Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
Analysis ID:1428706
MD5:af1e56057951887a763d4e97670a1036
SHA1:bc0b8c98c0fdbb805b8e8415a860be0966de30be
SHA256:5eb65feae4e36b791ced20aa9fb912311ab3f920613857819a51df2ccba9a485
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1201641660.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            Process Memory Space: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe PID: 3044JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.0.SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeReversingLabs: Detection: 71%
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeJump to behavior
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeStatic PE information: certificate valid
                  Source: unknownDNS traffic detected: query: hotnews.dftoutiao.com replaycode: Name error (3)
                  Source: unknownDNS traffic detected: query: report.thorzip.muxin.fun replaycode: Name error (3)
                  Source: unknownDNS traffic detected: query: files.news.baidu.com replaycode: Name error (3)
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownDNS traffic detected: queries for: files.news.baidu.com
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwL
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwLU
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://bsalsa.com/
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://files.news.baidu.com/mini_new3/jjj/MiniLogo.PNG
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000672000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hotnews.dftoutiao.com/
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=%s&platform=pc&newstype=%s
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002389000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=kuaiyatitle&platform=pc&newstype=now
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://iplocation.7654.com/v1
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://news.7654.com/mini_new3/jsb/
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://news.baidu.com/mini_new3/jjj/
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://ocsp.digicert.com0O
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://pv.sohu.com/cityjson?ie=utf-8
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/crosoft
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.000000000065B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/eH
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000686000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002398000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/lszip/bubble_info?code=jWLGHnD6CYifDIjqc6sGs/Bbp6bCfV8bglNO
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002398000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/lszip/bubble_info?code=jwlghnd6cyifdijqc6sgs/bbp6bcfv8bglno
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.thorzip.muxin.fun/tart
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://s2.symcb.com0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://ssp.7654.com/ct/m?mixData=
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://ssp.7654.com/ct?mixData=
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.00000000023D8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ssp.7654.com/ct?mixData=les
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://sv.symcd.com0&
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://weather.shzhanmeng.com/api/weather/%s
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://weather.shzhanmeng.com/api/weather/%sU
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://www.symauth.com/cps0(
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: http://www.symauth.com/rpa00
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: https://d.symcb.com/cps0%
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: https://d.symcb.com/rpa0
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeString found in binary or memory: https://www.digicert.com/CPS0
                  Source: Yara matchFile source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe PID: 3044, type: MEMORYSTR
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary string: \device\
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary string: \device\x
                  Source: classification engineClassification label: mal52.winEXE@1/1@7/0
                  Source: Yara matchFile source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1201641660.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeReversingLabs: Detection: 71%
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: olepro32.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeFile written: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeStatic PE information: certificate valid
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeStatic file information: File size 1112208 > 1048576
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.000000000236E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ]C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools2ad8eCDPUserSvc_2ad8ec_2ad8eClipboard User Service_2ad8eService_2ad8ecbdhsvc_2ad8e_2ad8eWindows Push Notifications System Servicetions System ServiceWpnServicevicePortable Device Enumerator Serviceumerator ServiceWPDBusEnumEnumWindows Overlay File System Filter DriverSystem Filter DriverWoffWindows Management Instrumentation InstrumentationWinmgmtgmtWinHTTP Web Proxy Auto-Discovery Serviceo-Discovery ServiceWinHttpAutoProxySvcoProxySvcMicrosoft Windows Trusted Runtime Secure Service Runtime Secure ServiceWindowsTrustedRTProxytedRTProxyWindows Trusted Execution Environment Class Extensionnvironment Class ExtensionWindowsTrustedRTustedRTs serviceWdf01000000Windows Connection Managertion ManagerWcmsvcvcWindows Container Isolationner IsolationwcifsfsRemote Access IP ARP DriverIP ARP DriverwanarprpVirtual WiFi Filter Driverilter DrivervwififltfltVolume driverdrivervolumemeVolume Shadow Copy driver Copy drivervolsnapnapDynamic Volume Managerme ManagervolmgrxgrxVolume Manager Driverger DrivervolmgrgrVMware VMCI Bus DriverBus DrivervmciiViddViddMicrosoft Virtual Drive EnumeratorDrive EnumeratorvdrvrootootUser ManagernagerUserManagernagerUSB xHCI Compliant Host Controller Host ControllerUSBXHCIHCIUSB Mass Storage Driverrage DriverUSBSTORTORSuperSpeed Hubed HubUSBHUB3UB3Microsoft USB Standard Hub Driverndard Hub DriverusbhububMicrosoft USB 2.0 Enhanced Host Controller Miniport Drivert Controller Miniport DriverusbehcihciMicrosoft USB Generic Parent Driverric Parent DriverusbccgpcgpUSB Role-Switch Support LibrarySupport LibraryUrsCx010001000Chipidea USB Role-Swit3.
