Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Vh5fpQFekQ.exe

Overview

General Information

Sample name:Vh5fpQFekQ.exe
renamed because original name is a hash value
Original sample name:c004f036648d61fccb863fa52daee51eab9767654d38e2a44b9ef72fc2b70c68.exe
Analysis ID:1562122
MD5:600942b31377727cac9ca8f41b9d74c1
SHA1:7116295c1f08155da6db552a94c3f355050546e9
SHA256:c004f036648d61fccb863fa52daee51eab9767654d38e2a44b9ef72fc2b70c68
Tags:exeTRADETRUSTLLCuser-JAMESWT_MHT
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • Vh5fpQFekQ.exe (PID: 1464 cmdline: "C:\Users\user\Desktop\Vh5fpQFekQ.exe" MD5: 600942B31377727CAC9CA8F41B9D74C1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Vh5fpQFekQ.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.cer0
Source: Vh5fpQFekQ.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.crl0
Source: Vh5fpQFekQ.exeString found in binary or memory: http://crls.ssl.com/ssl.com-EVecc-RootCA.crl0
Source: Vh5fpQFekQ.exeString found in binary or memory: http://ocsps.ssl.com0
Source: Vh5fpQFekQ.exeString found in binary or memory: http://ocsps.ssl.com0P
Source: Vh5fpQFekQ.exeString found in binary or memory: http://www.indyproject.org/
Source: Vh5fpQFekQ.exeString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-ECC-384-R1.crt0
Source: Vh5fpQFekQ.exeString found in binary or memory: https://www.ssl.com/repository0
Source: Vh5fpQFekQ.exeStatic PE information: invalid certificate
Source: Vh5fpQFekQ.exeStatic PE information: Number of sections : 11 > 10
Source: Vh5fpQFekQ.exe, 00000000.00000000.1247097503.0000000000CC5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCRProcessMonitor .exe. vs Vh5fpQFekQ.exe
Source: Vh5fpQFekQ.exe, 00000000.00000002.1252067099.0000000002AC6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs Vh5fpQFekQ.exe
Source: Vh5fpQFekQ.exe, 00000000.00000000.1246176284.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs Vh5fpQFekQ.exe
Source: Vh5fpQFekQ.exe, 00000000.00000002.1252067099.0000000002AA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCRProcessMonitor .exe. vs Vh5fpQFekQ.exe
Source: Vh5fpQFekQ.exeBinary or memory string: OriginalFileName vs Vh5fpQFekQ.exe
Source: Vh5fpQFekQ.exeBinary or memory string: OriginalFilenameCRProcessMonitor .exe. vs Vh5fpQFekQ.exe
Source: classification engineClassification label: clean3.winEXE@1/0@0/0
Source: Vh5fpQFekQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Vh5fpQFekQ.exeString found in binary or memory: pbe-help.chm
Source: Vh5fpQFekQ.exeString found in binary or memory: NATS-SEFI-ADD
Source: Vh5fpQFekQ.exeString found in binary or memory: NATS-DANO-ADD
Source: Vh5fpQFekQ.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: Vh5fpQFekQ.exeString found in binary or memory: jp-ocr-b-add
Source: Vh5fpQFekQ.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: Vh5fpQFekQ.exeString found in binary or memory: jp-ocr-hand-add
Source: Vh5fpQFekQ.exeString found in binary or memory: ISO_6937-2-add
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeWindow found: window name: TMainFormJump to behavior
Source: Vh5fpQFekQ.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Vh5fpQFekQ.exeStatic file information: File size 23192776 > 1048576
Source: Vh5fpQFekQ.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5a6a00
Source: Vh5fpQFekQ.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x222c00
Source: Vh5fpQFekQ.exeStatic PE information: More than 200 imports for user32.dll
Source: Vh5fpQFekQ.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Vh5fpQFekQ.exeCode function: 0_2_00416170 GetSystemInfo,0_2_00416170
Source: Vh5fpQFekQ.exe, 00000000.00000002.1251546012.0000000000D9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Vh5fpQFekQ.exe3%ReversingLabsWin64.Malware.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsps.ssl.com0P0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://cert.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.cer0Vh5fpQFekQ.exefalse
    high
    http://www.ssl.com/repository/SSLcom-RootCA-EV-ECC-384-R1.crt0Vh5fpQFekQ.exefalse
      high
      http://ocsps.ssl.com0Vh5fpQFekQ.exefalse
        high
        http://crls.ssl.com/ssl.com-EVecc-RootCA.crl0Vh5fpQFekQ.exefalse
          high
          http://crls.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.crl0Vh5fpQFekQ.exefalse
            high
