Analysis Report ijxxKAiHHB.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0040D74C | |
Source: | Code function: | 0_2_0040D970 | |
Source: | Code function: | 0_2_00406C6C |
Source: | IP Address: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00572C7C |
Source: | Code function: | 0_2_00402290 | |
Source: | Code function: | 0_2_004137AC | |
Source: | Code function: | 0_2_00408EC4 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 0_2_00435770 |
Source: | Code function: | 0_2_0040DDF0 |
Source: | Code function: | 0_2_0041F918 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00415110 | |
Source: | Code function: | 0_2_0040B4F1 | |
Source: | Code function: | 0_2_00414827 | |
Source: | Code function: | 0_2_0041B7B2 | |
Source: | Code function: | 0_2_004077F3 | |
Source: | Code function: | 0_2_0041CA09 | |
Source: | Code function: | 0_2_00408C5A |
Source: | Code function: | 0_2_0048C610 |
Source: | Process information set: | Jump to behavior |
Source: | Evasive API call chain: | graph_0-19302 |
Source: | Code function: | 0_2_0040D74C | |
Source: | Code function: | 0_2_0040D970 | |
Source: | Code function: | 0_2_00406C6C |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00406E30 | |
Source: | Code function: | 0_2_00411364 | |
Source: | Code function: | 0_2_00411308 | |
Source: | Code function: | 0_2_00406F3C |
Source: | Code function: | 0_2_0040FA4C |
Source: | Code function: | 0_2_00412558 |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Command and Scripting Interpreter2 | Path Interception | Process Injection1 | Masquerading1 | Input Capture11 | System Time Discovery1 | Remote Services | Input Capture11 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Native API1 | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Process Discovery1 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Ingress Tool Transfer1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information1 | Security Account Manager | Application Window Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | Remote System Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol2 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | File and Directory Discovery2 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | System Information Discovery14 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
28% | Virustotal | Browse | ||
32% | Metadefender | Browse | ||
26% | ReversingLabs | Win32.Network.HttpFileServer |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.rejetto.com | 185.20.49.7 | true | false | high |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.20.49.7 | www.rejetto.com | United Kingdom | 198047 | UKWEB-EQXGB | false |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 433396 |
Start date: | 11.06.2021 |
Start time: | 18:17:26 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | ijxxKAiHHB.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.winEXE@1/2@1/1 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
185.20.49.7 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
www.rejetto.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
UKWEB-EQXGB | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Users\user\Desktop\ijxxKAiHHB.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | D41D8CD98F00B204E9800998ECF8427E |
SHA1: | DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 |
SHA-256: | E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855 |
SHA-512: | CF83E1357EEFB8BDF1542850D66D8007D620E4050B5715DC83F4A921D36CE9CE47D0D13C5D85F2B0FF8318D2877EEC2F63B931BD47417A81A538327AF927DA3E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\ijxxKAiHHB.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | D41D8CD98F00B204E9800998ECF8427E |
SHA1: | DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 |
SHA-256: | E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855 |
SHA-512: | CF83E1357EEFB8BDF1542850D66D8007D620E4050B5715DC83F4A921D36CE9CE47D0D13C5D85F2B0FF8318D2877EEC2F63B931BD47417A81A538327AF927DA3E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.713169405896338 |
TrID: |
|
File name: | ijxxKAiHHB.exe |
File size: | 2501632 |
MD5: | 369b251eb6d24f63c95273f357359669 |
SHA1: | 17820f1585a08fd7b5890192f58ab9860961b064 |
SHA256: | 3b4ad8f1f15f1a73e99cf082ae38a821a7567b63415f57d63595baec079a4b07 |
SHA512: | 305340b4a0047d81452c29eb63bbc263a921b5b6cc46afe09d38329e966aea411a77039671cdc2cbe7715a784025ebb3a9309eaf8ac95b868242a970fe66a1f0 |
SSDEEP: | 49152:Lx7zARwmihR2Gb2Nj4mM1681npUE17RgPT9q5qqvy4ddxCco7SZS1:Lh+wmihRnb2NcmMNc8RvW7 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
File Icon |
---|
Icon Hash: | 78f8cab2b0e17b99 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x572c7c |
Entrypoint Section: | .itext |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
DLL Characteristics: | NX_COMPAT |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 836101b1c206392049600d0155c5d3ef |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFECh |
push ebx |
xor eax, eax |
mov dword ptr [ebp-14h], eax |
mov eax, 005702A0h |
call 00007F7E6C766DA7h |
mov ebx, dword ptr [0057B5B0h] |
xor eax, eax |
push ebp |