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary or memory string: vmware
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.000000000236E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.000000000236E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware VMCI Bus Driver
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WcmsvcvcWindows Container Isolationner IsolationwcifsfsRemote Access IP ARP DriverIP ARP DriverwanarprpVirtual WiFi Filter Driverilter DrivervwififltfltVolume driverdrivervolumemeVolume Shadow Copy driver Copy drivervolsnapnapDynamic Volume Managerme ManagervolmgrxgrxVolume Manager Driverger DrivervolmgrgrVMware VMCI Bus DriverBus DrivervmciiViddViddMicrosoft Virtual Drive EnumeratorDrive EnumeratorvdrvrootootUser ManagernagerUserManagernagerUSB xHCI Compliant Host Controller Host ControllerUSBXHCIHCIUSB Mass Storage Driverrage DriverUSBSTORTORSuperSpeed Hubed HubUSBHUB3UB3Microsoft USB Standard Hub Driverndard Hub DriverusbhububMicrosoft USB 2.0 Enhanced Host Controller Miniport Drivert Controller Miniport DriverusbehcihciMicrosoft USB Generic Parent Driverric Parent DriverusbccgpcgpUSB Role-Switch Support LibrarySupport LibraryUrsCx010001000Chipidea USB Role-Switch Drivere-Switch DriverUrsChipideapideaUMBus Enumerator Driverator DriverumbususudfssudfssUSB Host Support Libraryort LibraryUcx01000000USB Attached SCSI (UAS) DriverI (UAS) DriverUASPStortorDistributed Link Tracking ClientTracking ClientTrkWksksWeb Account Managert ManagerTokenBrokerrokerTime BrokerrokerTimeBrokerSvckerSvcThemesesThemesesIntel(R) Telemetry Serviceetry ServiceTelemetryetryNetIO Legacy TDI Support Driver Support DrivertdxxTCP/IP Registry Compatibility Compatibilitytcpipregreg
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeProcess information queried: ProcessInformationJump to behavior
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary or memory string: Shell_TrayWnd
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary or memory string: ProgMan
                  Source: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeBinary or memory string: Shell_TrayWndProgManU
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATIONJump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  1
                  Process Injection
                  1
                  Virtualization/Sandbox Evasion
                  OS Credential Dumping11
                  Security Software Discovery
                  Remote ServicesData from Local System1
                  Non-Application Layer Protocol
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Modify Registry
                  LSASS Memory1
                  Virtualization/Sandbox Evasion
                  Remote Desktop ProtocolData from Removable Media1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Process Injection
                  Security Account Manager2
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  DLL Side-Loading
                  NTDS2
                  File and Directory Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets21
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe71%ReversingLabsWin32.Trojan.Generic
                  SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  report.thorzip.muxin.fun
                  unknown
                  unknownfalse
                    unknown
                    hotnews.dftoutiao.com
                    unknown
                    unknownfalse
                      unknown
                      files.news.baidu.com
                      unknown
                      unknownfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ssp.7654.com/ct/m?mixData=SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                          high
                          http://report.thorzip.muxin.fun/eHSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.000000000065B000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://hotnews.dftoutiao.com/SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000672000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://report.thorzip.muxin.fun/lszip/bubble_info?code=jWLGHnD6CYifDIjqc6sGs/Bbp6bCfV8bglNOSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000686000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002398000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                http://news.7654.com/mini_new3/jsb/SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                  high
                                  http://pv.sohu.com/cityjson?ie=utf-8SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                    high
                                    http://www.symauth.com/rpa00SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                      high
                                      http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=kuaiyatitle&platform=pc&newstype=nowSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002389000.00000004.00001000.00020000.00000000.sdmpfalse
                                        unknown