            http://www.indyproject.org/Vh5fpQFekQ.exefalse
              high
              https://www.ssl.com/repository0Vh5fpQFekQ.exefalse
                high
                http://ocsps.ssl.com0PVh5fpQFekQ.exefalse
                • Avira URL Cloud: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1562122
                Start date and time:2024-11-25 08:32:13 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 46s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Vh5fpQFekQ.exe
                renamed because original name is a hash value
                Original Sample Name:c004f036648d61fccb863fa52daee51eab9767654d38e2a44b9ef72fc2b70c68.exe
                Detection:CLEAN
                Classification:clean3.winEXE@1/0@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 2
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ocsps.ssl.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: Vh5fpQFekQ.exe
                No simulations
                No context
                No context
                No context
                No context
                No context
                No created / dropped files found
                File type:PE32+ executable (GUI) x86-64, for MS Windows
                Entropy (8bit):7.617898644418564
                TrID:
                • Win64 Executable GUI (202006/5) 92.64%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • VXD Driver (31/22) 0.01%
                File name:Vh5fpQFekQ.exe
                File size:23'192'776 bytes
                MD5:600942b31377727cac9ca8f41b9d74c1
                SHA1:7116295c1f08155da6db552a94c3f355050546e9
                SHA256:c004f036648d61fccb863fa52daee51eab9767654d38e2a44b9ef72fc2b70c68
                SHA512:3831c85e741e7b6633bd00fcff6acbfbe293cb0eac05fdcdb8e17efc65ef10847211edbfdec4e934f0466f795d39820133d072061cc1b05029814320fc514d61
                SSDEEP:393216:J+4bm9A0J2Hx3e0u6pUjAoNcwpgEMmEkg/:Vbt1OUUjx+Ew/
                TLSH:8337D02B7E649129C15DC13AE0A38F40EB33F4B53B37C6E7525136695E25FC06E3AA60
                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
                Icon Hash:74509878e0f8b0f0
                Entrypoint:0x9a7770
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:
                Time Stamp:0x6714DC97 [Sun Oct 20 10:33:59 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:2
                File Version Major:5
                File Version Minor:2
                Subsystem Version Major:5
                Subsystem Version Minor:2
                Import Hash:e6156dcd76a0d53396ce89a61d187cbf
                Signature Valid:false
                Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA ECC R2, O=SSL Corp, L=Houston, S=Texas, C=US
                Signature Validation Error:A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file
                Error Number:-2146762495
                Not Before, Not After
                • 18/11/2024 04:47:36 18/11/2025 04:47:36
                Subject Chain
                • OID.1.3.6.1.4.1.311.60.2.1.3=UA, OID.2.5.4.15=Private Organization, CN=TRADE TRUST LLC, SERIALNUMBER=37058412, O=TRADE TRUST LLC, L=Dnipro, C=UA
                Version:3
                Thumbprint MD5:534B9DBCF3BB2DFA2DAD06DA0709841E
                Thumbprint SHA-1:FEA61825376A364886B5236EFCB3EDD1B23E9441
                Thumbprint SHA-256:BD193172C9C4775190F1C906FF5B47D9FB1A342DB35AC211A1A4AC8A9B07B914
                Serial:4C46DCF5B0C4357F05806830DBA932FD
                Instruction
                push ebp
                dec eax
                sub esp, 40h
                dec eax
                mov ebp, esp
                dec eax
                mov dword ptr [ebp+38h], 00000000h
                nop
                dec eax
                lea ecx, dword ptr [FFFEBAE0h]
                call 00007F957017A128h
                nop
                dec eax
                mov ecx, dword ptr [FFBED663h]
                call 00007F95702C528Bh
                dec eax
                lea ecx, dword ptr [ebp+38h]
                dec eax
                lea edx, dword ptr [000001B7h]
                call 00007F95705984EBh
                dec eax
                lea eax, dword ptr [000001FFh]
                dec eax
                mov dword ptr [ebp+28h], eax
                dec eax
                lea eax, dword ptr [00000214h]
                dec eax