push 00572DD1h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
mov eax, dword ptr [0057B240h] |
mov eax, dword ptr [eax] |
mov dword ptr [eax+14h], 005700FCh |
push 00000011h |
call 00007F7E6C7679F2h |
movsx eax, ax |
test ah, FFFFFF80h |
jne 00007F7E6C8D21DEh |
mov eax, dword ptr [0057B240h] |
mov eax, dword ptr [eax] |
mov edx, 00572DE8h |
call 00007F7E6C7EE2A5h |
test al, al |
jne 00007F7E6C8D21A2h |
mov eax, dword ptr [0057B240h] |
mov eax, dword ptr [eax] |
mov ecx, dword ptr [eax+0Ch] |
lea eax, dword ptr [ebp-14h] |
mov edx, 00572E00h |
call 00007F7E6C764BDEh |
mov eax, dword ptr [ebp-14h] |
xor ecx, ecx |
mov edx, 00000010h |
call 00007F7E6C86A66Fh |
mov eax, 00000001h |
call 00007F7E6C7647C9h |
mov eax, dword ptr [0057B240h] |
mov eax, dword ptr [eax] |
cmp byte ptr [eax+08h], 00000000h |
jne 00007F7E6C8D218Ch |
call 00007F7E6C8CF5EFh |
test al, al |
je 00007F7E6C8D2183h |
mov eax, dword ptr [0057B240h] |
mov eax, dword ptr [eax] |
call 00007F7E6C7EE327h |
jmp 00007F7E6C8D2201h |
mov eax, dword ptr [ebx] |
call 00007F7E6C7EC3B3h |
mov ecx, dword ptr [0057B428h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0053D890h] |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x18a000 | 0x3884 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1a6000 | 0x75800 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x190000 | 0x15178 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x18f018 | 0x2d | .rdata |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x18f000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x18aaac | 0x8b8 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x16f750 | 0x16f800 | False | 0.461631723002 | data | 6.42794682465 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.itext | 0x171000 | 0x1e10 | 0x2000 | False | 0.541748046875 | data | 6.15201614074 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x173000 | 0x88c8 | 0x8a00 | False | 0.561084692029 | data | 5.70575735737 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.bss | 0x17c000 | 0xdd64 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.idata | 0x18a000 | 0x3884 | 0x3a00 | False | 0.308526400862 | data | 5.15891016227 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.tls | 0x18e000 | 0x40 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rdata | 0x18f000 | 0x45 | 0x200 | False | 0.142578125 | data | 1.00105646436 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x190000 | 0x15178 | 0x15200 | False | 0.58806397929 | data | 6.69825005654 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1a6000 | 0x75800 | 0x75800 | False | 0.377474650931 | data | 5.96661610682 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
JCLDEBUG | 0x21c000 | 0x59eec | 0x5a000 | False | 0.407481553819 | data | 5.99260109275 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
GIF | 0x1a79d0 | 0x179e | GIF image data, version 89a, 387 x 169 | Italian | Italy |
TEXT | 0x1a9170 | 0x30b | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1a947c | 0x109 | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1a9588 | 0xc6cd | HTML document, ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1b5c58 | 0x236 | HTML document, ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1b5e90 | 0x56 | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1b5ee8 | 0x1c9 | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1b60b4 | 0x14b | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1b6200 | 0x119ee | ASCII text, with very long lines | Italian | Italy |
TEXT | 0x1c7bf0 | 0xc1 | ASCII text, with CRLF line terminators | Italian | Italy |
TEXT | 0x1c7cb4 | 0x124 | ASCII text, with CRLF line terminators | Italian | Italy |
UNICODEDATA | 0x1c7dd8 | 0x7155 | data | French | France |
UNICODEDATA | 0x1cef30 | 0x7ba5 | data | French | France |
UNICODEDATA | 0x1d6ad8 | 0x67e | data | French | France |
UNICODEDATA | 0x1d7158 | 0x9cf1 | data | French | France |
UNICODEDATA | 0x1e0e4c | 0xd271 | DOS executable (COM, 0x8C-variant) | French | France |
UNICODEDATA | 0x1ee0c0 | 0x1435 | data | French | France |
RT_CURSOR | 0x1ef4f8 | 0x134 | data | English | United States |
RT_CURSOR | 0x1ef62c | 0x134 | data | English | United States |
RT_CURSOR | 0x1ef760 | 0x134 | data | English | United States |
RT_CURSOR | 0x1ef894 | 0x134 | data | English | United States |
RT_CURSOR | 0x1ef9c8 | 0x134 | data | English | United States |
RT_CURSOR | 0x1efafc | 0x134 | data | English | United States |
RT_CURSOR | 0x1efc30 | 0x134 | data | English | United States |
RT_BITMAP | 0x1efd64 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1eff34 | 0x1e4 | data | English | United States |
RT_BITMAP | 0x1f0118 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f02e8 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f04b8 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0688 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0858 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0a28 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0bf8 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0dc8 | 0x1d0 | data | English | United States |
