Windows
Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
Overview
General Information
Detection
Score: | 23 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
- SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe (PID: 1916 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win32.Malw areX-gen.2 0871.16748 .exe" MD5: 3B97AD27C3EA67C7E6F51D23C8B11471)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-31T18:27:24.320655+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.6 | 49776 | TCP |
2024-10-31T18:28:01.886334+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.6 | 49967 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | memstr_0dfbb972-e |
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_3_0250F85D | |
Source: | Code function: | 0_3_02510E70 | |
Source: | Code function: | 0_3_0250EC41 | |
Source: | Code function: | 0_3_0250CD2D | |
Source: | Code function: | 0_3_0250FACC | |
Source: | Code function: | 0_3_0250FAFC | |
Source: | Code function: | 0_3_0250D4ED | |
Source: | Code function: | 0_3_0250D8F5 | |
Source: | Code function: | 0_3_0250D89E | |
Source: | Code function: | 0_3_0250F48F | |
Source: | Code function: | 0_3_0250C70E | |
Source: | Code function: | 0_3_0250F747 | |
Source: | Code function: | 0_3_0250ED4D | |
Source: | Code function: | 0_3_0250F77B | |
Source: | Code function: | 0_3_0250E188 | |
Source: | Code function: | 0_3_0250D3D4 | |
Source: | Code function: | 0_3_0250F9D4 | |
Source: | Code function: | 0_3_0250CDDD | |
Source: | Code function: | 0_3_0250DFF4 | |
Source: | Code function: | 0_3_0250D020 | |
Source: | Code function: | 0_3_0250CD9A | |
Source: | Code function: | 0_3_0250EDA7 | |
Source: | Code function: | 0_3_0250E188 | |
Source: | Code function: | 0_3_0250C5AE |
Source: | Process information set: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | 11 Input Capture | 1 Security Software Discovery | Remote Services | 11 Input Capture | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | unknown | |||
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546295 |
Start date and time: | 2024-10-31 18:26:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe |
Detection: | SUS |
Classification: | sus23.winEXE@1/1@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
Time | Type | Description |
---|---|---|
13:27:23 | API Interceptor |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64529 |
Entropy (8bit): | 3.697055107791718 |
Encrypted: | false |
SSDEEP: | 1536:YukrBUDO9WVNQLwHtzE0TntpEqtfi1zYUJCkFRkjW5c7gxEn2FBlYBlvB3pCtbsN:7kwR |
MD5: | 79B122B8497B70AE31672DA3DFE1EA8E |
SHA1: | 1CA18BFB7C0944B425F688B172174F6C12F75359 |
SHA-256: | ECE3486B5AE1738DED6D56F2F8F89C3400519C1C6F72B2F418A46059A69AD8D3 |
SHA-512: | 8D3C3A22917B49EB6EF740051AEC545DB41867EFAA982237B973DF25E9D74325E9913C1B9DF67F081C5249D4818F2F5C2CB6543E84703DE5FB08404552D6FC02 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.827192022928079 |
TrID: |
|
File name: | SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe |
File size: | 3'165'184 bytes |
MD5: | 3b97ad27c3ea67c7e6f51d23c8b11471 |
SHA1: | 618434d4edd1aa20c3f97c70fecedac65000b6dd |
SHA256: | f84215746692872e393b68b6d0dc8ef7d050da10b6994d53cbcfcddeb16499ff |
SHA512: | ec5456b456b684aabde3e7534b0b21b6ffb03247f4e642b9050dde9a2686b477a953250148eee168a2d9d72af8a8729c6f1bfa534c66e96773e6a94c2281c693 |
SSDEEP: | 98304:zxY7fjyXSF+cFURSdAFjjdjjA/YiY0Y0Y0Y0YI:BCocFoSdAFjjdjjA/YiY0Y0Y0Y0YI |
TLSH: | D8E54B22F38D8837D5231A749C5B73896833BF152E3895EA7FE4BE0D5F3A1913516282 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 8737656535170646 |
Entrypoint: | 0x635254 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 3d0bebeafdf04540444a2561eaa54737 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
mov eax, 00634BACh |