                mov dword ptr [ebp+30h], eax
                dec eax
                mov ecx, dword ptr [ebp+38h]
                dec eax
                lea edx, dword ptr [000001B9h]
                dec esp
                lea eax, dword ptr [ebp+28h]
                inc ecx
                mov ecx, 00000001h
                call 00007F95704E3A3Ah
                dec eax
                mov eax, dword ptr [0007E0BEh]
                dec eax
                mov ecx, dword ptr [eax]
                call 00007F95704B526Bh
                dec eax
                mov eax, dword ptr [0007E0AFh]
                dec eax
                mov ecx, dword ptr [eax]
                mov dl, 01h
                call 00007F95704B7F1Ah
                dec eax
                mov eax, dword ptr [0007E09Eh]
                dec eax
                mov ecx, dword ptr [eax]
                dec eax
                mov edx, dword ptr [FFFDD2B4h]
                dec esp
                mov eax, dword ptr [0007D26Dh]
                call 00007F95704B526Dh
                dec eax
                mov eax, dword ptr [0007E081h]
                dec eax
                mov ecx, dword ptr [eax]
                dec eax
                mov edx, dword ptr [FFFD687Fh]
                dec esp
                mov eax, dword ptr [0007D5A8h]
                call 00007F95704B5250h
                dec eax
                mov eax, dword ptr [00000000h]
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x64e0000x9a.edata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x6470000x5a0a.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e00000x222b27.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6970000x48948.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x161db200x9a8
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x6510000x453ec
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x6500000x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x6487280x14f8.idata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x64d0000xeec.didata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5a69dc0x5a6a009b1933f59fab80ba145baedf05a68b3aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x5a80000x7e5180x7e60024ea68b321e0b3f0d2d4a5a507aa657fFalse0.28498431318001977data5.117382099407564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .bss0x6270000x1f0740x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0x6470000x5a0a0x5c0029c20ce50235d76e49821e0265b78669False0.23976732336956522data4.314398224913193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .didata0x64d0000xeec0x100037bc73588743189ff9f069cc2f52da80False0.255126953125data3.186467782525383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .edata0x64e0000x9a0x200ab621f9be16857d0949b11b5ce9633dbFalse0.2578125data1.883689399194428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .tls0x64f0000x2700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0x6500000x6d0x200bd431c9bdb7d81300e42e5c4b5b774bfFalse0.197265625data1.366430590113611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x6510000x453e40x45400412f73f471abe67d77eb4667f5a27fc9False0.4629258799638989data6.455582329429224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .pdata0x6970000x489480x48a00ae52ad1677d2b07246b485fc2dd33524False0.4974619459982788data6.436138706846121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x6e00000x222b270x222c0090a134d3c054ce2fa22b763371544e7aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                REER0x6e29440x121991PNG image data, 4176 x 800, 8-bit/color RGB, non-interlacedEnglishUnited States0.9935159683227539
                VCLSTYLE0x8042d80x15f30dataEnglishUnited States0.9376001067805659
                VCLSTYLE0x81a2080x83a7dataEnglishUnited States0.8488858558585289
                RT_CURSOR0x8225b00x134dataEnglishUnited States0.43506493506493504
                RT_CURSOR0x8226e40x134dataEnglishUnited States0.4642857142857143
                RT_CURSOR0x8228180x134dataEnglishUnited States0.4805194805194805
                RT_CURSOR0x82294c0x134dataEnglishUnited States0.38311688311688313
                RT_CURSOR0x822a800x134dataEnglishUnited States0.36038961038961037
                RT_CURSOR0x822bb40x134dataEnglishUnited States0.4090909090909091
