RT_STRING0x409f940x338data0.4368932038834951
          RT_STRING0x40a2cc0x48cdata0.2920962199312715
          RT_STRING0x40a7580x354data0.4107981220657277
          RT_STRING0x40aaac0x2c4data0.4392655367231638
          RT_RCDATA0x40ad700x10data1.5
          RT_RCDATA0x40ad800x8fcdata0.5543478260869565
          RT_RCDATA0x40b67c0x2dataEnglishUnited States5.0
          RT_RCDATA0x40b6800xb65Delphi compiled form 'TMadExcept'0.46726088447034625
          RT_RCDATA0x40c1e80x34eDelphi compiled form 'TMEContactForm'0.43498817966903075
          RT_RCDATA0x40c5380x22dDelphi compiled form 'TMEDetailsForm'0.5457809694793537
          RT_RCDATA0x40c7680x2a3Delphi compiled form 'TMEScrShotForm'0.5333333333333333
          RT_RCDATA0x40ca0c0xe2aDelphi compiled form 'TSurveyForm'0.3808604522890237
          RT_GROUP_CURSOR0x40d8380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
          RT_GROUP_CURSOR0x40d84c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
          RT_GROUP_CURSOR0x40d8600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x40d8740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x40d8880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x40d89c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_CURSOR0x40d8b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
          RT_GROUP_ICON0x40d8c40xaedataEnglishUnited States0.7126436781609196
          RT_VERSION0x40d9740x2f8dataEnglishUnited States0.45921052631578946
          RT_MANIFEST0x40dc6c0x7a2XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3556806550665302
          DLLImport
          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit, GetErrorInfo
          advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, SetSecurityDescriptorDacl, RegUnLoadKeyW, RegSetValueExA, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExA, RegQueryInfoKeyA, RegQueryInfoKeyW, RegOpenKeyExA, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyA, RegEnumKeyExW, RegDeleteValueA, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExA, RegCreateKeyExW, RegConnectRegistryW, OpenProcessToken, InitializeSecurityDescriptor, GetUserNameA, GetUserNameW, GetTokenInformation, FreeSid, AllocateAndInitializeSid
          user32.dllMessageBoxA, CharNextW, LoadStringW, SetClassLongW, GetClassLongW, SetWindowLongW, GetWindowLongW, CreateWindowExA, CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateLayeredWindow, UpdateWindow, UnregisterClassA, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextA, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageTimeoutA, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassA, RegisterClassW, RedrawWindow, PtInRect, PostThreadMessageA, PostThreadMessageW, PostQuitMessage, PostMessageA, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadKeyboardLayoutW, LoadImageA, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMessageA, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowA, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextA, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharUpperW, CharLowerBuffW, CharLowerW, CallWindowProcA, CallWindowProcW, CallNextHookEx, BringWindowToTop, BeginPaint, AttachThreadInput, AdjustWindowRectEx, ActivateKeyboardLayout, EnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow, GetWindowRgnBox
          kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, lstrcpynW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, SetCurrentDirectoryW, GetCurrentDirectoryW, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle, LoadLibraryA, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, lstrcmpiW, lstrcmpA, lstrcmpW, WriteProcessMemory, WritePrivateProfileStringW, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualProtect, UnmapViewOfFile, TryEnterCriticalSection, TerminateThread, TerminateProcess, SystemTimeToFileTime, SuspendThread, SizeofResource, SetUnhandledExceptionFilter, SetThreadPriority, SetLastError, SetFileAttributesA, SetFileAttributesW, SetEvent, SetErrorMode, ResumeThread, ResetEvent, RemoveDirectoryA, RemoveDirectoryW, ReleaseMutex, ReadProcessMemory, QueryPerformanceFrequency, QueryDosDeviceW, IsDebuggerPresent, OutputDebugStringW, OpenProcess, OpenFileMappingA, OpenFileMappingW, MulDiv, MoveFileW, MapViewOfFile, LockResource, LocalSize, LoadResource, LoadLibraryExA, LoadLibraryW, IsBadReadPtr, IsBadCodePtr, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetWindowsDirectoryA, GetVolumeInformationW, GetVersionExA, GetVersionExW, GetThreadPriority, GetThreadLocale, GetThreadContext, GetTempPathA, GetTempPathW, GetSystemTime, GetSystemTimes, GetSystemDirectoryW, GetPrivateProfileStringW, GetPriorityClass, GetModuleHandleA, GetModuleFileNameA, GetLogicalDriveStringsW, GetLocaleInfoA, GetLocalTime, GetFullPathNameW, GetFileTime, GetFileAttributesA, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceA, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetComputerNameA, GetComputerNameW, GetCommandLineA, GetCPInfoExW, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchangeAdd, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FormatMessageA, FormatMessageW, FlushInstructionCache, FindResourceA, FindResourceW, FindNextFileA, FindNextFileW, FindFirstFileA, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsA, ExpandEnvironmentStringsW, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, DuplicateHandle, DeleteFileA, DeleteFileW, CreateProcessA, CreateProcessW, CreatePipe, CreateMutexA, CreateMutexW, CreateFileMappingA, CreateFileMappingW, CreateFileA, CreateEventA, CreateEventW, CreateDirectoryA, CreateDirectoryW, CopyFileA, CopyFileW, CompareStringA, Beep, VerSetConditionMask, VerifyVersionInfoW
          gdi32.dllUnrealizeObject, TextOutA, TextOutW, StretchDIBits, StretchBlt, StartPage, StartDocA, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixelV, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBitsToDevice, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, OffsetViewportOrgEx, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsW, GetTextFaceA, GetTextExtentPointW, GetTextExtentPoint32A, GetTextExtentPoint32W, GetTextExtentExPointW, GetTextColor, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetROP2, GetPixel, GetPaletteEntries, GetObjectType, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetCurrentObject, GetClipBox, GetBrushOrgEx, GetBkMode, GetBkColor, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgnIndirect, CreateRectRgn, CreatePenIndirect, CreatePen, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateFontA, CreateFontW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
          version.dllVerQueryValueA, VerQueryValueW, GetFileVersionInfoSizeA, GetFileVersionInfoSizeW, GetFileVersionInfoA, GetFileVersionInfoW
          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
          comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
          shell32.dllSHGetFileInfoW, ShellExecuteExA, ShellExecuteExW, ShellExecuteA, ShellExecuteW, Shell_NotifyIconW, SHGetSpecialFolderPathW, SHGetPathFromIDListA, SHGetSpecialFolderLocation, SHGetMalloc
          comdlg32.dllPrintDlgW, GetSaveFileNameA, GetSaveFileNameW
          wsock32.dllWSACleanup, WSAStartup, WSAGetLastError, gethostbyname, socket, setsockopt, sendto, send, select, recvfrom, recv, ioctlsocket, inet_addr, htons, connect, closesocket, bind
          msvcrt.dllmemset, memcpy
          winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter, GetDefaultPrinterW
          NameOrdinalAddress
          madTraceProcess10x4a7004
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found
          0246810s020406080100

          Click to jump to process

          0246810sMB

          Click to jump to process

          • File
          • Registry

          Click to dive into process behavior distribution

          Target ID:0
          Start time:16:58:51
          Start date:17/01/2024
          Path:C:\Users\user\Desktop\file.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\file.exe
          Imagebase:0x400000
          File size:3'955'760 bytes
          MD5 hash:27B6F3B8E8BDCE591E5164EDBA28584D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Borland Delphi
          Yara matches:
          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1989063116.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
          Reputation:low
          Has exited:true

          No disassembly