call 00007F43D4928438h |
mov ebx, dword ptr [0064010Ch] |
mov eax, dword ptr [ebx] |
call 00007F43D49F5703h |
push 00000080h |
push FFFFFFECh |
mov eax, dword ptr [ebx] |
mov eax, dword ptr [eax+30h] |
push eax |
call 00007F43D4929529h |
mov ecx, dword ptr [0064038Ch] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0062FB1Ch] |
call 00007F43D49F56F6h |
mov ecx, dword ptr [00640410h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0062E520h] |
call 00007F43D49F56E3h |
mov ecx, dword ptr [00640064h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0062F0C4h] |
call 00007F43D49F56D0h |
mov eax, dword ptr [ebx] |
call 00007F43D49F5749h |
pop ebx |
call 00007F43D49259B3h |
mov eax, eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x24a000 | 0x2ef | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x246000 | 0x324c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x26e000 | 0xc2400 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x24c000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x2342cc | 0x234400 | a6bca98be67a6173766ef28307db731a | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0x236000 | 0xa4e8 | 0xa600 | f2ba09a39ced9448a493b8adb480832b | False | 0.34702089608433734 | data | 4.719928335088199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0x241000 | 0x4f45 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x246000 | 0x324c | 0x3400 | 4f0c80e2aaa027afc7c371df52290eab | False | 0.34164663461538464 | data | 4.892566155659306 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x24a000 | 0x2ef | 0x400 | efb52ebab655a39a4a116a00d15f8b40 | False | 0.37109375 | data | 4.453556782408975 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.tls | 0x24b000 | 0x183 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x24c000 | 0x18 | 0x200 | 51f7315f820b2eb2230112b150c158a3 | False | 0.0546875 | data | 0.2147325177871819 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x24d000 | 0x20420 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x26e000 | 0xc2400 | 0xc2400 | c7c25b50e32ca307ff20094d21890ad7 | False | 0.29079442165379665 | data | 6.907156554237606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x270920 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | 0.38636363636363635 | ||
RT_CURSOR | 0x270a54 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | Russian | Russia | 0.29545454545454547 |
RT_CURSOR | 0x270b88 | 0x134 | data | 0.4805194805194805 | ||
RT_CURSOR | 0x270cbc | 0x134 | data | 0.38311688311688313 | ||
RT_CURSOR | 0x270df0 | 0x134 | data | 0.36038961038961037 | ||
RT_CURSOR | 0x270f24 | 0x134 | data | 0.4090909090909091 | ||
RT_CURSOR | 0x271058 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | 0.4967532467532468 | ||
RT_CURSOR | 0x27118c | 0x134 | data | Arabic | Saudi Arabia | 0.2597402597402597 |
RT_CURSOR | 0x2712c0 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | Russian | Russia | 0.2824675324675325 |
RT_CURSOR | 0x2713f4 | 0x134 | data | Dutch | Netherlands | 0.38636363636363635 |
RT_CURSOR | 0x271528 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | Dutch | Netherlands | 0.30194805194805197 |
RT_CURSOR | 0x27165c | 0x134 | Targa image data - RLE 64 x 65536 x 1 +32 "\001" | Dutch | Netherlands | 0.275974025974026 |
RT_CURSOR | 0x271790 | 0x134 | data | 0.4642857142857143 | ||
RT_BITMAP | 0x2718c4 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x271a94 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | 0.46487603305785125 | ||
RT_BITMAP | 0x271c78 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x271e48 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39870689655172414 | ||
RT_BITMAP | 0x272018 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.4245689655172414 | ||