                                        http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwLUSecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                          high
                                          http://files.news.baidu.com/mini_new3/jjj/MiniLogo.PNGSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=%s&platform=pc&newstype=%sSecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                              unknown
                                              http://report.thorzip.muxin.fun/tartSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://weather.shzhanmeng.com/api/weather/%sUSecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                  unknown
                                                  http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwLSecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                    high
                                                    http://www.symauth.com/cps0(SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                      high
                                                      http://report.thorzip.muxin.fun/SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://ssp.7654.com/ct?mixData=SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                          high
                                                          http://ssp.7654.com/ct?mixData=lesSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.00000000023D8000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            http://news.baidu.com/mini_new3/jjj/SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                              high
                                                              http://report.thorzip.muxin.fun/crosoftSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000002.1266582827.0000000000618000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://iplocation.7654.com/v1SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                                  high
                                                                  http://weather.shzhanmeng.com/api/weather/%sSecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                                    unknown
                                                                    http://bsalsa.com/SecuriteInfo.com.Win32.Adware-gen.13861.28606.exefalse
                                                                      unknown
                                                                      http://report.thorzip.muxin.fun/lszip/bubble_info?code=jwlghnd6cyifdijqc6sgs/bbp6bcfv8bglnoSecuriteInfo.com.Win32.Adware-gen.13861.28606.exe, 00000000.00000003.1265338071.0000000002398000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        No contacted IP infos
                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                        Analysis ID:1428706
                                                                        Start date and time:2024-04-19 12:28:09 +02:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 4m 2s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:17
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
                                                                        Detection:MAL
                                                                        Classification:mal52.winEXE@1/1@7/0
                                                                        EGA Information:Failed
                                                                        HCA Information:
                                                                        • Successful, ratio: 100%
                                                                        • Number of executed functions: 0
                                                                        • Number of non-executed functions: 0
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • VT rate limit hit for: SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
                                                                        No simulations
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):282
                                                                        Entropy (8bit):3.514693737970008
                                                                        Encrypted:false
                                                                        SSDEEP:6:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlWygDAlLwkAl2FlRaQmZWGokJISlfY:QZsiL5wmHOlDmo0qmWvclLwr2FlDmo0I
                                                                        MD5:9E36CC3537EE9EE1E3B10FA4E761045B
                                                                        SHA1:7726F55012E1E26CC762C9982E7C6C54CA7BB303
                                                                        SHA-256:4B9D687AC625690FD026ED4B236DAD1CAC90EF69E7AD256CC42766A065B50026
                                                                        SHA-512:5F92493C533D3ADD10B4CE2A364624817EBD10E32DAA45EE16593E913073602DB5E339430A3F7D2C44ABF250E96CA4E679F1F09F8CA807D58A47CF3D5C9C3790
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.3.....