RT_BITMAP | 0x1f0f98 | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1058 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1138 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1218 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f12f8 | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f13b8 | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1478 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1558 | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f1618 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f16f8 | 0xe8 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f17e0 | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_BITMAP | 0x1f18a0 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x1f1980 | 0x25a8 | dBase III DBT, version number 0, next free block index 40 | Italian | Italy |
RT_ICON | 0x1f3f28 | 0x4228 | dBase III DBT, version number 0, next free block index 40 | Italian | Italy |
RT_ICON | 0x1f8150 | 0x8a8 | data | Italian | Italy |
RT_ICON | 0x1f89f8 | 0x568 | GLS_BINARY_LSB_FIRST | Italian | Italy |
RT_DIALOG | 0x1f8f60 | 0x52 | data | ||
RT_DIALOG | 0x1f8fb4 | 0x52 | data | ||
RT_STRING | 0x1f9008 | 0x464 | data | ||
RT_STRING | 0x1f946c | 0x870 | data | ||
RT_STRING | 0x1f9cdc | 0x8f8 | data | ||
RT_STRING | 0x1fa5d4 | 0x77c | data | ||
RT_STRING | 0x1fad50 | 0x84c | data | ||
RT_STRING | 0x1fb59c | 0xa60 | data | ||
RT_STRING | 0x1fbffc | 0x7cc | data | ||
RT_STRING | 0x1fc7c8 | 0x274 | data | ||
RT_STRING | 0x1fca3c | 0x294 | data | ||
RT_STRING | 0x1fccd0 | 0x1fc | data | ||
RT_STRING | 0x1fcecc | 0x438 | data | ||
RT_STRING | 0x1fd304 | 0x44c | data | ||
RT_STRING | 0x1fd750 | 0x310 | data | ||
RT_STRING | 0x1fda60 | 0x3d4 | data | ||
RT_STRING | 0x1fde34 | 0x2ac | data | ||
RT_STRING | 0x1fe0e0 | 0xbc | data | ||
RT_STRING | 0x1fe19c | 0x16c | data | ||
RT_STRING | 0x1fe308 | 0x204 | data | ||
RT_STRING | 0x1fe50c | 0x3dc | data | ||
RT_STRING | 0x1fe8e8 | 0x390 | data | ||
RT_STRING | 0x1fec78 | 0x3c0 | data | ||
RT_STRING | 0x1ff038 | 0x360 | data | ||
RT_STRING | 0x1ff398 | 0x43c | data | ||
RT_STRING | 0x1ff7d4 | 0xcc | data | ||
RT_STRING | 0x1ff8a0 | 0xb0 | data | ||
RT_STRING | 0x1ff950 | 0x27c | data | ||
RT_STRING | 0x1ffbcc | 0x3bc | data | ||
RT_STRING | 0x1fff88 | 0x368 | data | ||
RT_STRING | 0x2002f0 | 0x2d4 | data | ||
RT_RCDATA | 0x2005c4 | 0x5c | data | ||
RT_RCDATA | 0x200620 | 0x10 | data | ||
RT_RCDATA | 0x200630 | 0x770 | data | ||
RT_RCDATA | 0x200da0 | 0x18d | Delphi compiled form 'TdiffFrm' | ||
RT_RCDATA | 0x200f30 | 0x16a7 | Delphi compiled form 'TfilepropFrm' | ||
RT_RCDATA | 0x2025d8 | 0xcfd | Delphi compiled form 'TfolderKindFrm' | ||
RT_RCDATA | 0x2032d8 | 0x370 | Delphi compiled form 'TipsEverFrm' | ||
RT_RCDATA | 0x203648 | 0x29d | Delphi compiled form 'TlistSelectFrm' | ||
RT_RCDATA | 0x2038e8 | 0x3cf | Delphi compiled form 'TlonginputFrm' | ||
RT_RCDATA | 0x203cb8 | 0x13ff7 | Delphi compiled form 'TmainFrm' | ||
RT_RCDATA | 0x217cb0 | 0x419 | Delphi compiled form 'TnewuserpassFrm' | ||
RT_RCDATA | 0x2180cc | 0x2597 | Delphi compiled form 'ToptionsFrm' | ||
RT_RCDATA | 0x21a664 | 0x396 | Delphi compiled form 'TpurgeFrm' | ||
RT_RCDATA | 0x21a9fc | 0x363 | Delphi compiled form 'TrunScriptFrm' | ||
RT_RCDATA | 0x21ad60 | 0x2fb | Delphi compiled form 'TshellExtFrm' | ||
RT_GROUP_CURSOR | 0x21b05c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b070 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b084 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b098 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b0ac | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b0c0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x21b0d4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_ICON | 0x21b0e8 | 0x3e | data | Italian | Italy |
RT_VERSION | 0x21b128 | 0x318 | data | Italian | Italy |
RT_MANIFEST | 0x21b440 | 0x29f | XML 1.0 document, ASCII text, with CRLF line terminators | Italian | Italy |
Imports |
---|
DLL | Import |
---|---|
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
user32.dll | GetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA |
kernel32.dll | GetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, RemoveDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
user32.dll | CreateWindowExA, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, SendDlgItemMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCaretPos, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FlashWindow, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CopyImage, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharUpperA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
msimg32.dll | GradientFill |
gdi32.dll | UnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectType, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
kernel32.dll | lstrlenW, lstrcpynW, lstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, PeekNamedPipe, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalGetAtomNameA, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetTempFileNameA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileTime, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreatePipe, CreateMutexA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle |
advapi32.dll | RegSetValueExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey |
kernel32.dll | Sleep |
oleaut32.dll | GetErrorInfo, SysFreeString |
ole32.dll | CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoUninitialize, CoInitialize |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
comctl32.dll | _TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
shell32.dll | Shell_NotifyIconA, ShellExecuteA, SHGetFileInfoA, SHFileOperationA, DragQueryFileA, DragAcceptFiles |
shell32.dll | SHGetPathFromIDListA, SHGetMalloc, SHBrowseForFolderA |
winspool.drv | OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter |
comdlg32.dll | ChooseFontA, GetSaveFileNameA, GetOpenFileNameA |
winmm.dll | timeGetTime, PlaySoundA |
kernel32.dll | GetVersionExA |
kernel32.dll | MulDiv |
shell32.dll |
Version Infos |
---|
Description | Data |
---|---|
LegalCopyright | Copyright (C) 2002-2010 Massimo Melina (www.rejetto.com) |
InternalName | HFS |
FileVersion | 2.3.0.0 |
CompanyName | rejetto |
LegalTrademarks | |
Comments | |
ProductName | Http File Server |
ProductVersion | 2.3 |
FileDescription | |
OriginalFilename | hfs.exe |
Translation | 0x0410 0x04e4 |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Italian | Italy | |
French | France | |
English | United States |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2021 18:19:28.749835968 CEST | 49748 | 80 | 192.168.2.6 | 185.20.49.7 |
Jun 11, 2021 18:19:28.804480076 CEST | 80 | 49748 | 185.20.49.7 | 192.168.2.6 |
Jun 11, 2021 18:19:28.804757118 CEST | 49748 | 80 | 192.168.2.6 | 185.20.49.7 |
Jun 11, 2021 18:19:28.805625916 CEST | 49748 | 80 | 192.168.2.6 | 185.20.49.7 |
Jun 11, 2021 18:19:28.859049082 CEST | 80 | 49748 | 185.20.49.7 | 192.168.2.6 |
Jun 11, 2021 18:19:28.861449003 CEST | 80 | 49748 | 185.20.49.7 | 192.168.2.6 |
Jun 11, 2021 18:19:28.861474037 CEST | 80 | 49748 | 185.20.49.7 | 192.168.2.6 |
Jun 11, 2021 18:19:28.861933947 CEST | 49748 | 80 | 192.168.2.6 | 185.20.49.7 |
Jun 11, 2021 18:19:28.863883972 CEST | 49748 | 80 | 192.168.2.6 | 185.20.49.7 |
Jun 11, 2021 18:19:28.917131901 CEST | 80 | 49748 | 185.20.49.7 | 192.168.2.6 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2021 18:18:10.278373003 CEST | 60342 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:10.331362963 CEST | 53 | 60342 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:12.152117968 CEST | 61346 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:12.204315901 CEST | 53 | 61346 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:13.424079895 CEST | 51774 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:13.482789993 CEST | 53 | 51774 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:14.785739899 CEST | 56023 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:14.836186886 CEST | 53 | 56023 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:15.880342007 CEST | 58384 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:15.932256937 CEST | 53 | 58384 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:17.253135920 CEST | 60261 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:17.306618929 CEST | 53 | 60261 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:18.379358053 CEST | 56061 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:18.434181929 CEST | 53 | 56061 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:19.523556948 CEST | 58336 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:19.574321985 CEST | 53 | 58336 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:20.648494005 CEST | 53781 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:20.698911905 CEST | 53 | 53781 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:21.798403025 CEST | 54064 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:21.848412991 CEST | 53 | 54064 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:23.260416031 CEST | 52811 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:23.319256067 CEST | 53 | 52811 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:24.374751091 CEST | 55299 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:24.428112030 CEST | 53 | 55299 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:25.502563953 CEST | 63745 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:25.562326908 CEST | 53 | 63745 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:26.765043974 CEST | 50055 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:26.818392038 CEST | 53 | 50055 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:27.894273043 CEST | 61374 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:27.947386980 CEST | 53 | 61374 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:29.040306091 CEST | 50339 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:29.093257904 CEST | 53 | 50339 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:30.153923035 CEST | 63307 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:30.209124088 CEST | 53 | 63307 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:41.857260942 CEST | 49694 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:18:41.931057930 CEST | 53 | 49694 