RT_BITMAP | 0x2721e8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5021551724137931 | ||
RT_BITMAP | 0x2723b8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5064655172413793 | ||
RT_BITMAP | 0x272588 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x272758 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5344827586206896 | ||
RT_BITMAP | 0x272928 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x272af8 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.5208333333333334 | ||
RT_BITMAP | 0x272bb8 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.42857142857142855 | ||
RT_BITMAP | 0x272c98 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.4955357142857143 | ||
RT_BITMAP | 0x272d78 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.391304347826087 | ||
RT_BITMAP | 0x272dd4 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.391304347826087 | ||
RT_BITMAP | 0x272e30 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.532608695652174 | ||
RT_BITMAP | 0x272e8c | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.532608695652174 | ||
RT_BITMAP | 0x272ee8 | 0x94 | Device independent bitmap graphic, 6 x 11 x 4, image size 44 | Russian | Russia | 0.5 |
RT_BITMAP | 0x272f7c | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.4782608695652174 | ||
RT_BITMAP | 0x272fd8 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.4782608695652174 | ||
RT_BITMAP | 0x273034 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.5543478260869565 | ||
RT_BITMAP | 0x273090 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.5543478260869565 | ||
RT_BITMAP | 0x2730ec | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.4673913043478261 | ||
RT_BITMAP | 0x273148 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | 0.4673913043478261 | ||
RT_BITMAP | 0x2731a4 | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.41025641025641024 | ||
RT_BITMAP | 0x2732dc | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.27564102564102566 | ||
RT_BITMAP | 0x273414 | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.3685897435897436 | ||
RT_BITMAP | 0x27354c | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.3685897435897436 | ||
RT_BITMAP | 0x273684 | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.34294871794871795 | ||
RT_BITMAP | 0x2737bc | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.3717948717948718 | ||
RT_BITMAP | 0x2738f4 | 0x104 | Device independent bitmap graphic, 20 x 13 x 4, image size 156 | 0.5038461538461538 | ||
RT_BITMAP | 0x2739f8 | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.4326923076923077 | ||
RT_BITMAP | 0x273b30 | 0x104 | Device independent bitmap graphic, 20 x 13 x 4, image size 156 | 0.5153846153846153 | ||
RT_BITMAP | 0x273c34 | 0x138 | Device independent bitmap graphic, 28 x 13 x 4, image size 208 | 0.46474358974358976 | ||
RT_BITMAP | 0x273d6c | 0xb0 | Device independent bitmap graphic, 10 x 9 x 4, image size 72 | Russian | Russia | 0.5056818181818182 |
RT_BITMAP | 0x273e1c | 0xb0 | Device independent bitmap graphic, 10 x 9 x 4, image size 72 | Russian | Russia | 0.4943181818181818 |
RT_BITMAP | 0x273ecc | 0xb0 | Device independent bitmap graphic, 10 x 9 x 4, image size 72 | Russian | Russia | 0.4375 |
RT_BITMAP | 0x273f7c | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 2835 x 2835 px/m, 16 important colors | 0.5775862068965517 | ||
RT_BITMAP | 0x274064 | 0x528 | Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2835 x 2835 px/m | 0.625 | ||
RT_BITMAP | 0x27458c | 0x852 | Device independent bitmap graphic, 32 x 32 x 8, 1 compression, image size 1066, resolution 3779 x 3779 px/m, 256 important colors | 0.8431924882629108 | ||
RT_BITMAP | 0x274de0 | 0xf8 | Device independent bitmap graphic, 13 x 13 x 4, 2 compression, image size 144, resolution 2835 x 2835 px/m | 0.782258064516129 | ||