                RT_CURSOR0x822ce80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                RT_CURSOR0x822e1c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                RT_BITMAP0x822f500x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                RT_BITMAP0x8231200x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                RT_BITMAP0x8233040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                RT_BITMAP0x8234d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                RT_BITMAP0x8236a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                RT_BITMAP0x8238740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                RT_BITMAP0x823a440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                RT_BITMAP0x823c140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                RT_BITMAP0x823de40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                RT_BITMAP0x823fb40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                RT_BITMAP0x8241840xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                RT_BITMAP0x8242440xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                RT_BITMAP0x8243240xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                RT_BITMAP0x8244040xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                RT_BITMAP0x8244e40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                RT_BITMAP0x8245a40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                RT_BITMAP0x8246640xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                RT_BITMAP0x8247440xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                RT_BITMAP0x8248040xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                RT_BITMAP0x8248e40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                RT_BITMAP0x8249a40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
                RT_ICON0x824a840x26126PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9963255569378359
                RT_STRING0x84abac0xa00data0.2734375
                RT_STRING0x84b5ac0x80cdata0.29514563106796116
                RT_STRING0x84bdb80x378data0.3536036036036036
                RT_STRING0x84c1300x18cdata0.398989898989899
                RT_STRING0x84c2bc0x1a4data0.5261904761904762
                RT_STRING0x84c4600x184data0.45618556701030927
                RT_STRING0x84c5e40x394data0.4126637554585153
                RT_STRING0x84c9780x3bcdata0.3912133891213389
                RT_STRING0x84cd340x460data0.36875
                RT_STRING0x84d1940x398data0.425
                RT_STRING0x84d52c0x390AmigaOS bitmap font "e", fc_YSize 18176, 20992 elements, 2nd "\034", 3rd "x"0.4309210526315789
                RT_STRING0x84d8bc0x320data0.42375
                RT_STRING0x84dbdc0x4a0data0.3918918918918919
                RT_STRING0x84e07c0x38cdata0.44162995594713655
                RT_STRING0x84e4080x398data0.3423913043478261
                RT_STRING0x84e7a00x2acdata0.46345029239766083
                RT_STRING0x84ea4c0x384data0.3888888888888889
                RT_STRING0x84edd00x398data0.4326086956521739
                RT_STRING0x84f1680x3a4data0.4055793991416309
                RT_STRING0x84f50c0x2b0data0.4796511627906977
                RT_STRING0x84f7bc0x350data0.3561320754716981
                RT_STRING0x84fb0c0x358data0.38434579439252337
                RT_STRING0x84fe640x45cdata0.36200716845878134
                RT_STRING0x8502c00x42cdata0.351123595505618
                RT_STRING0x8506ec0x390data0.3848684210526316
                RT_STRING0x850a7c0x3f8data0.4094488188976378
                RT_STRING0x850e740x200data0.51171875
                RT_STRING0x8510740xc8data0.675
                RT_STRING0x85113c0x24cdata0.445578231292517
                RT_STRING0x8513880x13cdata0.5917721518987342
                RT_STRING0x8514c40x3d0data0.38524590163934425
                RT_STRING0x8518940x414data0.3726053639846743
                RT_STRING0x851ca80x424data0.3867924528301887
                RT_STRING0x8520cc0x3f0data0.2916666666666667
                RT_STRING0x8524bc0x3bcdata0.41422594142259417
                RT_STRING0x8528780x3f8data0.3838582677165354
                RT_STRING0x852c700x6c0data0.33738425925925924