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):6.741488181478588
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 98.32%
                                                                        • Inno Setup installer (109748/4) 1.08%
                                                                        • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                        • Windows Screen Saver (13104/52) 0.13%
                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                        File name:SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
                                                                        File size:1'112'208 bytes
                                                                        MD5:af1e56057951887a763d4e97670a1036
                                                                        SHA1:bc0b8c98c0fdbb805b8e8415a860be0966de30be
                                                                        SHA256:5eb65feae4e36b791ced20aa9fb912311ab3f920613857819a51df2ccba9a485
                                                                        SHA512:4a778b1c6ee14ad3f790ab00b421b351d06f05b688a6c80525133a158363602f417a10adfeb09724a2f20e39736df628bbcffe03f44e145550a1cd48d7900269
                                                                        SSDEEP:24576:/ZepAVvX2Z3XFt81lUu28MMxO17zJZVtL0n31QIChuUO/vDBTo:BeyWf9HHhVOnl
                                                                        TLSH:A9359E72F7C04833D5331D399D1B93A8952ABD113E29994A3BD83E4C6F39B4139292D7
                                                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                        Icon Hash:31ec96e89ad6c873
                                                                        Entrypoint:0x4baca0
                                                                        Entrypoint Section:.itext
                                                                        Digitally signed:true
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                        DLL Characteristics:
                                                                        Time Stamp:0x5F34BA0C [Thu Aug 13 03:57:00 2020 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:46416c8511b63786a1666009e2ddb338
                                                                        Signature Valid:true
                                                                        Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
                                                                        Signature Validation Error:The operation completed successfully
                                                                        Error Number:0
                                                                        Not Before, Not After
                                                                        • 25/02/2020 01:00:00 25/02/2021 00:59:59
                                                                        Subject Chain
                                                                        • CN=\u4e0a\u6d77\u7766\u6b23\u7f51\u7edc\u79d1\u6280\u6709\u9650\u516c\u53f8, OU=IT, O=\u4e0a\u6d77\u7766\u6b23\u7f51\u7edc\u79d1\u6280\u6709\u9650\u516c\u53f8, S=\u4e0a\u6d77, C=CN
                                                                        Version:3
                                                                        Thumbprint MD5:B7FB0098F484B9F0FF7BA177DA2BD9E2
                                                                        Thumbprint SHA-1:F1CC84829CECD842F8477329822C14778BC319DD
                                                                        Thumbprint SHA-256:54538B17A367F8712895D95E68227F0AED93C480074D6F0366D91021AAE13B91
                                                                        Serial:3257CFD411114333C7EF69768757C055
                                                                        Instruction
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        add esp, FFFFFFD8h
                                                                        push ebx
                                                                        xor eax, eax
                                                                        mov dword ptr [ebp-28h], eax
                                                                        mov dword ptr [ebp-20h], eax
                                                                        mov dword ptr [ebp-1Ch], eax
                                                                        mov eax, 004B93E4h
                                                                        call 00007F32C4C4F2D5h
                                                                        xor eax, eax
                                                                        push ebp
                                                                        push 004BAED4h
                                                                        push dword ptr fs:[eax]
                                                                        mov dword ptr fs:[eax], esp
                                                                        call 00007F32C4CFFCC2h
                                                                        test al, al
                                                                        je 00007F32C4D02B08h
                                                                        call 00007F32C4C4F59Dh
                                                                        mov edx, eax
                                                                        lea eax, dword ptr [ebp-1Ch]
                                                                        call 00007F32C4C4CE6Bh
                                                                        mov eax, dword ptr [ebp-1Ch]
                                                                        mov dword ptr [ebp-18h], eax
                                                                        mov eax, dword ptr [004BF184h]
                                                                        mov eax, dword ptr [eax]
                                                                        mov dword ptr [ebp-14h], eax
                                                                        lea edx, dword ptr [ebp-18h]
                                                                        mov ecx, 00000001h
                                                                        mov eax, 004BAEECh
                                                                        call 00007F32C4CEF831h
                                                                        jmp 00007F32C4D02C7Dh
                                                                        mov eax, dword ptr [004BEFF0h]
                                                                        cmp byte ptr [eax], 00000000h
                                                                        je 00007F32C4D02ADEh
                                                                        xor eax, eax