RT_BITMAP | 0x274ed8 | 0x528 | Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2835 x 2835 px/m | 0.5825757575757575 | ||
RT_BITMAP | 0x275400 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3780 x 3780 px/m | 0.5689655172413793 | ||
RT_BITMAP | 0x2754e8 | 0xf8 | Device independent bitmap graphic, 13 x 13 x 4, 2 compression, image size 144, resolution 2835 x 2835 px/m | 0.8024193548387096 | ||
RT_BITMAP | 0x2755e0 | 0x828 | Device independent bitmap graphic, 32 x 32 x 8, image size 1024, resolution 7874 x 7874 px/m | 0.4794061302681992 | ||
RT_BITMAP | 0x275e08 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3779 x 3779 px/m, 16 important colors | 0.6293103448275862 | ||
RT_BITMAP | 0x275ef0 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.38392857142857145 | ||
RT_BITMAP | 0x275fd0 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.4947916666666667 | ||
RT_BITMAP | 0x276090 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.484375 | ||
RT_BITMAP | 0x276150 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.42410714285714285 | ||
RT_BITMAP | 0x276230 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.5104166666666666 | ||
RT_BITMAP | 0x2762f0 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.5 | ||
RT_BITMAP | 0x2763d0 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.4870689655172414 | ||
RT_BITMAP | 0x2764b8 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.4895833333333333 | ||
RT_BITMAP | 0x276578 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.5625 | ||
RT_BITMAP | 0x276648 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.4855769230769231 | ||
RT_BITMAP | 0x276718 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.4326923076923077 | ||
RT_BITMAP | 0x2767e8 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.5576923076923077 | ||
RT_BITMAP | 0x2768b8 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.4807692307692308 | ||
RT_BITMAP | 0x276988 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | 0.5625 | ||
RT_BITMAP | 0x276a58 | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288 | English | Canada | 0.34183673469387754 |
RT_BITMAP | 0x276be0 | 0x88 | Device independent bitmap graphic, 16 x 4 x 4, image size 32 | English | United States | 0.4852941176470588 |
RT_BITMAP | 0x276c68 | 0xa8 | Device independent bitmap graphic, 4 x 16 x 4, image size 64 | English | United States | 0.40476190476190477 |
RT_BITMAP | 0x276d10 | 0x450 | Device independent bitmap graphic, 5 x 5 x 8, image size 40 | Dutch | Netherlands | 0.32608695652173914 |
RT_BITMAP | 0x277160 | 0x450 | Device independent bitmap graphic, 7 x 5 x 8, image size 40 | Dutch | Netherlands | 0.322463768115942 |
RT_BITMAP | 0x2775b0 | 0x4ac | Device independent bitmap graphic, 11 x 11 x 8, image size 132 | Dutch | Netherlands | 0.41555183946488294 |
RT_BITMAP | 0x277a5c | 0x480 | Device independent bitmap graphic, 6 x 11 x 8, image size 88 | Dutch | Netherlands | 0.3559027777777778 |
RT_BITMAP | 0x277edc | 0x4ac | Device independent bitmap graphic, 9 x 11 x 8, image size 132 | Dutch | Netherlands | 0.41638795986622074 |
RT_BITMAP | 0x278388 | 0x4c4 | Device independent bitmap graphic, 12 x 13 x 8, image size 156 | Dutch | Netherlands | 0.4024590163934426 |
RT_BITMAP | 0x27884c | 0x4c4 | Device independent bitmap graphic, 12 x 13 x 8, image size 156 | Dutch | Netherlands | 0.40491803278688526 |
RT_BITMAP | 0x278d10 | 0x4c4 | Device independent bitmap graphic, 12 x 13 x 8, image size 156 | Dutch | Netherlands | 0.40491803278688526 |
RT_BITMAP | 0x2791d4 | 0x448 | Device independent bitmap graphic, 7 x 4 x 8, image size 32 | Dutch | Netherlands | 0.43156934306569344 |
RT_BITMAP | 0x27961c | 0x444 | Device independent bitmap graphic, 4 x 7 x 8, image size 28 | Dutch | Netherlands | 0.4358974358974359 |
