Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
update_390_391.exe

Overview

General Information

Sample name:update_390_391.exe
Analysis ID:1468065
MD5:c2c9b0b8b275defd42be10314f13b480
SHA1:1a268efea3cc2f56ddb154487e501550f0540696
SHA256:04ce55570cf7a827499636a577617bcdc80bfb1239f8b71caa7559a90f30b528
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Uses 32bit PE files

Classification

  • System is w10x64_ra
  • update_390_391.exe (PID: 4044 cmdline: "C:\Users\user\Desktop\update_390_391.exe" MD5: C2C9B0B8B275DEFD42BE10314F13B480)
  • update_390_391.exe (PID: 6580 cmdline: "C:\Users\user\Desktop\update_390_391.exe" MD5: C2C9B0B8B275DEFD42BE10314F13B480)
  • cleanup
SourceRuleDescriptionAuthorStrings
update_390_391.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1176732125.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      There are no malicious signatures, click here to show all signatures.

      Source: update_390_391.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: update_390_391.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: classification engineClassification label: clean0.winEXE@2/2@0/0
      Source: C:\Users\user\Desktop\update_390_391.exeFile created: C:\Users\user\Desktop\ _avk_0.0.0.txt
      Source: Yara matchFile source: update_390_391.exe, type: SAMPLE
      Source: Yara matchFile source: 00000000.00000000.1176732125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: update_390_391.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\update_390_391.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Users\user\Desktop\update_390_391.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Users\user\Desktop\update_390_391.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\update_390_391.exeFile read: C:\Users\user\Desktop\update_390_391.exe
      Source: unknownProcess created: C:\Users\user\Desktop\update_390_391.exe "C:\Users\user\Desktop\update_390_391.exe"
      Source: unknownProcess created: C:\Users\user\Desktop\update_390_391.exe "C:\Users\user\Desktop\update_390_391.exe"
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: mpr.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: version.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: textshaping.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: textinputframework.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: coreuicomponents.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: coremessaging.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: ntmarta.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: mpr.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: version.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: textshaping.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: textinputframework.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: coreuicomponents.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: coremessaging.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: ntmarta.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Desktop\update_390_391.exeWindow found: window name: TButton
      Source: update_390_391.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: update_390_391.exeStatic file information: File size 28808560 > 1048576
      Source: update_390_391.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x133800
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Information Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      update_390_391.exe0%ReversingLabs
      update_390_391.exe5%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1468065
      Start date and time:2024-07-05 09:50:44 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:15
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      Analysis Mode:stream
      Analysis stop reason:Timeout
      Sample name:update_390_391.exe
      Detection:CLEAN
      Classification:clean0.winEXE@2/2@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
      • Not all processes where analyzed, report is missing behavior information
      Process:C:\Users\user\Desktop\update_390_391.exe
      File Type:ISO-8859 text, with CRLF line terminators
      Category:dropped
      Size (bytes):332
      Entropy (8bit):3.6014829069277465
      Encrypted:false
      SSDEEP:
      MD5:7E13A91153CABFE9DFED5FD0B5F0F1CB
      SHA1:42FE54AC6C58D67CDF4AF3E727F5D800BA33F6D2
      SHA-256:1FC27D5091274C01DF8AE538DA538F41DC239069E9E830049B6543443CF1136F
      SHA-512:482ABD86DC5D7B5C34C627C322F93BF9B956F55092B3E651B0AF187DB2A58984A2940BF90341BB237E9EB233E979C68FF8370A1A69FEA436DAB0E6AA8A35F94E
      Malicious:false
      Reputation:unknown
      Preview:...... 05/07/2024 03:51:30.....???? ???????: "English"..1. ??????????..1.1. ????????? "C:\Users\user\Desktop\update_390_391.exe"..1.2. ?????????????..1.3. ????????? ??????????? ??????????? ????????? ????????..1.4. ????? ????? "avk.exe".....???????? "update_390_391.exe" ??????? ???????????? ? ????? ???-5..1.4. ???????..1. ???????..