                RT_STRING0x8533300x458AmigaOS bitmap font "t", fc_YSize 29184, 21248 elements, 2nd "r", 3rd " "0.33363309352517984
                RT_STRING0x8537880x368data0.40940366972477066
                RT_STRING0x853af00x344data0.3827751196172249
                RT_STRING0x853e340x428data0.3966165413533835
                RT_STRING0x85425c0x138data0.5064102564102564
                RT_STRING0x8543940xccdata0.6127450980392157
                RT_STRING0x8544600x1f8data0.5357142857142857
                RT_STRING0x8546580x40cdata0.36003861003861004
                RT_STRING0x854a640x384data0.3688888888888889
                RT_STRING0x854de80x318data0.3787878787878788
                RT_STRING0x8551000x31cdata0.34296482412060303
                RT_RCDATA0x85541c0x10data1.5
                RT_RCDATA0x85542c0x12e8data0.48863636363636365
                RT_RCDATA0x8567140x2dataEnglishUnited States5.0
                RT_RCDATA0x8567180x1d0aDelphi compiled form 'TAdvancedScheduleDialog'0.3892924401398978
                RT_RCDATA0x8584240x10fdDelphi compiled form 'TCharTableDialog'0.4304437801793516
                RT_RCDATA0x8595240x2002Delphi compiled form 'TDesktopIconDialog'0.3688064437393215
                RT_RCDATA0x85b5280x3998Delphi compiled form 'TEditHistListDialog'0.18326098752034725
                RT_RCDATA0x85eec00x112eDelphi compiled form 'TErrorActionDialog'0.4297407912687585
                RT_RCDATA0x85fff00x9b3Delphi compiled form 'TfrmShow'0.4812726540475232
                RT_RCDATA0x8609a40x169fDelphi compiled form 'TInputStringDialog'0.4113279226385771
                RT_RCDATA0x8620440x16eeDelphi compiled form 'TInputTextDialog'0.4131175468483816
                RT_RCDATA0x8637340x239Delphi compiled form 'TListSelectDialog'0.6414762741652021
                RT_RCDATA0x8639700x1c16Delphi compiled form 'TLogonDialog'0.40486787204450625
                RT_RCDATA0x8655880x7230Delphi compiled form 'TMailDialog'0.22400109469074986
                RT_RCDATA0x86c7b80xb697Delphi compiled form 'TMailTestDialog'0.2569368675523608
                RT_RCDATA0x877e500x1585eDelphi compiled form 'TMainForm'0.2409537421447855
                RT_RCDATA0x88d6b00x10abDelphi compiled form 'TMemoDialog'0.4391844387157253
                RT_RCDATA0x88e75c0x19f7Delphi compiled form 'TNewPwdDialog'0.3344365879344065
                RT_RCDATA0x8901540x255fDelphi compiled form 'TPasswordDialog'0.3123236124176858
                RT_RCDATA0x8926b40x2352Delphi compiled form 'TPlaceHolderDialog'0.33244857332448574
                RT_RCDATA0x894a080x9773Delphi compiled form 'TSelectDialog'0.18944571973898017
                RT_RCDATA0x89e17c0x6495Delphi compiled form 'TSelectFromListDialog'0.1580643908501301
                RT_RCDATA0x8a46140x101bDelphi compiled form 'TSelectProfileDialog'0.4387581857870483
                RT_RCDATA0x8a56300x7b36Delphi compiled form 'TSelectSchedTaskDialog'0.24307272842559127
                RT_RCDATA0x8ad1680x10888Delphi compiled form 'TShellDirDialog'0.35952451269935026
                RT_RCDATA0x8bd9f00x1499Delphi compiled form 'TShortcutDialog'0.43371894557178076
                RT_RCDATA0x8bee8c0x10d6Delphi compiled form 'TShowFilesDialog'0.4294663573085847
                RT_RCDATA0x8bff640xbbd0Delphi compiled form 'TShowMsgDialog'0.23047004991680534
                RT_RCDATA0x8cbb340xb179Delphi compiled form 'TShowTextDialog'0.22344991525983315
                RT_RCDATA0x8d6cb00xa54Delphi compiled form 'TStatusWindow'0.44175491679273826
                RT_RCDATA0x8d77040xc67eDelphi compiled form 'TTaskScheduleDialog'0.16831975439839414
                RT_RCDATA0x8e3d840x1179PNG image data, 1800 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9579700424770847
                RT_RCDATA0x8e4f000x176cPNG image data, 2400 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9412941961307538
                RT_RCDATA0x8e666c0x2cf0PNG image data, 3600 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9631432545201669
                RT_RCDATA0x8e935c0x3970PNG image data, 4800 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9263465723612623
                RT_RCDATA0x8ecccc0x1403PNG image data, 1800 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.96213156353699
                RT_RCDATA0x8ee0d00x18adPNG image data, 2400 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9377869241728669
                RT_RCDATA0x8ef9800x343fPNG image data, 3600 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9486355140186916
                RT_RCDATA0x8f2dc00x3ea6PNG image data, 4800 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9183189923930665
                RT_RCDATA0x8f6c680x509PNG image data, 192 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.008533747090768
                RT_RCDATA0x8f71740x64ePNG image data, 256 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.006815365551425
                RT_RCDATA0x8f77c40xb62PNG image data, 384 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9982841455044612
                RT_RCDATA0x8f83280xe43PNG image data, 512 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9726102437688304
                RT_RCDATA0x8f916c0x62fPNG image data, 192 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0069488313329122
                RT_RCDATA0x8f979c0x6d3PNG image data, 256 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0062965082999427
                RT_RCDATA0x8f9e700xe13PNG image data, 384 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9988898140438524
                RT_RCDATA0x8fac840xf5bPNG image data, 512 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9722716865937421
                RT_RCDATA0x8fbbe00x26ePNG image data, 96 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.017684887459807
                RT_RCDATA0x8fbe500x303PNG image data, 96 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.014267185473411
                RT_RCDATA0x8fc1540x644PNG image data, 384 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.006857855361596
                RT_RCDATA0x8fc7980x823PNG image data, 512 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.00144023043687
                RT_RCDATA0x8fcfbc0xe08PNG image data, 768 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9618596881959911
                RT_RCDATA0x8fddc40x117cPNG image data, 1024 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9159964253798034
                RT_RCDATA0x8fef400x787PNG image data, 384 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.00570835495589
                RT_RCDATA0x8ff6c80x89cPNG image data, 512 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000453720508167
                RT_RCDATA0x8fff640x1189PNG image data, 768 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9607930496769882
                RT_RCDATA0x9010f00x1251PNG image data, 1024 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9117082533589251
                RT_GROUP_CURSOR0x9023440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                RT_GROUP_CURSOR0x9023580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x90236c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                RT_GROUP_CURSOR0x9023800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x9023940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x9023a80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x9023bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x9023d00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_ICON0x9023e40x14dataEnglishUnited States1.1
                RT_VERSION0x9023f80x380dataEnglishUnited States0.4497767857142857
                RT_MANIFEST0x9027780x3afXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.47613997879109227
                DLLImport
                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                user32.dllCharNextW, LoadStringW
                kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, SetCurrentDirectoryW, GetCurrentDirectoryW, WriteFile, GetStdHandle, CloseHandle
                kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                user32.dllSetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, SendDlgItemMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MoveWindow, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemRect, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetComboBoxInfo, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, ExitWindowsEx, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DeferWindowPos, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BringWindowToTop, BeginPaint, BeginDeferWindowPos, AdjustWindowRectEx, ActivateKeyboardLayout
                gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWorldTransform, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetGraphicsMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWindowExtEx, GetWinMetaFileBits, GetViewportOrgEx, GetViewportExtEx, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetTextColor, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetCurrentObject, GetClipBox, GetBrushOrgEx, GetBkMode, GetBitmapBits, GdiFlush, FrameRgn, FillRgn, ExtTextOutW, ExtFloodFill, ExtCreateRegion, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                mpr.dllWNetCancelConnection2W
                kernel32.dlllstrlenA, lstrcmpW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, WaitForMultipleObjects, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, TryEnterCriticalSection, SystemTimeToFileTime, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, RemoveDirectoryW, ReleaseMutex, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OpenProcess, MulDiv, MapViewOfFile, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, IsValidCodePage, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetWindowsDirectoryW, GetVolumeInformationW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetUserDefaultLCID, GetUserDefaultUILanguage, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryW, GetComputerNameW, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindNextChangeNotification, FindFirstFileW, FindFirstChangeNotificationW, FindCloseChangeNotification, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsW, EnumSystemLocalesW, EnumSystemCodePagesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeviceIoControl, DeleteFileW, DeleteCriticalSection, CreateThread, CreateProcessW, CreateMutexW, CreateFileMappingW, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringW, CloseHandle
                advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW, GetUserNameW, AdjustTokenPrivileges
                kernel32.dllSleep
                netapi32.dllNetWkstaGetInfo
                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                oleaut32.dllGetErrorInfo, SysFreeString
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoInitializeSecurity, CoUninitialize, CoInitializeEx, CoInitialize, IsEqualGUID
                comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                msvcrt.dllmemset, memcpy
                shell32.dllSHGetFileInfoW, SHFileOperationW, ShellExecuteExW, ShellExecuteW, Shell_NotifyIconW
                shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHGetMalloc, SHGetDesktopFolder, SHChangeNotify
                comdlg32.dllPrintDlgW, ChooseFontW, FindTextW, GetOpenFileNameW
                winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
                winspool.drvGetDefaultPrinterW
                advapi32.dllQueryServiceStatus, OpenServiceW, OpenSCManagerW, CloseServiceHandle
                advapi32.dllInitiateSystemShutdownExW
                kernel32.dllMulDiv
                NameOrdinalAddress
                TMethodImplementationIntercept30x4985a0
                __dbk_fcall_wrapper20x417d60
                dbkFCallWrapperAddr10xa2bf58
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:0
                Start time:02:33:08
                Start date:25/11/2024
                Path:C:\Users\user\Desktop\Vh5fpQFekQ.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\Vh5fpQFekQ.exe"
                Imagebase:0x400000
                File size:23'192'776 bytes
                MD5 hash:600942B31377727CAC9CA8F41B9D74C1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Borland Delphi
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:2.1%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:7.1%
                  Total number of Nodes:14
                  Total number of Limit Nodes:0
                  execution_graph 550 416170 GetSystemInfo 551 435ab0 552 435ac8 GetFileAttributesW 551->552 553 435ad9 552->553 561 435394 562 435397 561->562 563 43549c 562->563 564 435ab0 GetFileAttributesW 562->564 564->563 554 4353e8 555 4353eb 554->555 557 43549c 555->557 558 435ab0 555->558 559 435ac8 GetFileAttributesW 558->559 560 435ad9 559->560 560->557