                                                                        call 00007F32C4CFF427h
                                                                        jmp 00007F32C4D02C67h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        push 00000000h
                                                                        call 00007F32C4C4FF63h
                                                                        mov eax, dword ptr [004BF19Ch]
                                                                        mov eax, dword ptr [eax]
                                                                        call 00007F32C4CAF6AFh
                                                                        mov eax, dword ptr [004BF19Ch]
                                                                        mov eax, dword ptr [eax]
                                                                        mov dl, 01h
                                                                        call 00007F32C4CB1579h
                                                                        call 00007F32C4C4F524h
                                                                        mov edx, eax
                                                                        lea eax, dword ptr [ebp-20h]
                                                                        call 00007F32C4C4CDF2h
                                                                        mov eax, dword ptr [ebp-20h]
                                                                        mov dword ptr [ebp-18h], eax
                                                                        mov eax, dword ptr [004BF184h]
                                                                        mov eax, dword ptr [eax]
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc60000x38bc.idata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd80000x3fa00.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x10d8000x2090.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xcc0000xbd60.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0xcb0000x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0xc6ae80x890.idata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000xb888c0xb8a008770e4a74b05c3dc027df9d42c1b77f0False0.5139495704976303data6.590052866643412IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .itext0xba0000xf680x10002dda39ad0b61184bac071bf88cec4c7cFalse0.5947265625data6.262895342213027IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .data0xbb0000x44400x4600f23457ca3e1d367e8600cc3c1415a959False0.46004464285714286data5.1042395000718415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .bss0xc00000x50a40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .idata0xc60000x38bc0x3a00d2dfe90d644c3fd2873923c8b6328d3eFalse0.30994073275862066data5.11583766335277IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .tls0xca0000x380x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rdata0xcb0000x180x20069dbf0c74609e74a983a570cfc32ffffFalse0.052734375data0.20544562813451883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0xcc0000xbd600xbe0058b19b47703c68e056f2ae85cbba7ea7False0.6100328947368421data6.696396278077283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0xd80000x3fa000x3fa0008230b26bf45d902048d40d3caaba966False0.4607993614931238data6.328319191889762IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        TYPELIB0xd9c440x9e8data0.3801261829652997
                                                                        RT_CURSOR0xda62c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                        RT_CURSOR0xda7600x134dataEnglishUnited States0.4642857142857143
                                                                        RT_CURSOR0xda8940x134dataEnglishUnited States0.4805194805194805
                                                                        RT_CURSOR0xda9c80x134dataEnglishUnited States0.38311688311688313
                                                                        RT_CURSOR0xdaafc0x134dataEnglishUnited States0.36038961038961037
                                                                        RT_CURSOR0xdac300x134dataEnglishUnited States0.4090909090909091
                                                                        RT_CURSOR0xdad640x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                        RT_BITMAP0xdae980x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                        RT_BITMAP0xdb0680x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                        RT_BITMAP0xdb24c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                        RT_BITMAP0xdb41c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                        RT_BITMAP0xdb5ec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                        RT_BITMAP0xdb7bc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                        RT_BITMAP0xdb98c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                        RT_BITMAP0xdbb5c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                        RT_BITMAP0xdbd2c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                        RT_BITMAP0xdbefc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                        RT_BITMAP0xdc0cc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                                        RT_ICON0xdc1b40xb0Device independent bitmap graphic, 16 x 32 x 1, image size 128ChineseChina0.5511363636363636
                                                                        RT_ICON0xdc2640x130Device independent bitmap graphic, 32 x 64 x 1, image size 256ChineseChina0.5855263157894737
                                                                        RT_ICON0xdc3940x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.5844594594594594
                                                                        RT_ICON0xdc4bc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.5362903225806451
                                                                        RT_ICON0xdc7a40x568Device independent bitmap graphic, 16 x 32 x 8, image size 320ChineseChina0.4963872832369942
                                                                        RT_ICON0xdcd0c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152ChineseChina0.47518050541516244
                                                                        RT_ICON0xdd5b40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.34169793621013134
                                                                        RT_ICON0xde65c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.2674273858921162
                                                                        RT_ICON0xe0c040x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.20164147378365613
                                                                        RT_ICON0xe4e2c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.13193540754761623