      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Entropy (8bit):7.9661758417480995
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.70%
      • Windows Screen Saver (13104/52) 0.13%
      • DOS Executable Borland C++ (13009/5) 0.13%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      File name:update_390_391.exe
      File size:28'808'560 bytes
      MD5:c2c9b0b8b275defd42be10314f13b480
      SHA1:1a268efea3cc2f56ddb154487e501550f0540696
      SHA256:04ce55570cf7a827499636a577617bcdc80bfb1239f8b71caa7559a90f30b528
      SHA512:828d426fffa04eedc6137e88fce528a0a88d37c6d5ae412bf3ff644362a4b3df14090af55cb63baaac03d35d5b5b06a09cd946841693d0f5be2ab859b8f0ca82
      SSDEEP:786432:z9sg4J3dqRxyp0S0CajM0mSFJOS9h2fuhD:P4JNq78VAnB0ah2GF
      TLSH:B7573326B860C533C06927749D2AF7B0607AFF447A2551D732E07E0E3FB5E923D26986
      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
      Icon Hash:66ece47474363a58
      Entrypoint:0x401798
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      DLL Characteristics:
      Time Stamp:0x6662B53C [Fri Jun 7 07:22:36 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:499cf71d4de8210851bd4e2772ff9278
      Instruction
      jmp 00007F27B4B40622h
      bound di, dword ptr [edx]
      inc ebx
      sub ebp, dword ptr [ebx]
      dec eax
      dec edi
      dec edi
      dec ebx
      nop
      jmp 00007F27B50756ADh
      mov eax, dword ptr [0053508Bh]
      shl eax, 02h
      mov dword ptr [0053508Fh], eax
      push edx
      push 00000000h
      call 00007F27B4C72C5Eh
      mov edx, eax
      call 00007F27B4C66BDBh
      pop edx
      call 00007F27B4C66B39h
      call 00007F27B4C66C10h
      push 00000000h
      call 00007F27B4C6802Dh
      pop ecx
      push 00535034h
      push 00000000h
      call 00007F27B4C72C38h
      mov dword ptr [00535093h], eax
      push 00000000h
      jmp 00007F27B4C6DA74h
      jmp 00007F27B4C6805Bh
      xor eax, eax
      mov al, byte ptr [0053507Dh]
      ret
      mov eax, dword ptr [00535093h]
      ret
      pushad
      mov ebx, BCB05000h
      push ebx
      push 00000BADh
      ret
      mov ecx, 000000B4h
      or ecx, ecx
      je 00007F27B4B4065Fh
      cmp dword ptr [0053508Bh], 00000000h
      jnc 00007F27B4B4061Ch
      mov eax, 000000FEh
      call 00007F27B4B405ECh
      mov ecx, 000000B4h
      push ecx
      push 00000008h
      call 00007F27B4C72BFBh
      push eax
      call 00007F27B4C72C7Fh
      or eax, eax
      jne 00007F27B4B4061Ch
      mov eax, 000000FDh
      call 00007F27B4B405CBh
      push eax
      push eax
      push dword ptr [0053508Bh]
      call 00007F27B4C6DC3Eh
      push dword ptr [0053508Bh]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1690000x2dfc.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x16c0000x69e20.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d60000x13ae0.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x1680000x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1340000x13380058b04912a5d3624a4a491c6b93776ac6False0.4938944994918699data6.548327546590203IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x1350000x320000x2b200fabc95adc67aed38e18ff4e5328ac09eFalse0.2225373641304348data4.333810078949944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x1670000x10000x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x1680000x10000x2005b2f1aa10339084143d88a737298f3d6False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