RT_BITMAP | 0x279a60 | 0x444 | Device independent bitmap graphic, 4 x 7 x 8, image size 28 | Dutch | Netherlands | 0.43223443223443225 |
RT_BITMAP | 0x279ea4 | 0x448 | Device independent bitmap graphic, 7 x 4 x 8, image size 32 | Dutch | Netherlands | 0.43156934306569344 |
RT_BITMAP | 0x27a2ec | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288 | English | United States | 0.3137755102040816 |
RT_BITMAP | 0x27a474 | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288 | Dutch | Netherlands | 0.413265306122449 |
RT_BITMAP | 0x27a5fc | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288 | English | United States | 0.25510204081632654 |
RT_BITMAP | 0x27a784 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.3794642857142857 | ||
RT_BITMAP | 0x27a864 | 0xb0 | Device independent bitmap graphic, 64 x 16 x 1, image size 128 | English | United States | 0.5113636363636364 |
RT_ICON | 0x27a914 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | Chinese | China | 0.42338709677419356 |
RT_DIALOG | 0x27abfc | 0x52 | data | 0.7682926829268293 | ||
RT_DIALOG | 0x27ac50 | 0x268 | data | 0.564935064935065 | ||
RT_DIALOG | 0x27aeb8 | 0x540 | data | 0.43601190476190477 | ||
RT_DIALOG | 0x27b3f8 | 0x114 | data | 0.6521739130434783 | ||
RT_DIALOG | 0x27b50c | 0xb2 | data | 0.7247191011235955 | ||
RT_DIALOG | 0x27b5c0 | 0xbc | data | 0.7393617021276596 | ||
RT_DIALOG | 0x27b67c | 0xc0 | data | 0.7291666666666666 | ||
RT_DIALOG | 0x27b73c | 0xbc | data | 0.7393617021276596 | ||
RT_DIALOG | 0x27b7f8 | 0xbc | data | 0.7393617021276596 | ||
RT_DIALOG | 0x27b8b4 | 0xc0 | data | 0.7291666666666666 | ||
RT_DIALOG | 0x27b974 | 0xc0 | data | 0.7291666666666666 | ||
RT_STRING | 0x27ba34 | 0x380 | data | 0.37723214285714285 | ||
RT_STRING | 0x27bdb4 | 0x3fc | AmigaOS bitmap font "o", fc_YSize 26880, 18432 elements, 2nd "n", 3rd "e" | 0.3715686274509804 | ||
RT_STRING | 0x27c1b0 | 0x37c | data | 0.39349775784753366 | ||
RT_STRING | 0x27c52c | 0x3b0 | data | 0.3241525423728814 | ||
RT_STRING | 0x27c8dc | 0x2a4 | data | 0.4541420118343195 | ||
RT_STRING | 0x27cb80 | 0x3cc | data | 0.43004115226337447 | ||
RT_STRING | 0x27cf4c | 0x420 | data | 0.4100378787878788 | ||
RT_STRING | 0x27d36c | 0x398 | data | 0.375 | ||
RT_STRING | 0x27d704 | 0xb0 | data | 0.7102272727272727 | ||
RT_STRING | 0x27d7b4 | 0x394 | data | 0.43231441048034935 | ||
RT_STRING | 0x27db48 | 0x388 | data | 0.4004424778761062 | ||
RT_STRING | 0x27ded0 | 0x398 | data | 0.4043478260869565 | ||
RT_STRING | 0x27e268 | 0x410 | data | 0.4115384615384615 | ||
RT_STRING | 0x27e678 | 0x494 | data | 0.32081911262798635 | ||
RT_STRING | 0x27eb0c | 0x4d8 | data | 0.3233870967741935 | ||
RT_STRING | 0x27efe4 | 0x598 | data | 0.25139664804469275 | ||
RT_STRING | 0x27f57c | 0x3d0 | data | 0.3709016393442623 | ||
RT_STRING | 0x27f94c | 0x270 | AmigaOS bitmap font "n", fc_YSize 8192, 18688 elements, 2nd "e", 3rd "s" | 0.46314102564102566 | ||
RT_STRING | 0x27fbbc | 0x200 | data | 0.361328125 | ||
RT_STRING | 0x27fdbc | 0xf8 | data | 0.592741935483871 | ||
RT_STRING | 0x27feb4 | 0x3a0 | data | 0.4213362068965517 | ||
RT_STRING | 0x280254 | 0x168 | data | 0.5111111111111111 | ||
RT_STRING | 0x2803bc | 0xe8 | data | 0.6077586206896551 | ||
RT_STRING | 0x2804a4 | 0x2c4 | data | 0.4138418079096045 | ||
RT_STRING | 0x280768 | 0x268 | data | 0.4707792207792208 | ||
RT_STRING | 0x2809d0 | 0x3fc | data | 0.36764705882352944 | ||
RT_STRING | 0x280dcc | 0x390 | data | 0.4024122807017544 | ||
RT_STRING | 0x28115c | 0x374 | data | 0.34615384615384615 | ||
RT_STRING | 0x2814d0 | 0x464 | data | 0.3505338078291815 | ||
RT_STRING | 0x281934 | 0x1b0 | data | 0.4675925925925926 | ||
RT_STRING | 0x281ae4 | 0xec | data | 0.5508474576271186 | ||