                                                                        RT_ICON0xf56540x93d0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9823731501057082
                                                                        RT_DIALOG0xfea240x52data0.7682926829268293
                                                                        RT_DIALOG0xfea780x52data0.7560975609756098
                                                                        RT_STRING0xfeacc0x2eMatlab v4 mat-file (little endian) 3, numeric, rows 0, columns 0ChineseChina0.5434782608695652
                                                                        RT_STRING0xfeafc0x530data0.3546686746987952
                                                                        RT_STRING0xff02c0x258data0.47333333333333333
                                                                        RT_STRING0xff2840x3f0data0.3948412698412698
                                                                        RT_STRING0xff6740x304StarOffice Gallery theme N, 1677750016 objects, 1st U0.3756476683937824
                                                                        RT_STRING0xff9780x2acdata0.4649122807017544
                                                                        RT_STRING0xffc240xc8data0.67
                                                                        RT_STRING0xffcec0x108data0.6060606060606061
                                                                        RT_STRING0xffdf40x2a8data0.4764705882352941
                                                                        RT_STRING0x10009c0x400data0.388671875
                                                                        RT_STRING0x10049c0x374data0.40271493212669685
                                                                        RT_STRING0x1008100x374data0.36877828054298645
                                                                        RT_STRING0x100b840x410data0.37403846153846154
                                                                        RT_STRING0x100f940xd0data0.5288461538461539
                                                                        RT_STRING0x1010640xb8data0.6467391304347826
                                                                        RT_STRING0x10111c0x254data0.4949664429530201
                                                                        RT_STRING0x1013700x3c0data0.315625
                                                                        RT_STRING0x1017300x368data0.37844036697247707
                                                                        RT_STRING0x101a980x2d0data0.40555555555555556
                                                                        RT_RCDATA0x101d680x168PNG image data, 900 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.5277777777777778
                                                                        RT_RCDATA0x101ed00x3fcPNG image data, 35 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6696078431372549
                                                                        RT_RCDATA0x1022cc0x327PNG image data, 900 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.3444857496902107
                                                                        RT_RCDATA0x1025f40x327PNG image data, 900 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.3444857496902107
                                                                        RT_RCDATA0x10291c0x69d1PNG image data, 900 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9856768429990033
                                                                        RT_RCDATA0x1092f00x327PNG image data, 900 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.3444857496902107
                                                                        RT_RCDATA0x1096180xdbPNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0365296803652968
                                                                        RT_RCDATA0x1096f40x12aPNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0369127516778522
                                                                        RT_RCDATA0x1098200x134PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0357142857142858
                                                                        RT_RCDATA0x1099540x10data1.5
                                                                        RT_RCDATA0x1099640x670PNG image data, 14 x 14, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8228155339805825
                                                                        RT_RCDATA0x109fd40x1d7PNG image data, 12 x 13, 8-bit/color RGBA, interlacedEnglishUnited States1.0233545647558386
                                                                        RT_RCDATA0x10a1ac0x840PNG image data, 80 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0052083333333333
                                                                        RT_RCDATA0x10a9ec0x6cdPNG image data, 78 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.006318207926479
                                                                        RT_RCDATA0x10b0bc0x959PNG image data, 79 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0045967404931049
                                                                        RT_RCDATA0x10ba180x7cePNG image data, 100 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0055055055055055
                                                                        RT_RCDATA0x10c1e80x81PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9534883720930233
                                                                        RT_RCDATA0x10c26c0xa9PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.029585798816568
                                                                        RT_RCDATA0x10c3180xa9PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.029585798816568
                                                                        RT_RCDATA0x10c3c40x4d4PNG image data, 33 x 33, 8-bit/color RGBA, interlacedEnglishUnited States1.0088996763754046
                                                                        RT_RCDATA0x10c8980x4d4PNG image data, 33 x 33, 8-bit/color RGBA, interlacedEnglishUnited States1.0088996763754046
                                                                        RT_RCDATA0x10cd6c0x4d4PNG image data, 33 x 33, 8-bit/color RGBA, interlacedEnglishUnited States1.0088996763754046
                                                                        RT_RCDATA0x10d2400x43cPNG image data, 35 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6964944649446494
                                                                        RT_RCDATA0x10d67c0x44aPNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.7085610200364298
                                                                        RT_RCDATA0x10dac80x488PNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.7267241379310345
                                                                        RT_RCDATA0x10df500x334PNG image data, 21 x 21, 8-bit/color RGBA, interlacedEnglishUnited States1.0134146341463415
                                                                        RT_RCDATA0x10e2840x334PNG image data, 21 x 21, 8-bit/color RGBA, interlacedEnglishUnited States1.0134146341463415
                                                                        RT_RCDATA0x10e5b80x334PNG image data, 21 x 21, 8-bit/color RGBA, interlacedEnglishUnited States1.0134146341463415
                                                                        RT_RCDATA0x10e8ec0x3d7PNG image data, 35 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6459816887080366
                                                                        RT_RCDATA0x10ecc40x3d7PNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.646998982706002
                                                                        RT_RCDATA0x10f09c0x3d7PNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.659206510681587
                                                                        RT_RCDATA0x10f4740x3cdPNG image data, 35 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6361767728674204
                                                                        RT_RCDATA0x10f8440x3cbPNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.6405767250257467
                                                                        RT_RCDATA0x10fc100x3cbPNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.6364572605561277
                                                                        RT_RCDATA0x10ffdc0x14aPNG image data, 9 x 11, 8-bit/color RGBA, interlacedEnglishUnited States1.0333333333333334
                                                                        RT_RCDATA0x1101280x15dPNG image data, 9 x 10, 8-bit/color RGBA, interlacedEnglishUnited States1.0315186246418337
                                                                        RT_RCDATA0x1102880x158PNG image data, 9 x 10, 8-bit/color RGBA, interlacedEnglishUnited States1.0319767441860466
                                                                        RT_RCDATA0x1103e00x3e5PNG image data, 35 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6800401203610833
                                                                        RT_RCDATA0x1107c80x3eaPNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.6826347305389222
                                                                        RT_RCDATA0x110bb40x3eaPNG image data, 35 x 21, 8-bit/color RGB, non-interlacedEnglishUnited States0.6816367265469062
                                                                        RT_RCDATA0x110fa00x1d8PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0233050847457628
                                                                        RT_RCDATA0x1111780x1f9PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0217821782178218
                                                                        RT_RCDATA0x1113740x1f6PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0219123505976095
                                                                        RT_RCDATA0x11156c0x70cdata0.6407982261640798
                                                                        RT_RCDATA0x111c780xcf5Delphi compiled form 'TFormMain'0.4485981308411215
                                                                        RT_RCDATA0x1129700x2d39Delphi compiled form 'TFormMiniReader'0.26664939103394664
                                                                        RT_RCDATA0x1156ac0x1c2Delphi compiled form 'TFormSkinADBase'0.6644444444444444
                                                                        RT_RCDATA0x1158700xd4cPNG image data, 134 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032314923619272
                                                                        RT_RCDATA0x1165bc0x1bbPNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0248306997742664
                                                                        RT_RCDATA0x1167780x1bePNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0246636771300448
                                                                        RT_RCDATA0x1169380x1b3PNG image data, 29 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.025287356321839
                                                                        RT_GROUP_CURSOR0x116aec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                        RT_GROUP_CURSOR0x116b000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                        RT_GROUP_CURSOR0x116b140x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x116b280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x116b3c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x116b500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x116b640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_ICON0x116b780xa0dataChineseChina0.65625
                                                                        RT_VERSION0x116c180x260dataChineseChina0.5328947368421053
                                                                        RT_MANIFEST0x116e780xa09XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.31218372907746206
                                                                        DLLImport
                                                                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                        user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                        kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                        user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateLayeredWindow, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenuEx, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetDlgItemTextA, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageTimeoutA, SendMessageW, SendMessageA, SendInput, SendDlgItemMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MoveWindow, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadMenuA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextLengthA, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastInputInfo, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursorInfo, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassNameA, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcW, CallWindowProcA, CallNextHookEx, BeginPaint, AttachThreadInput, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                        gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
                                                                        version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                        kernel32.dlllstrlenW, lstrcpyA, WriteProcessMemory, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAllocEx, VirtualAlloc, TerminateProcess, Sleep, SizeofResource, SetThreadLocale, SetThreadAffinityMask, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, QueryDosDeviceA, OpenProcess, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLogicalDriveStringsA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetExitCodeThread, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCommandLineA, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteCriticalSection, CreateThread, CreateRemoteThread, CreateProcessA, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                        advapi32.dllRegSetValueExA, RegSetValueA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey, RegOpenCurrentUser, LookupAccountNameA, GetUserNameA
                                                                        kernel32.dllSleep
                                                                        ole32.dllIsEqualGUID, CoTaskMemFree, StringFromCLSID, CoCreateGuid
                                                                        oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, GetActiveObject, DispGetIDsOfNames, LoadTypeLib, SysFreeString
                                                                        ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, RevokeDragDrop, RegisterDragDrop, OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, ProgIDFromCLSID, StringFromCLSID, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                                                                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                        comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                        URLMON.DLLCoInternetCreateZoneManager, CoInternetCreateSecurityManager, UrlMkGetSessionOption, UrlMkSetSessionOption
                                                                        wininet.dllInternetSetOptionA, InternetReadFile, InternetOpenA, InternetConnectA, InternetCloseHandle, HttpSendRequestA, HttpQueryInfoA, HttpOpenRequestA
                                                                        shell32.dllShell_NotifyIconA, ShellExecuteA, ExtractIconA
                                                                        shell32.dllSHGetSpecialFolderPathA
                                                                        winmm.dlltimeGetTime
                                                                        wsock32.dllsend
                                                                        kernel32.dllGetProcAddress, LoadLibraryA, GetModuleHandleA
                                                                        ntdll.dllNtQuerySystemInformation, NtQueryInformationProcess
                                                                        advapi32.dllOpenSCManagerA, EnumServicesStatusA, CloseServiceHandle
                                                                        Iphlpapi.dllGetAdaptersInfo
                                                                        kernel32.dllGetVersionExW
                                                                        kernel32.dllGetComputerNameExA
                                                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, StringFromCLSID
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        ChineseChina
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Apr 19, 2024 12:29:00.450416088 CEST5584653192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:01.462941885 CEST5584653192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:02.478410959 CEST5584653192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:03.049814939 CEST53558461.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:03.049834967 CEST53558461.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:03.049846888 CEST53558461.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:03.268181086 CEST6551653192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:03.595885992 CEST53655161.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:03.652626038 CEST6185953192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:04.650317907 CEST6185953192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:05.650367022 CEST6185953192.168.2.71.1.1.1
                                                                        Apr 19, 2024 12:29:06.136006117 CEST53618591.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:06.136070967 CEST53618591.1.1.1192.168.2.7
                                                                        Apr 19, 2024 12:29:06.136090994 CEST53618591.1.1.1192.168.2.7
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Apr 19, 2024 12:29:00.450416088 CEST192.168.2.71.1.1.10xbbffStandard query (0)files.news.baidu.comA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:01.462941885 CEST192.168.2.71.1.1.10xbbffStandard query (0)files.news.baidu.comA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:02.478410959 CEST192.168.2.71.1.1.10xbbffStandard query (0)files.news.baidu.comA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:03.268181086 CEST192.168.2.71.1.1.10xa7c6Standard query (0)hotnews.dftoutiao.comA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:03.652626038 CEST192.168.2.71.1.1.10xd641Standard query (0)report.thorzip.muxin.funA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:04.650317907 CEST192.168.2.71.1.1.10xd641Standard query (0)report.thorzip.muxin.funA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:05.650367022 CEST192.168.2.71.1.1.10xd641Standard query (0)report.thorzip.muxin.funA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Apr 19, 2024 12:29:03.049814939 CEST1.1.1.1192.168.2.70xbbffName error (3)files.news.baidu.comnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:03.049834967 CEST1.1.1.1192.168.2.70xbbffName error (3)files.news.baidu.comnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:03.049846888 CEST1.1.1.1192.168.2.70xbbffName error (3)files.news.baidu.comnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:03.595885992 CEST1.1.1.1192.168.2.70xa7c6Name error (3)hotnews.dftoutiao.comnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:06.136006117 CEST1.1.1.1192.168.2.70xd641Name error (3)report.thorzip.muxin.funnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:06.136070967 CEST1.1.1.1192.168.2.70xd641Name error (3)report.thorzip.muxin.funnonenoneA (IP address)IN (0x0001)false
                                                                        Apr 19, 2024 12:29:06.136090994 CEST1.1.1.1192.168.2.70xd641Name error (3)report.thorzip.muxin.funnonenoneA (IP address)IN (0x0001)false

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Target ID:0
                                                                        Start time:12:28:58
                                                                        Start date:19/04/2024
                                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe"
                                                                        Imagebase:0x400000
                                                                        File size:1'112'208 bytes
                                                                        MD5 hash:AF1E56057951887A763D4E97670A1036
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1201641660.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1233899209.000000007FD40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        No disassembly