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_00416340 1 Function_00416540 2 Function_00416640 3 Function_00416E40 4 Function_00416442 5 Function_00435F45 6 Function_00416846 7 Function_00435248 8 Function_00416350 9 Function_00416150 10 Function_00416950 11 Function_00416C50 12 Function_00435750 13 Function_00416360 14 Function_00416460 15 Function_00416760 16 Function_00416F60 17 Function_00435A60 18 Function_00416A66 19 Function_00416170 20 Function_00416370 21 Function_00416470 22 Function_00416D70 23 Function_00416E70 24 Function_00435E70 25 Function_00435079 26 Function_00416200 68 Function_004161E0 26->68 27 Function_00416000 28 Function_00416900 29 Function_00416E00 30 Function_00435A00 54 Function_00435830 30->54 31 Function_00435000 32 Function_00435300 33 Function_0041640B 34 Function_00416610 35 Function_00416110 36 Function_00416A10 37 Function_00416010 38 Function_00416E10 39 Function_00416F10 40 Function_00416310 41 Function_00435710 42 Function_00435E18 43 Function_00416C1C 44 Function_00416220 45 Function_00416520 46 Function_00416E20 47 Function_00416726 48 Function_00416030 49 Function_00416B30 50 Function_00416E30 51 Function_00416F30 52 Function_00435630 53 Function_00435130 72 Function_004357E0 54->72 55 Function_00416D3C 56 Function_004163C0 57 Function_004165C0 58 Function_00416BC0 59 Function_00416EC0 60 Function_00416DCC 61 Function_004164D0 62 Function_004162D0 62->40 62->44 63 Function_004166D0 64 Function_004168D0 65 Function_00416ED0 66 Function_004351D5 66->53 67 Function_004169D6 69 Function_00416CE0 70 Function_00416EE0 71 Function_004356E0 73 Function_004353E8 99 Function_00435BA0 73->99 106 Function_00435AB0 73->106 74 Function_004164F0 75 Function_004167F0 76 Function_00416EF0 77 Function_00435CF0 77->77 77->99 78 Function_004351F5 78->53 79 Function_00416AF9 80 Function_00416480 81 Function_00416E80 82 Function_00416380 83 Function_00416880 84 Function_00416980 85 Function_00435280 86 Function_00416B89 87 Function_00416088 88 Function_00416E90 89 Function_00416190 90 Function_00416490 91 Function_00416590 92 Function_00435790 93 Function_00435394 93->99 93->106 94 Function_00416696 95 Function_00435199 96 Function_004163A0 97 Function_00416AA0 98 Function_00416EA0 100 Function_004359A5 101 Function_00416CAC 102 Function_004356AC 103 Function_004164B0 104 Function_00416EB0 105 Function_00416FB0 106->17 107 Function_004167B6

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 25 416170-416186 GetSystemInfo
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1250836504.0000000000416000.00000040.00000001.01000000.00000003.sdmp, Offset: 00416000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_416000_Vh5fpQFekQ.jbxd
                  Similarity
                  • API ID: InfoSystem
                  • String ID:
                  • API String ID: 31276548-0
                  • Opcode ID: 67c87a944072bca4b55ec9f888a612c3bf4a403d472a9758f7da641f0fcfc9d4
                  • Instruction ID: 4648ade987ffc944fde31bf39686638241399731d1bca306219cf037b42e6670
                  • Opcode Fuzzy Hash: 67c87a944072bca4b55ec9f888a612c3bf4a403d472a9758f7da641f0fcfc9d4
                  • Instruction Fuzzy Hash: EFB09236868DC847CA02B724C84248A72B2BA90708F80061DF48A92190ED2D9A2886C6

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 435ab0-435ad3 GetFileAttributesW 2 435b62-435b6a 0->2 3 435ad9-435ae1 0->3 12 435b85-435b88 2->12 13 435b6c-435b6f 2->13 4 435ae3-435ae6 3->4 5 435b57-435b60 3->5 7 435ae8-435aea 4->7 8 435aef-435af5 4->8 6 435b8c-435b93 5->6 7->6 10 435af7-435afa 8->10 11 435aff-435b3c 8->11 10->6 21 435b4a-435b55 11->21 22 435b3e-435b48 11->22 12->6 13->12 14 435b71-435b74 13->14 14->12 15 435b76-435b83 call 435a60 14->15 15->12 20 435b8a 15->20 20->6 21->6 22->6
                  APIs
                  • GetFileAttributesW.KERNELBASE ref: 00435ACB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1250861428.0000000000435000.00000040.00000001.01000000.00000003.sdmp, Offset: 00435000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_435000_Vh5fpQFekQ.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: e08d200c9f1f223935816db6f1d9b899c311444ac5ca32d48981cc9231302692
                  • Instruction ID: a33dc3493900b81525197066af353c5ec7ce5cb30a31a3fff1a0f86a84c996f9
                  • Opcode Fuzzy Hash: e08d200c9f1f223935816db6f1d9b899c311444ac5ca32d48981cc9231302692
                  • Instruction Fuzzy Hash: 1111D330224D484ADB28AB7D44553AFA1C1FB4C3A8F643A2FE41FC73D1D62CD886561A