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:18:59.943056107 CEST | 54982 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:00.088609934 CEST | 53 | 54982 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:00.670780897 CEST | 50010 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:00.818008900 CEST | 53 | 50010 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:01.024755001 CEST | 63718 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:01.090949059 CEST | 53 | 63718 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:01.442048073 CEST | 62116 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:01.501931906 CEST | 53 | 62116 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:02.189908028 CEST | 63816 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:02.249372005 CEST | 53 | 63816 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:03.548027992 CEST | 55014 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:03.606908083 CEST | 53 | 55014 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:04.228203058 CEST | 62208 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:04.287844896 CEST | 53 | 62208 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:04.859746933 CEST | 57574 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:04.918591022 CEST | 53 | 57574 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:05.527964115 CEST | 51818 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:05.591696024 CEST | 53 | 51818 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:06.126111984 CEST | 56628 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:06.187378883 CEST | 53 | 56628 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:07.268460035 CEST | 60778 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:07.330495119 CEST | 53 | 60778 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:07.911297083 CEST | 53799 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:07.969942093 CEST | 53 | 53799 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:16.295202971 CEST | 54683 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:16.358421087 CEST | 53 | 54683 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:17.644937038 CEST | 59329 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:17.707953930 CEST | 53 | 59329 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:19.893851042 CEST | 64021 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:19.966145992 CEST | 53 | 64021 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:28.676759958 CEST | 56129 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:28.745511055 CEST | 53 | 56129 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:48.696414948 CEST | 58177 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:48.777407885 CEST | 53 | 58177 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:51.100467920 CEST | 50700 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:51.162940025 CEST | 53 | 50700 | 8.8.8.8 | 192.168.2.6 |
Jun 11, 2021 18:19:52.900824070 CEST | 54069 | 53 | 192.168.2.6 | 8.8.8.8 |
Jun 11, 2021 18:19:52.978962898 CEST | 53 | 54069 | 8.8.8.8 | 192.168.2.6 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jun 11, 2021 18:19:28.676759958 CEST | 192.168.2.6 | 8.8.8.8 | 0xef08 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jun 11, 2021 18:19:28.745511055 CEST | 8.8.8.8 | 192.168.2.6 | 0xef08 | No error (0) | 185.20.49.7 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
---|
|
HTTP Packets |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.6 | 49748 | 185.20.49.7 | 80 | C:\Users\user\Desktop\ijxxKAiHHB.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Jun 11, 2021 18:19:28.805625916 CEST | 5477 | OUT | |
Jun 11, 2021 18:19:28.861449003 CEST | 5477 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
General |
---|
Start time: | 18:18:16 |
Start date: | 11/06/2021 |
Path: | C:\Users\user\Desktop\ijxxKAiHHB.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2501632 bytes |
MD5 hash: | 369B251EB6D24F63C95273F357359669 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage: | 8.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 4.3% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 83 |
Graph
Executed Functions |
---|
Function 00406E30, Relevance: 33.4, APIs: 17, Strings: 2, Instructions: 184registrystringlibraryCOMMON
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406F3C, Relevance: 15.1, APIs: 10, Instructions: 98stringlibrarythreadCOMMON
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00572C7C, Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 51keyboardCOMMON
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D970, Relevance: 3.0, APIs: 2, Instructions: 37fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041F918, Relevance: 1.6, APIs: 1, Instructions: 54COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00413248, Relevance: 12.5, APIs: 1, Strings: 6, Instructions: 204threadCOMMON
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041315C, Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 55threadCOMMON
Control-flow Graph |
