Create Interactive Tour

Windows Analysis Report
Integrator.exe

Overview

General Information

Sample name:Integrator.exe
Analysis ID:1613128
MD5:7fe445d2b5df4b0e2ab87543f0109ae3
SHA1:58bdeed8ab97eca14e68259c9762fb34bb65196c
SHA256:083773cf97871bc504f12f16a11c3391bea3a7b7427f20958920a089edcc2d77
Tags:exeI2PRATuser-plebourhis
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Joe Sandbox ML detected suspicious sample
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries keyboard layouts
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Integrator.exe (PID: 1748 cmdline: "C:\Users\user\Desktop\Integrator.exe" MD5: 7FE445D2B5DF4B0E2AB87543F0109AE3)
  • Integrator.exe (PID: 1420 cmdline: C:\Users\user\Desktop\Integrator.exe MD5: 7FE445D2B5DF4B0E2AB87543F0109AE3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Integrator.exeVirustotal: Detection: 51%Perma Link
Source: Integrator.exeReversingLabs: Detection: 43%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability

Compliance

barindex
Source: C:\Users\user\Desktop\Integrator.exeUnpacked PE file: 0.2.Integrator.exe.2810000.0.unpack
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 45.200.148.158:1129
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CD53EA
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC4B4A
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC5B3E
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC60CE
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CD701E
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CDD122
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC7F2E
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC9CF6
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CCCDA6
Source: Integrator.exeStatic PE information: Number of sections : 11 > 10
Source: Integrator.exe, 00000000.00000002.1679039047.0000000002734000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs Integrator.exe
Source: Integrator.exe, 00000001.00000002.3540888724.00000000026A4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs Integrator.exe
Source: classification engineClassification label: mal60.evad.winEXE@3/0@0/1
Source: Integrator.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Integrator.exeVirustotal: Detection: 51%
Source: Integrator.exeReversingLabs: Detection: 43%
Source: Integrator.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
Source: Integrator.exeString found in binary or memory: application/vnd.groove-help
Source: Integrator.exeString found in binary or memory: "application/x-install-instructions
Source: unknownProcess created: C:\Users\user\Desktop\Integrator.exe "C:\Users\user\Desktop\Integrator.exe"
Source: unknownProcess created: C:\Users\user\Desktop\Integrator.exe C:\Users\user\Desktop\Integrator.exe
Source: C:\Users\user\Desktop\Integrator.exeProcess created: C:\Users\user\Desktop\Integrator.exe C:\Users\user\Desktop\Integrator.exe
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: winhttp.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: wtsapi32.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: winsta.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: winhttp.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: wtsapi32.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: winsta.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: mswsock.dll
Source: C:\Users\user\Desktop\Integrator.exeSection loaded: cryptbase.dll
Source: Integrator.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Integrator.exeStatic file information: File size 6747648 > 1048576
Source: Integrator.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x518200

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\Integrator.exeUnpacked PE file: 0.2.Integrator.exe.2810000.0.unpack
Source: Integrator.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CDF262 push es; retf
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC675D push esi; ret
Source: C:\Users\user\Desktop\Integrator.exeCode function: 0_2_02CC3D4E push eax; iretd
Source: C:\Users\user\Desktop\Integrator.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Integrator.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Integrator.exe TID: 3852Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\Integrator.exeSystem information queried: CurrentTimeZoneInformation
Source: C:\Users\user\Desktop\Integrator.exeSystem information queried: CurrentTimeZoneInformation
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
Source: C:\Users\user\Desktop\Integrator.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
Source: Integrator.exe, 00000001.00000002.3540758587.0000000000B03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Integrator.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\Integrator.exeProcess token adjusted: Debug
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1613128 Sample: Integrator.exe Startdate: 12/02/2025 Architecture: WINDOWS Score: 60 13 Multi AV Scanner detection for submitted file 2->13 15 Joe Sandbox ML detected suspicious sample 2->15 5 Integrator.exe 2->5         started        8 Integrator.exe 2->8         started        process3 dnsIp4 17 Detected unpacking (creates a PE file in dynamic memory) 5->17 11 45.200.148.158, 1129, 49731, 49738 Africa-on-Cloud-ASZA Seychelles 8->11 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
Integrator.exe51%VirustotalBrowse
Integrator.exe43%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.200.148.158
unknownSeychelles
328608Africa-on-Cloud-ASZAfalse
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1613128
Start date and time:2025-02-12 14:42:40 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 49s
Hypervisor based Inspection enabled:false
Report type:light
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Integrator.exe
Detection:MAL
Classification:mal60.evad.winEXE@3/0@0/1
EGA Information:
  • Successful, ratio: 50%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target Integrator.exe, PID 1748 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.046180956201426
TrID:
  • Win64 Executable GUI (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:Integrator.exe
File size:6'747'648 bytes
MD5:7fe445d2b5df4b0e2ab87543f0109ae3
SHA1:58bdeed8ab97eca14e68259c9762fb34bb65196c
SHA256:083773cf97871bc504f12f16a11c3391bea3a7b7427f20958920a089edcc2d77
SHA512:0a428fa95313ceb7358eb5ea91b9f828846379473cb78b4a75e552994713fc70296f14221e927f302db1b491e5fc4c266a63b06c40ecbdf20d6ade9cd7983d53
SSDEEP:49152:8M/r94yWpEWQQCc6WF3Pk4RhGSA4t4BZvL7V59EhdB39/fX1u+Ln77bRCRX:8BmEn1LLFCRX
TLSH:8866183F72A5926EC15DC53EC4A7CF20E433727E1B33C6E7129105A98A468C99E7F264
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
Icon Hash:6ab06e9aaaba8e50
Entrypoint:0x9190e0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x677BC2E4 [Mon Jan 6 11:47:48 2025 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:15a57eff2eea7f2b4295f65e6617ea62
Instruction
push ebp
dec eax
sub esp, 20h
dec eax
mov ebp, esp
nop
dec eax
lea ecx, dword ptr [FFFEE5D8h]
call 00007F1AC88C8E00h
dec eax
mov eax, dword ptr [00073554h]
dec eax
mov ecx, dword ptr [eax]
call 00007F1AC8B6E861h
dec eax
mov eax, dword ptr [00073545h]
dec eax
mov ecx, dword ptr [eax]
mov dl, 01h
call 00007F1AC8B71510h
dec eax
mov eax, dword ptr [00073534h]
dec eax
mov ecx, dword ptr [eax]
dec eax
mov edx, dword ptr [FFFEDF2Ah]
dec esp
mov eax, dword ptr [00073A2Bh]
call 00007F1AC8B6E863h
dec eax
mov eax, dword ptr [00073517h]
dec eax
mov ecx, dword ptr [eax]
call 00007F1AC8B6EA74h
call 00007F1AC88C0B9Fh
jmp 00007F1AC8DCBAFAh
nop
nop
call 00007F1AC88C0D96h
nop
dec eax
lea esp, dword ptr [ebp+20h]
pop ebp
ret
dec eax
nop
dec eax
lea eax, dword ptr [00000000h+eax]
dec eax
sub esp, 28h
call 00007F1AC88C032Ch
dec eax
add esp, 28h
ret
int3
int3
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x59f0000x9b.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x5980000x499a.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6310000x4fc00.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5e80000x48f00.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5a20000x45300.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x5a10000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x5992f00x1148.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x59d0000x1002.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5181700x5182007f555e6daba01caa7ffa5fc1257d1511unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x51a0000x72e600x73000e92bd7a82129b648d25530080f7e3eb3False0.22730553668478262data4.693262875622966IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x58d0000xacd40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x5980000x499a0x4a002b781cff2c47a9ff59ccec62c25be2b6False0.24625211148648649data4.393089225157633IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x59d0000x10020x120018a361fcb521fccc1563d7db2dec5d75False0.23741319444444445data3.1136340359203962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x59f0000x9b0x200cacfbc3043ff15547297a7ac2c4be2edFalse0.259765625data1.922020435714979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x5a00000x1e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x5a10000x6d0x2007503743c998ca34caa84f518c708126aFalse0.1953125data1.350403427829831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5a20000x453000x45400e16b1aa7cf68c8829873012a38f59640False0.4722613944043321data6.469497922016864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.pdata0x5e80000x48f000x490005cfbbd8b4b902a2e5c0f14dd061c47e6False0.4915319991438356data6.412831355465122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x6310000x4fc000x4fc008dffff08c5682ea4a771a3165ef691a9False0.5985930152821317data6.692798232467158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x631c480x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_CURSOR0x631d7c0x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0x631eb00x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0x631fe40x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0x6321180x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0x63224c0x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0x6323800x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_ICON0x6324b40x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 00.20460607304062373
RT_ICON0x6370dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4031791907514451
RT_ICON0x6376440x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6814079422382672
RT_ICON0x637eec0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.517590618336887
RT_ICON0x638d940x5c70PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9795892494929006
RT_STRING0x63ea040x1f8data0.4880952380952381
RT_STRING0x63ebfc0x34cdata0.40165876777251186
RT_STRING0x63ef480x390data0.3355263157894737
RT_STRING0x63f2d80x288data0.4737654320987654
RT_STRING0x63f5600x430data0.332089552238806
RT_STRING0x63f9900x364data0.4066820276497696
RT_STRING0x63fcf40xf4data0.5368852459016393
RT_STRING0x63fde80xecdata0.4067796610169492
RT_STRING0x63fed40xe8AmigaOS bitmap font "n", 18688 elements, 2nd, 3rd0.43103448275862066
RT_STRING0x63ffbc0x1f8data0.4880952380952381
RT_STRING0x6401b40x4c8data0.3831699346405229
RT_STRING0x64067c0x5ccdata0.29514824797843664
RT_STRING0x640c480x4d8data0.3782258064516129
RT_STRING0x6411200x454data0.33574007220216606
RT_STRING0x6415740x368data0.411697247706422
RT_STRING0x6418dc0x2fcdata0.4476439790575916
RT_STRING0x641bd80xbcdata0.6861702127659575
RT_STRING0x641c940xe0data0.65625
RT_STRING0x641d740x3b8data0.39810924369747897
RT_STRING0x64212c0x400data0.3642578125
RT_STRING0x64252c0x3e4data0.40963855421686746
RT_STRING0x6429100x3f4data0.28952569169960474
RT_STRING0x642d040x3d0data0.41905737704918034
RT_STRING0x6430d40x410data0.3817307692307692
RT_STRING0x6434e40x514data0.39076923076923076
RT_STRING0x6439f80x3b8data0.36239495798319327
RT_STRING0x643db00x398data0.34456521739130436
RT_STRING0x6441480x458data0.3839928057553957
RT_STRING0x6445a00x148data0.5152439024390244
RT_STRING0x6446e80xccdata0.6127450980392157
RT_STRING0x6447b40x1f8data0.5357142857142857
RT_STRING0x6449ac0x40cdata0.36003861003861004
RT_STRING0x644db80x384data0.3688888888888889
RT_STRING0x64513c0x310data0.37755102040816324
RT_STRING0x64544c0x328data0.3551980198019802
RT_RCDATA0x6457740x10data1.5
RT_RCDATA0x6457840xc2cdata0.46630295250320924
RT_RCDATA0x6463b00x151Delphi compiled form 'TForm1'0.7210682492581603
RT_RCDATA0x6465040x3a205dataEnglishUnited States0.6415397862108071
RT_GROUP_CURSOR0x68070c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x6807200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x6807340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6807480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x68075c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6807700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6807840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0x6807980x4cdata0.8289473684210527
RT_VERSION0x6807e40x314dataChineseChina0.45558375634517767
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllCharNextW, LoadStringW
kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
user32.dllSetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AdjustWindowRectEx, ActivateKeyboardLayout
gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMetaRgn, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FileTimeToSystemTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CompareStringW, CloseHandle
advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
kernel32.dllSleep
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
oleaut32.dllGetErrorInfo, SysFreeString
ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
shell32.dllShell_NotifyIconW
winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
winspool.drvGetDefaultPrinterW
winhttp.dllWinHttpWriteData, WinHttpSetOption, WinHttpSetCredentials, WinHttpSendRequest, WinHttpReceiveResponse, WinHttpReadData, WinHttpQueryOption, WinHttpQueryHeaders, WinHttpQueryDataAvailable, WinHttpQueryAuthSchemes, WinHttpOpenRequest, WinHttpOpen, WinHttpCrackUrl, WinHttpConnect, WinHttpCloseHandle, WinHttpAddRequestHeaders
NameOrdinalAddress
TMethodImplementationIntercept30x494050
__dbk_fcall_wrapper20x4160b0
dbkFCallWrapperAddr10x991f58
DescriptionData
CompanyNameGlarysoft Ltd
FileDescriptionGlary Utilities 5
FileVersion5, 71, 0, 92
InternalNameIntegrator.exe
LegalCopyrightCopyright (c) 2003-2017 Glarysoft Ltd
OriginalFilenameIntegrator.exe
ProductNameGlary Utilities
ProductVersion5, 0, 0, 0
Translation0x0009 0x03a8
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
ChineseChina
TimestampSource PortDest PortSource IPDest IP
Feb 12, 2025 14:43:32.695741892 CET497311129192.168.2.445.200.148.158
Feb 12, 2025 14:43:32.700637102 CET11294973145.200.148.158192.168.2.4
Feb 12, 2025 14:43:32.700716972 CET497311129192.168.2.445.200.148.158
Feb 12, 2025 14:43:32.701119900 CET497311129192.168.2.445.200.148.158
Feb 12, 2025 14:43:32.705924034 CET11294973145.200.148.158192.168.2.4
Feb 12, 2025 14:43:54.042649031 CET11294973145.200.148.158192.168.2.4
Feb 12, 2025 14:43:54.042720079 CET497311129192.168.2.445.200.148.158
Feb 12, 2025 14:43:54.042762995 CET497311129192.168.2.445.200.148.158
Feb 12, 2025 14:43:54.050795078 CET11294973145.200.148.158192.168.2.4
Feb 12, 2025 14:44:04.109778881 CET497381129192.168.2.445.200.148.158
Feb 12, 2025 14:44:04.116797924 CET11294973845.200.148.158192.168.2.4
Feb 12, 2025 14:44:04.116878986 CET497381129192.168.2.445.200.148.158
Feb 12, 2025 14:44:04.122555017 CET497381129192.168.2.445.200.148.158
Feb 12, 2025 14:44:04.128972054 CET11294973845.200.148.158192.168.2.4
Feb 12, 2025 14:44:25.481806040 CET11294973845.200.148.158192.168.2.4
Feb 12, 2025 14:44:25.486215115 CET497381129192.168.2.445.200.148.158
Feb 12, 2025 14:44:25.491156101 CET497381129192.168.2.445.200.148.158
Feb 12, 2025 14:44:25.495990992 CET11294973845.200.148.158192.168.2.4
Feb 12, 2025 14:44:35.499376059 CET497761129192.168.2.445.200.148.158
Feb 12, 2025 14:44:35.506386995 CET11294977645.200.148.158192.168.2.4
Feb 12, 2025 14:44:35.506478071 CET497761129192.168.2.445.200.148.158
Feb 12, 2025 14:44:35.506520033 CET497761129192.168.2.445.200.148.158
Feb 12, 2025 14:44:35.511533976 CET11294977645.200.148.158192.168.2.4
Feb 12, 2025 14:44:56.874731064 CET11294977645.200.148.158192.168.2.4
Feb 12, 2025 14:44:56.874799013 CET497761129192.168.2.445.200.148.158
Feb 12, 2025 14:44:56.874861002 CET497761129192.168.2.445.200.148.158
Feb 12, 2025 14:44:56.879576921 CET11294977645.200.148.158192.168.2.4
Feb 12, 2025 14:45:06.889764071 CET499761129192.168.2.445.200.148.158
Feb 12, 2025 14:45:06.895374060 CET11294997645.200.148.158192.168.2.4
Feb 12, 2025 14:45:06.895453930 CET499761129192.168.2.445.200.148.158
Feb 12, 2025 14:45:06.895490885 CET499761129192.168.2.445.200.148.158
Feb 12, 2025 14:45:06.902264118 CET11294997645.200.148.158192.168.2.4
Feb 12, 2025 14:45:28.250036001 CET11294997645.200.148.158192.168.2.4
Feb 12, 2025 14:45:28.250204086 CET499761129192.168.2.445.200.148.158
Feb 12, 2025 14:45:28.250281096 CET499761129192.168.2.445.200.148.158
Feb 12, 2025 14:45:28.258410931 CET11294997645.200.148.158192.168.2.4
Feb 12, 2025 14:45:38.265307903 CET500081129192.168.2.445.200.148.158
Feb 12, 2025 14:45:38.270149946 CET11295000845.200.148.158192.168.2.4
Feb 12, 2025 14:45:38.270401955 CET500081129192.168.2.445.200.148.158
Feb 12, 2025 14:45:38.270448923 CET500081129192.168.2.445.200.148.158
Feb 12, 2025 14:45:38.275191069 CET11295000845.200.148.158192.168.2.4
Feb 12, 2025 14:45:59.637846947 CET11295000845.200.148.158192.168.2.4
Feb 12, 2025 14:45:59.637984037 CET500081129192.168.2.445.200.148.158
Feb 12, 2025 14:45:59.638186932 CET500081129192.168.2.445.200.148.158
Feb 12, 2025 14:45:59.642956018 CET11295000845.200.148.158192.168.2.4
Feb 12, 2025 14:46:09.656186104 CET500091129192.168.2.445.200.148.158
Feb 12, 2025 14:46:09.661297083 CET11295000945.200.148.158192.168.2.4
Feb 12, 2025 14:46:09.661389112 CET500091129192.168.2.445.200.148.158
Feb 12, 2025 14:46:09.661504984 CET500091129192.168.2.445.200.148.158
Feb 12, 2025 14:46:09.666343927 CET11295000945.200.148.158192.168.2.4
Feb 12, 2025 14:46:31.045969963 CET11295000945.200.148.158192.168.2.4
Feb 12, 2025 14:46:31.046052933 CET500091129192.168.2.445.200.148.158
Feb 12, 2025 14:46:31.046093941 CET500091129192.168.2.445.200.148.158
Feb 12, 2025 14:46:31.051003933 CET11295000945.200.148.158192.168.2.4
All data are 0.

Target ID:0
Start time:08:43:31
Start date:12/02/2025
Path:C:\Users\user\Desktop\Integrator.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Integrator.exe"
Imagebase:0x400000
File size:6'747'648 bytes
MD5 hash:7FE445D2B5DF4B0E2AB87543F0109AE3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:true

Target ID:1
Start time:08:43:31
Start date:12/02/2025
Path:C:\Users\user\Desktop\Integrator.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\Integrator.exe
Imagebase:0x400000
File size:6'747'648 bytes
MD5 hash:7FE445D2B5DF4B0E2AB87543F0109AE3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:false

No disassembly