      .idata0x1690000x30000x2e00de9a92dd42df4f2e7c7fe9007d2192d9False0.32693614130434784data5.274162404137791IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x16c0000x69e200x6a00086dbd8981bf1f896d733b455f1232078False0.17861650574882076data3.7785925360231953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x1d60000x140000x13c00171afce45fe774a28f60e1ad67ed81b4False0.5782486155063291data6.586797919077141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_CURSOR0x16d0700x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
      RT_CURSOR0x16d1a40x134data0.4642857142857143
      RT_CURSOR0x16d2d80x134data0.4805194805194805
      RT_CURSOR0x16d40c0x134data0.38311688311688313
      RT_CURSOR0x16d5400x134data0.36038961038961037
      RT_CURSOR0x16d6740x134data0.4090909090909091
      RT_CURSOR0x16d7a80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
      RT_BITMAP0x16d8dc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 2835 x 2835 px/m0.33620689655172414
      RT_BITMAP0x16d9c40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
      RT_BITMAP0x16db940x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
      RT_BITMAP0x16dd780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
      RT_BITMAP0x16df480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
      RT_BITMAP0x16e1180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
      RT_BITMAP0x16e2e80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
      RT_BITMAP0x16e4b80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
      RT_BITMAP0x16e6880x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
      RT_BITMAP0x16e8580x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
      RT_BITMAP0x16ea280x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
      RT_BITMAP0x16ebf80xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3780 x 3780 px/m0.6551724137931034
      RT_BITMAP0x16ece00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3780 x 3780 px/m0.5905172413793104
      RT_BITMAP0x16edc80x88Device independent bitmap graphic, 8 x 8 x 4, image size 32, resolution 2835 x 2835 px/m0.6985294117647058
      RT_BITMAP0x16ee500x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.4344059405940594
      RT_BITMAP0x16f1780x88Device independent bitmap graphic, 8 x 8 x 4, image size 32, resolution 2835 x 2835 px/m0.6911764705882353
      RT_BITMAP0x16f2000x88Device independent bitmap graphic, 8 x 8 x 4, image size 32, resolution 2835 x 2835 px/m0.6985294117647058
      RT_BITMAP0x16f2880x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.3353960396039604
      RT_BITMAP0x16f5b00x88Device independent bitmap graphic, 8 x 8 x 4, image size 32, resolution 2835 x 2835 px/m0.6985294117647058
      RT_BITMAP0x16f6380xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
      RT_ICON0x16f7200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512RussianRussia0.3185483870967742
      RT_DIALOG0x16fa080x52data0.7682926829268293
      RT_STRING0x16fa5c0x124Matlab v4 mat-file (little endian) 7\004K\004:\004 , numeric, rows 0, columns 0RussianRussia0.5171232876712328
      RT_STRING0x16fb800x318dataRussianRussia0.3813131313131313
      RT_STRING0x16fe980x5a4dataRussianRussia0.3157894736842105
      RT_STRING0x17043c0x8acdataRussianRussia0.3346846846846847
      RT_STRING0x170ce80x6aedataRussianRussia0.3280701754385965
      RT_STRING0x1713980x740dataRussianRussia0.3232758620689655
      RT_STRING0x171ad80x5fcdataRussianRussia0.33159268929503916
      RT_STRING0x1720d40x5c8dataRussianRussia0.3668918918918919
      RT_STRING0x17269c0x5bcTarga image data 1082 x 1072 x 32 +1080 +1090 "8\004A\004E\004>\0044\004=\004K\004E\004 "RussianRussia0.3971389645776567
      RT_STRING0x172c580x30edataRussianRussia0.3797953964194373
      RT_STRING0x172f680x5cadataRussianRussia0.3616734143049933
      RT_STRING0x1735340x816dataRussianRussia0.3169082125603865
      RT_STRING0x173d4c0x168Targa image data - Color 99 x 107 x 32 +68 +111 "z"0.5194444444444445
      RT_STRING0x173eb40x314data0.4619289340101523
      RT_STRING0x1741c80xd8data0.5879629629629629
      RT_STRING0x1742a00x178data0.5186170212765957
      RT_STRING0x1744180x238data0.4753521126760563
      RT_STRING0x1746500x3c4data0.3848547717842324
      RT_STRING0x174a140x3d4data0.39081632653061227
      RT_STRING0x174de80x1b4data0.4610091743119266
      RT_STRING0x174f9c0xecdata0.5550847457627118
      RT_STRING0x1750880x198data0.5171568627450981
      RT_STRING0x1752200x398data0.3358695652173913
      RT_STRING0x1755b80x374data0.417420814479638
      RT_STRING0x17592c0x2b8data0.3850574712643678
      RT_STRING0x175be40x42cdata0.3838951310861423
      RT_STRING0x1760100x39cdata0.3538961038961039
      RT_STRING0x1763ac0x478data0.38548951048951047
      RT_RCDATA0x1768240x31cf4Delphi compiled form 'TDMessages'0.2022938927556122
      RT_RCDATA0x1a85180x2b6ffDelphi compiled form 'TDM_Misc'0.11476008745552752
      RT_RCDATA0x1d3c180x480Delphi compiled form 'TFEditForm'0.4522569444444444
      RT_RCDATA0x1d40980x2d4Delphi compiled form 'TFLog'0.6174033149171271
      RT_RCDATA0x1d436c0x1b9Delphi compiled form 'TFrmStatus'0.7120181405895691
      RT_RCDATA0x1d45280xbdcDelphi compiled form 'TFrm_SelDst'0.39492753623188404
      RT_RCDATA0x1d51040x422Delphi compiled form 'TViewPrt'0.552930056710775
      RT_GROUP_CURSOR0x1d55280x14Lotus unknown worksheet or configuration, revision 0x11.25
      RT_GROUP_CURSOR0x1d553c0x14Lotus unknown worksheet or configuration, revision 0x11.25
      RT_GROUP_CURSOR0x1d55500x14Lotus unknown worksheet or configuration, revision 0x11.3
      RT_GROUP_CURSOR0x1d55640x14Lotus unknown worksheet or configuration, revision 0x11.3
      RT_GROUP_CURSOR0x1d55780x14Lotus unknown worksheet or configuration, revision 0x11.3
      RT_GROUP_CURSOR0x1d558c0x14Lotus unknown worksheet or configuration, revision 0x11.3
      RT_GROUP_CURSOR0x1d55a00x14Lotus unknown worksheet or configuration, revision 0x11.3
      RT_GROUP_ICON0x1d55b40x14dataRussianRussia1.2
      RT_MANIFEST0x1d55c80x855XML 1.0 document, ISO-8859 text, with CRLF line terminators0.39990623534927333
      DLLImport
      ADVAPI32.DLLRegCloseKey, RegOpenKeyA, RegOpenKeyExA, RegQueryValueExA
      KERNEL32.DLLCloseHandle, CompareStringA, CopyFileA, CreateDirectoryA, CreateEventA, CreateFileA, CreateFileMappingA, CreateMutexA, CreateProcessA, CreateThread, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, EnumCalendarInfoA, ExitProcess, FileTimeToDosDateTime, FileTimeToLocalFileTime, FileTimeToSystemTime, FindClose, FindFirstFileA, FindNextFileA, FindResourceA, FlushFileBuffers, FormatMessageA, FreeLibrary, FreeResource, GetACP, GetCPInfo, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcessId, GetCurrentThreadId, GetDateFormatA, GetDiskFreeSpaceA, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentStrings, GetFileAttributesA, GetFileSize, GetFileTime, GetFileType, GetLastError, GetLocalTime, GetLocaleInfoA, GetLogicalDrives, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetProfileStringA, GetStartupInfoA, GetStdHandle, GetStringTypeExA, GetStringTypeW, GetSystemInfo, GetSystemTime, GetThreadLocale, GetTickCount, GetUserDefaultUILanguage, GetVersion, GetVersionExA, GetWindowsDirectoryA, GlobalAddAtomA, GlobalAlloc, GlobalDeleteAtom, GlobalFindAtomA, GlobalFree, GlobalHandle, GlobalLock, GlobalReAlloc, GlobalUnlock, HeapAlloc, HeapFree, InitializeCriticalSection, InterlockedDecrement, InterlockedIncrement, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryW, LoadResource, LocalAlloc, LocalFree, LockResource, MapViewOfFile, MoveFileA, MulDiv, MultiByteToWideChar, QueryDosDeviceA, RaiseException, ReadFile, ReleaseMutex, RemoveDirectoryA, ResetEvent, RtlUnwind, SetConsoleCtrlHandler, SetCurrentDirectoryA, SetEndOfFile, SetErrorMode, SetEvent, SetFileAttributesA, SetFilePointer, SetHandleCount, SetLastError, SetThreadLocale, SizeofResource, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualQuery, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcmpA, lstrcpyA, lstrcpynA, lstrlenA, GetVolumeInformationA
      MPR.DLLWNetGetConnectionA
      VERSION.DLLGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
      WINSPOOL.DRVClosePrinter, DocumentPropertiesA, EnumPrintersA, OpenPrinterA
      COMCTL32.DLLImageList_Add, ImageList_BeginDrag, ImageList_Create, ImageList_Destroy, ImageList_DragEnter, ImageList_DragLeave, ImageList_DragMove, ImageList_DragShowNolock, ImageList_Draw, ImageList_DrawEx, ImageList_EndDrag, ImageList_GetBkColor, ImageList_GetDragImage, ImageList_GetIconSize, ImageList_GetImageCount, ImageList_Read, ImageList_Remove, ImageList_Replace, ImageList_ReplaceIcon, ImageList_SetBkColor, ImageList_SetDragCursorImage, ImageList_SetIconSize, ImageList_Write
      GDI32.DLLBitBlt, CombineRgn, CopyEnhMetaFileA, CreateBitmap, CreateBrushIndirect, CreateCompatibleBitmap, CreateCompatibleDC, CreateDCA, CreateDIBSection, CreateDIBitmap, CreateFontIndirectA, CreateHalftonePalette, CreateICA, CreatePalette, CreatePen, CreatePenIndirect, CreateRectRgn, CreateSolidBrush, DeleteDC, DeleteEnhMetaFile, DeleteObject, Ellipse, EndDoc, EndPage, ExcludeClipRect, ExtCreatePen, ExtTextOutA, GetBitmapBits, GetBrushOrgEx, GetCharABCWidthsA, GetCharWidth32A, GetClipBox, GetCurrentPositionEx, GetDCOrgEx, GetDIBColorTable, GetDIBits, GetDeviceCaps, GetEnhMetaFileBits, GetEnhMetaFileHeader, GetEnhMetaFilePaletteEntries, GetObjectA, GetPaletteEntries, GetPixel, GetRgnBox, GetStockObject, GetSystemPaletteEntries, GetTextExtentPoint32A, GetTextExtentPointA, GetTextMetricsA, GetWinMetaFileBits, GetWindowOrgEx, IntersectClipRect, LineTo, MaskBlt, MoveToEx, PatBlt, PlayEnhMetaFile, PolyBezier, PolyPolyline, Polyline, RealizePalette, RectVisible, Rectangle, RestoreDC, RoundRect, SaveDC, SelectObject, SelectPalette, SetAbortProc, SetBkColor, SetBkMode, SetBrushOrgEx, SetDIBColorTable, SetEnhMetaFileBits, SetMapMode, SetPixel, SetROP2, SetStretchBltMode, SetTextAlign, SetTextColor, SetViewportExtEx, SetViewportOrgEx, SetWinMetaFileBits, SetWindowExtEx, SetWindowOrgEx, StartDocA, StartPage, StretchBlt, TextOutA, UnrealizeObject
      SHELL32.DLLExtractIconExA, SHGetSpecialFolderLocation, SHGetPathFromIDListA
      USER32.DLLActivateKeyboardLayout, AdjustWindowRectEx, BeginPaint, BringWindowToTop, CallNextHookEx, CallWindowProcA, CharLowerA, CharLowerBuffA, CharNextA, CharUpperBuffA, CheckMenuItem, ChildWindowFromPoint, ClientToScreen, CloseClipboard, CountClipboardFormats, CreateIcon, CreateIconIndirect, CreateMenu, CreatePopupMenu, CreateWindowExA, DefFrameProcA, DefMDIChildProcA, DefWindowProcA, DeleteMenu, DestroyCursor, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageA, DrawEdge, DrawFocusRect, DrawFrameControl, DrawIcon, DrawIconEx, DrawMenuBar, DrawTextA, EmptyClipboard, EnableMenuItem, EnableScrollBar, EnableWindow, EndPaint, EnumClipboardFormats, EnumThreadWindows, EnumWindows, EqualRect, FillRect, FindWindowA, FrameRect, GetActiveWindow, GetCapture, GetCaretPos, GetClassInfoA, GetClassNameA, GetClientRect, GetClipboardData, GetCursor, GetCursorPos, GetDC, GetDCEx, GetDesktopWindow, GetDoubleClickTime, GetFocus, GetForegroundWindow, GetIconInfo, GetKeyNameTextA, GetKeyState, GetKeyboardLayout, GetKeyboardLayoutList, GetKeyboardState, GetKeyboardType, GetLastActivePopup, GetMenu, GetMenuItemCount, GetMenuItemID, GetMenuItemInfoA, GetMenuState, GetMenuStringA, GetMessagePos, GetMessageTime, GetParent, GetPropA, GetScrollInfo, GetScrollPos, GetScrollRange, GetSubMenu, GetSysColorBrush, GetSystemMenu, GetSystemMetrics, GetTopWindow, GetUpdateRect, GetWindow, GetWindowDC, GetWindowLongA, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, InflateRect, InsertMenuA, InsertMenuItemA, IntersectRect, InvalidateRect, IsCharAlphaA, IsCharAlphaNumericA, IsChild, IsClipboardFormatAvailable, IsDialogMessageA, IsIconic, IsRectEmpty, IsWindow, IsWindowEnabled, IsWindowVisible, IsZoomed, KillTimer, LoadBitmapA, LoadCursorA, LoadIconA, LoadKeyboardLayoutA, LoadStringA, MapVirtualKeyA, MapWindowPoints, MessageBeep, MessageBoxA, MoveWindow, OemToCharA, OemToCharBuffA, OffsetRect, OpenClipboard, PeekMessageA, PostMessageA, PostQuitMessage, PtInRect, RedrawWindow, RegisterClassA, RegisterClipboardFormatA, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, RemoveMenu, RemovePropA, ScreenToClient, ScrollWindow, ScrollWindowEx, SendMessageA, SetActiveWindow, SetCapture, SetClassLongA, SetClipboardData, SetCursor, SetFocus, SetForegroundWindow, SetKeyboardState, SetMenu, SetMenuItemInfoA, SetPropA, SetRect, SetScrollInfo, SetScrollPos, SetScrollRange, SetTimer, SetWindowLongA, SetWindowPlacement, SetWindowPos, SetWindowTextA, SetWindowsHookExA, ShowCursor, ShowOwnedPopups, ShowScrollBar, ShowWindow, SystemParametersInfoA, TrackPopupMenu, TranslateMDISysAccel, TranslateMessage, UnhookWindowsHookEx, UnionRect, UnregisterClassA, UpdateWindow, ValidateRect, WaitMessage, WinHelpA, WindowFromPoint, wsprintfA, GetSysColor
      OLE32.DLLCoCreateInstance, CoInitialize, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoUninitialize
      OLEAUT32.DLLGetErrorInfo, SafeArrayCreate, SafeArrayGetElement, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayRedim, SysAllocStringLen, SysFreeString, SysReAllocStringLen, VariantChangeType, VariantClear, VariantCopy, VariantCopyInd, VariantInit
      Language of compilation systemCountry where language is spokenMap
      RussianRussia