RT_STRING | 0x281bd0 | 0x20c | data | 0.5 | ||
RT_STRING | 0x281ddc | 0x454 | data | 0.3231046931407942 | ||
RT_STRING | 0x282230 | 0x3d0 | data | 0.36168032786885246 | ||
RT_STRING | 0x282600 | 0x2fc | data | 0.36649214659685864 | ||
RT_STRING | 0x2828fc | 0x354 | data | 0.318075117370892 | ||
RT_RCDATA | 0x282c50 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x282c60 | 0x1ebb5 | data | 1.0003654361003202 | ||
RT_RCDATA | 0x2a1818 | 0x9b4 | data | 0.607085346215781 | ||
RT_RCDATA | 0x2a21cc | 0x1772 | Delphi compiled form 'TCalculatorEh' | 0.12812395868043985 | ||
RT_RCDATA | 0x2a3940 | 0x971 | Delphi compiled form 'TDBGridEhFindDlg' | 0.4666942490690939 | ||
RT_RCDATA | 0x2a42b4 | 0x4bed | Delphi compiled form 'TForm1' | 0.1893296290579822 | ||
RT_RCDATA | 0x2a8ea4 | 0xa44b | Delphi compiled form 'TForm2' | 0.7075536745999668 | ||
RT_RCDATA | 0x2b32f0 | 0x89d6 | Delphi compiled form 'TForm3' | 0.8169245593153092 | ||
RT_RCDATA | 0x2bbcc8 | 0x7365e | Delphi compiled form 'TFTemplate' | 0.03429453953075084 | ||
RT_RCDATA | 0x32f328 | 0x494 | Delphi compiled form 'TLoginDialog' | 0.4931740614334471 | ||
RT_RCDATA | 0x32f7bc | 0x3c4 | Delphi compiled form 'TPasswordDialog' | 0.4678423236514523 | ||
RT_GROUP_CURSOR | 0x32fb80 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Russian | Russia | 1.25 |
RT_GROUP_CURSOR | 0x32fb94 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Arabic | Saudi Arabia | 1.3 |
RT_GROUP_CURSOR | 0x32fba8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Russian | Russia | 1.3 |
RT_GROUP_CURSOR | 0x32fbbc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Dutch | Netherlands | 1.3 |
RT_GROUP_CURSOR | 0x32fbd0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Dutch | Netherlands | 1.3 |
RT_GROUP_CURSOR | 0x32fbe4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | Dutch | Netherlands | 1.3 |
RT_GROUP_CURSOR | 0x32fbf8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0x32fc0c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x32fc20 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x32fc34 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x32fc48 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x32fc5c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x32fc70 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_ICON | 0x32fc84 | 0x14 | data | Chinese | China | 1.2 |
RT_VERSION | 0x32fc98 | 0x274 | data | Chinese | China | 0.46656050955414013 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | RegSetValueExA, RegQueryValueExA, RegQueryValueA, RegOpenKeyExA, RegFlushKey, RegEnumKeyExA, RegCreateKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeNameA, GetUserNameA, GetTokenInformation |
kernel32.dll | lstrcpyA, lstrcmpA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, UnmapViewOfFile, TerminateThread, TerminateProcess, SuspendThread, Sleep, SizeofResource, SetUnhandledExceptionFilter, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEnvironmentVariableA, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReleaseMutex, ReadFile, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, MapViewOfFile, LockResource, LoadResource, LoadLibraryExA, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetThreadContext, GetTempPathA, GetSystemTime, GetSystemInfo, GetSystemDefaultLangID, GetStringTypeExA, GetStdHandle, GetStartupInfoA, GetProfileStringA, GetProcAddress, GetPrivateProfileStringA, GetPriorityClass, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoW, GetLocaleInfoA, GetLocalTime, GetLastError, GetHandleInformation, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCommandLineA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FlushInstructionCache, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, EnumSystemLocalesA, EnumCalendarInfoA, EnterCriticalSection, DuplicateHandle, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreateMutexA, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringA, CloseHandle |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, TextOutA, StretchBlt, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetOutlineTextMetricsA, GetObjectA, GetNearestColor, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetCurrentObject, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtSelectClipRgn, ExtCreateRegion, ExtCreatePen, ExcludeClipRect, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgnIndirect, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePen, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateFontA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, WaitForInputIdle, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageTimeoutA, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MoveWindow, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRgn, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EndDialog, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExA, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DialogBoxParamA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CreateDialogParamA, CreateCaret, CopyRect, CopyImage, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
ole32.dll | CoTaskMemFree, StringFromCLSID |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
ole32.dll | CoCreateInstance, CoGetMalloc, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | CreateErrorInfo, GetErrorInfo, SetErrorInfo, SafeArrayCopy, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayDestroy, SafeArrayCreate, SysFreeString |
shell32.dll | ShellExecuteA |
gdi32.dll | TranslateCharsetInfo |
comctl32.dll | ImageList_Destroy, ImageList_Add, ImageList_Create |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_LoadImageA, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
comdlg32.dll | GetSaveFileNameA, GetOpenFileNameA |
kernel32.dll | MulDiv |
kernel32.dll | MulDiv |
Name | Ordinal | Address |
---|---|---|
EurekaLog_AttachedFilesRequestEvent | 15 | 0x464bb0 |
EurekaLog_CallCreateThread | 2 | 0x47e9a8 |
EurekaLog_CallExceptObject | 5 | 0x47e128 |
EurekaLog_CallExitThread | 4 | 0x47eaec |
EurekaLog_CallGeneralRaise | 6 | 0x47dfa4 |
EurekaLog_CallResumeThread | 3 | 0x47ea48 |
EurekaLog_CustomButtonClickEvent | 17 | 0x464cf8 |
EurekaLog_CustomDataRequestEventEx | 14 | 0x464b0c |
EurekaLog_CustomWebFieldsRequestEvent | 16 | 0x464c54 |
EurekaLog_ExceptionActionNotifyEvent | 12 | 0x4649c4 |
EurekaLog_ExceptionErrorNotifyEvent | 13 | 0x464a68 |
EurekaLog_ExceptionNotifyEvent | 10 | 0x46487c |
EurekaLog_HandledExceptionNotifyEvent | 11 | 0x464920 |
EurekaLog_LastDelphiException | 1 | 0x47e9a0 |
EurekaLog_PasswordRequestEvent | 8 | 0x464768 |
EurekaLog_PasswordRequestEventEx | 9 | 0x4647ac |
ExceptionManager | 7 | 0x47fbe8 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia | |
Arabic | Saudi Arabia | |
Dutch | Netherlands | |
English | Canada | |
English | United States | |
Chinese | China |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 13:27:05 |
Start date: | 31/10/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'165'184 bytes |
MD5 hash: | 3B97AD27C3EA67C7E6F51D23C8B11471 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 13.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 2 |
Graph
Function 004D4814 Relevance: 3.1, APIs: 2, Instructions: 59windowCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063500E Relevance: 2.8, APIs: 1, Instructions: 1259COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004042C5 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404416 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|