---|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00412614, Relevance: 4.6, APIs: 3, Instructions: 77COMMON
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403CBC, Relevance: 4.6, APIs: 3, Instructions: 69fileCOMMON
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004096E8, Relevance: 4.0, APIs: 3, Instructions: 275sleepCOMMON
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043150C, Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 55registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042D3C0, Relevance: 3.1, APIs: 1, Strings: 1, Instructions: 64memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403938, Relevance: 3.1, APIs: 2, Instructions: 61fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00452150, Relevance: 3.1, APIs: 2, Instructions: 53timeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D880, Relevance: 3.0, APIs: 2, Instructions: 21COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004D5568, Relevance: 3.0, APIs: 2, Instructions: 19windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0048C818, Relevance: 1.5, APIs: 1, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004520C8, Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004043E0, Relevance: 1.5, APIs: 1, Instructions: 46COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00408AAC, Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406BCC, Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D848, Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D810, Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040DA44, Relevance: 1.5, APIs: 1, Instructions: 17fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040DF0C, Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040DA18, Relevance: 1.5, APIs: 1, Instructions: 16COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040315C, Relevance: 1.5, APIs: 1, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004093BC, Relevance: 1.3, APIs: 1, Instructions: 42memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 00406C6C, Relevance: 24.6, APIs: 11, Strings: 3, Instructions: 139stringlibraryfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435770, Relevance: 3.0, APIs: 2, Instructions: 46windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040DDF0, Relevance: 1.6, APIs: 1, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00412558, Relevance: 1.5, APIs: 1, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411308, Relevance: 1.5, APIs: 1, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411364, Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040FA4C, Relevance: 1.5, APIs: 1, Instructions: 12timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004137AC, Relevance: 1.4, Strings: 1, Instructions: 184COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402290, Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00408EC4, Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435840, Relevance: 26.4, APIs: 14, Strings: 1, Instructions: 132windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004026FC, Relevance: 19.5, APIs: 1, Strings: 10, Instructions: 254windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00408B0C, Relevance: 19.3, APIs: 6, Strings: 5, Instructions: 63windowregistryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435906, Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 59windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004051F4, Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 38filewindowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403350, Relevance: 11.4, APIs: 9, Instructions: 110COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004042EC, Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 49registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004099F8, Relevance: 9.2, APIs: 6, Instructions: 208sleepCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436410, Relevance: 9.1, APIs: 6, Instructions: 84COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041A93C, Relevance: 7.8, APIs: 5, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004115F0, Relevance: 7.6, APIs: 5, Instructions: 53threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004116B4, Relevance: 7.2, APIs: 1, Strings: 3, Instructions: 172threadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00560E5C, Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 49fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405D4C, Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 24memoryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00413B50, Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 20libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004232A4, Relevance: 6.4, APIs: 5, Instructions: 138COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415DF0, Relevance: 6.1, APIs: 4, Instructions: 115COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411968, Relevance: 6.1, APIs: 4, Instructions: 112COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0048C760, Relevance: 6.0, APIs: 4, Instructions: 35windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040FDA0, Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 84threadCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |