Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe

Overview

General Information

Sample name:SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe
Analysis ID:1429026
MD5:b1f4de35bbe7146f49c7d99e1e3428d7
SHA1:9327fda584f1bead79ca9e88350213cfe11d86d7
SHA256:89d19fc31c09ba59b296449138111a40baee2e5d3d85d3ea93874e369db82604
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2043298741.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      0.0.SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeVirustotal: Detection: 7%Perma Link
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe, 00000000.00000000.2043298741.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_0502a3fa-a
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeString found in binary or memory: http://fontawesome.io
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeString found in binary or memory: http://fontawesome.io/license/
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeString found in binary or memory: http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: Number of sections : 11 > 10
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal48.winEXE@1/0@0/0
        Source: Yara matchFile source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.2043298741.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe, 00000000.00000000.2044079750.00000000009E4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO ordentipo (CODORDTIPO, ord_tipo, ctaco_tipo, calcula_utilidad, carga_inventario, maneja_costo, dialogos_costo, maneja_puntos, maneja_iva, maneja_kardex, maneja_pagos, carga_ctaco, maneja_caja, acumula_productos, seleccionar, correlativo, tipo_correlativo, utiliza_correlativo, presenta_dialogo_pagos, presenta_precios, pago, reporte, facturacion, imprime_solo_operadas, seleccionar2, emite_recibo, reporte2, maneja_productos, modifica_costos, numero_lineas, descripcion_corta, produccion0, produccion1, utiliza_correlativo2, cambiar_bodega, modifica_precios_publico, guarda_precio_dolares, permite_utilizar_cuenta_predeterminada, tipo_producto_fisico, tipo_producto_documento, CODUNICO, activo, columna_pagos) VALUES ('TRANS_RECIBIDA', 'TRANSFERENCIA RECIBIDA', 'NO APLICA', 'NO', 'CARGA', 'COSTO', 'PCOSTO', 'NO', 'NO', 'SI', 'NO', 'NO APLICA', 'NO APLICA', 'NO', 'SI', 9, 'NULL', 'SI', 'NO', 'NO', 'NO', 'InventarioTransferenciaRecibida.fr3', 'NO', 'SI', 'NO', 'NO', 'NULL', 'SI', 'NO', 0, 'TREMR', 'CARGA', 'DESCARGA', 'SI', 'NO', 'NO', 'NO', 'NO', 'SI', '%', 31, 'SI', 'PAGOS E IMPORTE');
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeVirustotal: Detection: 7%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: colorui.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: mscms.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: coloradapterclient.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: compstui.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: inetres.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic file information: File size 6604800 > 1048576
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x533c00
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: More than 200 imports for user32.dll
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeStatic PE information: section name: .didata
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeBinary or memory string: Shell_TrayWndSVW
        Source: SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exeBinary or memory string: Shell_TrayWndReBarWindow32MSTaskSwWClassToolbarWindow32SV
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Process Injection
        1
        Process Injection
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        DLL Side-Loading
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe12%ReversingLabs
        SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe7%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://fontawesome.ioSecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exefalse
          high
          http://fontawesome.io/license/SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exefalse
            high
            http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licensSecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exefalse
              unknown
              No contacted IP infos
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1429026
              Start date and time:2024-04-20 05:31:09 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 48s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:2
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe
              Detection:MAL
              Classification:mal48.winEXE@1/0@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.66864180726874
              TrID:
              • Win32 Executable (generic) a (10002005/4) 98.45%
              • Inno Setup installer (109748/4) 1.08%
              • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              File name:SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe
              File size:6'604'800 bytes
              MD5:b1f4de35bbe7146f49c7d99e1e3428d7
              SHA1:9327fda584f1bead79ca9e88350213cfe11d86d7
              SHA256:89d19fc31c09ba59b296449138111a40baee2e5d3d85d3ea93874e369db82604
              SHA512:18b390a6ffc8b9f998520504e84280bc313ab12aea0f493a9a80b97377f9ce9088af4b97c87de989e899435508a25f2fac1b0978a14d3209ec411b2981d6836b
              SSDEEP:98304:8sA6oJtLXOkEhawOrbo2zJIsZrvYn7lEReWAKgf:82oJtLOkEhawOrb8qTj12f
              TLSH:03668D13B285543FD0AB1A36483F9798693FBB603A2A8D5B67F00C5C8F356817D26B47
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:0f0f1d65651f0f0f
              Entrypoint:0x93a994
              Entrypoint Section:.itext
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              DLL Characteristics:
              Time Stamp:0x5FA41B1B [Thu Nov 5 15:32:43 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:c7365ceb54c7201bf3502e2b1988b288
              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFF0h
              push ebx
              mov eax, 00928CDCh
              call 00007F6160E33304h
              mov eax, dword ptr [00951D78h]
              mov eax, dword ptr [eax]
              cmp byte ptr [eax+40h], 00000000h
              je 00007F616135B9E2h
              mov eax, dword ptr [00951D78h]
              mov eax, dword ptr [eax]
              call 00007F6161040CAFh
              test al, al
              je 00007F616135B9DEh
              mov eax, dword ptr [00951D78h]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [eax]
              call dword ptr [edx+48h]
              mov ecx, dword ptr [00951AA4h]
              mov eax, dword ptr [00951D78h]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [00928A04h]
              mov ebx, dword ptr [eax]
              call dword ptr [ebx+44h]
              mov eax, dword ptr [00951D78h]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [eax]
              call dword ptr [edx+4Ch]
              pop ebx
              call 00007F6160E2BAD1h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x5e20000xa0.edata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x5dc0000x4700.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x64b0000x90c00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e50000x65284.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x5e40000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x5dcd400xae8.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5e10000xb0e.didata
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x533af80x533c004c2d7f86b007507acec708e0429b4184unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .itext0x5350000x59f80x5a004b432f63730af58acd1f5c39e593e2e4False0.46197916666666666data5.946727425075548IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x53b0000x174380x17600b8afb01465de1d29a4fb40979aefa775False0.6573466744652406data6.658850933731549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x5530000x886a40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x5dc0000x47000x48008b3b4df6c3a34e3601d3719fc8d4c4bfFalse0.3083767361111111data5.263301922913206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .didata0x5e10000xb0e0xc00074f3b7b976d8d9ccebe93027d5aa10bFalse0.3310546875data3.987196740345137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .edata0x5e20000xa00x200f9295b5289476acc35fe1f21c02e7aa8False0.267578125data1.986654226521265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x5e30000x580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x5e40000x5c0x2004dfe9679c9789aaf6be6f6643656d090False0.1875data1.3630099847922963IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x5e50000x652840x65400e26fd5601e39d912eeb123b906146665False0.565721450617284data6.719712844822282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x64b0000x90c000x90c00b9cbf7a5da4674fd72bc446ca406639aFalse0.46383176813471505data6.4062212517945465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              UNICODEDATA0x64dd580x723fdata0.36769583205115053
              UNICODEDATA0x654f980x7ebddata0.42552011095700415
              UNICODEDATA0x65ce580x6a8data0.5985915492957746
              UNICODEDATA0x65d5000xaf7ddata0.4191430161380078
              UNICODEDATA0x6684800xd3cfdata0.4500857569666009
              UNICODEDATA0x6758500x14c5data0.6482979123565921
              RT_CURSOR0x676d180x134dataEnglishUnited States0.2922077922077922
              RT_CURSOR0x676e4c0x134dataEnglishUnited States0.4642857142857143
              RT_CURSOR0x676f800x134dataEnglishUnited States0.4805194805194805
              RT_CURSOR0x6770b40x134dataEnglishUnited States0.38311688311688313
              RT_CURSOR0x6771e80x134dataEnglishUnited States0.36038961038961037
              RT_CURSOR0x67731c0x134dataEnglishUnited States0.4090909090909091
              RT_CURSOR0x6774500x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
              RT_CURSOR0x6775840x134Targa image data 64 x 65536 x 1 +32 "\001"0.3961038961038961
              RT_CURSOR0x6776b80x134Targa image data 64 x 65536 x 1 +32 "\001"0.31493506493506496
              RT_CURSOR0x6777ec0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
              RT_BITMAP0x6779200x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
              RT_BITMAP0x677af00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
              RT_BITMAP0x677cd40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
              RT_BITMAP0x677ea40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
              RT_BITMAP0x6780740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
              RT_BITMAP0x6782440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
              RT_BITMAP0x6784140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
              RT_BITMAP0x6785e40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
              RT_BITMAP0x6787b40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
              RT_BITMAP0x6789840x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
              RT_BITMAP0x678b540xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
              RT_BITMAP0x678c140xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
              RT_BITMAP0x678cf40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
              RT_BITMAP0x678dd40x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 44EnglishUnited States0.391304347826087
              RT_BITMAP0x678e300x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 44EnglishUnited States0.532608695652174
              RT_BITMAP0x678e8c0x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 44EnglishUnited States0.4782608695652174
              RT_BITMAP0x678ee80x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 44EnglishUnited States0.5543478260869565
              RT_BITMAP0x678f440x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 44EnglishUnited States0.4673913043478261
              RT_BITMAP0x678fa00x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.328042328042328
              RT_BITMAP0x6794100x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.3289241622574956
              RT_BITMAP0x6798800x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.40476190476190477
              RT_BITMAP0x679cf00x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.09435626102292768
              RT_BITMAP0x67a1600x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.23721340388007053
              RT_BITMAP0x67a5d00x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.29188712522045857
              RT_BITMAP0x67aa400x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.1675485008818342
              RT_BITMAP0x67aeb00x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.2892416225749559
              RT_BITMAP0x67b3200x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.2751322751322751
              RT_BITMAP0x67b7900x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.30776014109347444
              RT_BITMAP0x67bc000x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.2777777777777778
              RT_BITMAP0x67c0700x46eDevice independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/mEnglishUnited States0.41887125220458554
              RT_BITMAP0x67c4e00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
              RT_BITMAP0x67c5c00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
              RT_BITMAP0x67c6800xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
              RT_BITMAP0x67c7400x2a4Device independent bitmap graphic, 84 x 13 x 4, image size 572, 16 important colors0.257396449704142
              RT_BITMAP0x67c9e40x128Device independent bitmap graphic, 28 x 12 x 4, image size 1920.5337837837837838
              RT_BITMAP0x67cb0c0x128Device independent bitmap graphic, 28 x 12 x 4, image size 192, 16 important colors0.5067567567567568
              RT_BITMAP0x67cc340xc8Device independent bitmap graphic, 14 x 12 x 4, image size 96, resolution 2835 x 2835 px/m, 16 important colors0.48
              RT_BITMAP0x67ccfc0xc8Device independent bitmap graphic, 14 x 12 x 4, image size 96, resolution 2835 x 2835 px/m, 16 important colors0.58
              RT_BITMAP0x67cdc40xc8Device independent bitmap graphic, 14 x 12 x 4, image size 960.535
              RT_BITMAP0x67ce8c0xc8Device independent bitmap graphic, 14 x 12 x 4, image size 96, resolution 3811 x 3811 px/m, 16 important colors0.65
              RT_BITMAP0x67cf540xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
              RT_BITMAP0x67d0340xc58Device independent bitmap graphic, 51 x 20 x 24, image size 3120EnglishUnited States0.45126582278481014
              RT_BITMAP0x67dc8c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
              RT_BITMAP0x67dd4c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
              RT_BITMAP0x67de2c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
              RT_BITMAP0x67df140xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
              RT_BITMAP0x67dfd40xc8Device independent bitmap graphic, 13 x 12 x 4, image size 96EnglishUnited States0.445
              RT_BITMAP0x67e09c0xc8Device independent bitmap graphic, 13 x 12 x 4, image size 96EnglishUnited States0.48
              RT_BITMAP0x67e1640x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States0.39888535031847133
              RT_BITMAP0x67e64c0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.5625
              RT_BITMAP0x67e71c0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.4855769230769231
              RT_BITMAP0x67e7ec0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.4326923076923077
              RT_BITMAP0x67e8bc0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.5576923076923077
              RT_BITMAP0x67e98c0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.4807692307692308
              RT_BITMAP0x67ea5c0xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States0.5625
              RT_BITMAP0x67eb2c0x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States0.4036624203821656
              RT_BITMAP0x67f0140x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States0.4124203821656051
              RT_BITMAP0x67f4fc0x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States0.4028662420382166
              RT_BITMAP0x67f9e40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
              RT_ICON0x67fac40x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6897163120567376
              RT_ICON0x67ff2c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.5733606557377049
              RT_ICON0x6808b40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.4896810506566604
              RT_ICON0x68195c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.38392116182572616
              RT_ICON0x683f040x9978PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9986000814498066
              RT_DIALOG0x68d87c0x52data0.7682926829268293
              RT_DIALOG0x68d8d00x52data0.7560975609756098
              RT_STRING0x68d9240x102dataRussianRussia0.5891472868217055
              RT_STRING0x68da280xd0dataEnglishUnited States0.6105769230769231
              RT_STRING0x68daf80x40dataEnglishUnited States0.53125
              RT_STRING0x68db380xc4Matlab v4 mat-file (little endian) u, numeric, rows 0, columns 0FrenchFrance0.6377551020408163
              RT_STRING0x68dbfc0xa0dataFrenchFrance0.6375
              RT_STRING0x68dc9c0x7cdataGermanGermany0.7016129032258065
              RT_STRING0x68dd180xbedataGermanGermany0.6263157894736842
              RT_STRING0x68ddd80x150dataItalianItaly0.5476190476190477
              RT_STRING0x68df280xdedataPolishPoland0.6711711711711712
              RT_STRING0x68e0080x46AmigaOS bitmap font "r", 21504 elements, 2nd, 3rdPolishPoland0.6285714285714286
              RT_STRING0x68e0500xacMatlab v4 mat-file (little endian) n, numeric, rows 0, columns 0PortuguesePortugal0.6976744186046512
              RT_STRING0x68e0fc0x9adataPortuguesePortugal0.6233766233766234
              RT_STRING0x68e1980x66data0.6764705882352942
              RT_STRING0x68e2000xd6data0.6074766355140186
              RT_STRING0x68e2d80x6adata0.5849056603773585
              RT_STRING0x68e3440x8edata0.6690140845070423
              RT_STRING0x68e3d40x1d6data0.5319148936170213
              RT_STRING0x68e5ac0x244data0.49482758620689654
              RT_STRING0x68e7f00x19adata0.5219512195121951
              RT_STRING0x68e98c0x92data0.678082191780822
              RT_STRING0x68ea200x24data0.4166666666666667
              RT_STRING0x68ea440x468data0.3820921985815603
              RT_STRING0x68eeac0xbacdata0.23560910307898258
              RT_STRING0x68fa580x3f8data0.4360236220472441
              RT_STRING0x68fe500x884data0.11788990825688074
              RT_STRING0x6906d40x888data0.13873626373626374
              RT_STRING0x690f5c0x7fcdata0.15851272015655576
              RT_STRING0x6917580x810data0.15746124031007752
              RT_STRING0x691f680x9b4data0.12077294685990338
              RT_STRING0x69291c0x968data0.12666112956810632
              RT_STRING0x6932840x3b8data0.40756302521008403
              RT_STRING0x69363c0x240data0.3784722222222222
              RT_STRING0x69387c0x19cdata0.470873786407767
              RT_STRING0x693a180x124data0.5205479452054794
              RT_STRING0x693b3c0xfcdata0.6190476190476191
              RT_STRING0x693c380x144data0.5432098765432098
              RT_STRING0x693d7c0x440data0.42371323529411764
              RT_STRING0x6941bc0x590data0.34831460674157305
              RT_STRING0x69474c0x5a4data0.3656509695290859
              RT_STRING0x694cf00x588data0.375
              RT_STRING0x6952780x3e4data0.3493975903614458
              RT_STRING0x69565c0x70cdata0.21840354767184036
              RT_STRING0x695d680x48cdata0.41323024054982815
              RT_STRING0x6961f40x404data0.3424124513618677
              RT_STRING0x6965f80x4bcdata0.2623762376237624
              RT_STRING0x696ab40x400data0.33203125
              RT_STRING0x696eb40x488data0.41724137931034483
              RT_STRING0x69733c0x688data0.30801435406698563
              RT_STRING0x6979c40x3d0data0.4108606557377049
              RT_STRING0x697d940x410data0.31826923076923075
              RT_STRING0x6981a40x374data0.4287330316742081
              RT_STRING0x6985180x36cdata0.4223744292237443
              RT_STRING0x6988840x3ecdata0.34760956175298807
              RT_STRING0x698c700x584data0.2556657223796034
              RT_STRING0x6991f40x4a4data0.35353535353535354
              RT_STRING0x6996980x3dcdata0.3248987854251012
              RT_STRING0x699a740x404data0.43093385214007784
              RT_STRING0x699e780x3f8data0.4124015748031496
              RT_STRING0x69a2700x424data0.3650943396226415
              RT_STRING0x69a6940x2b8StarOffice Gallery theme l, 1677731072 objects, 1st l0.45545977011494254
              RT_STRING0x69a94c0xa0data0.7125
              RT_STRING0x69a9ec0xe4data0.6359649122807017
              RT_STRING0x69aad00x2c4data0.4138418079096045
              RT_STRING0x69ad940x254data0.4865771812080537
              RT_STRING0x69afe80x3d0data0.3698770491803279
              RT_STRING0x69b3b80x3b8data0.3760504201680672
              RT_STRING0x69b7700x444data0.358974358974359
              RT_STRING0x69bbb40x350data0.30778301886792453
              RT_STRING0x69bf040x3d8data0.4247967479674797
              RT_STRING0x69c2dc0x45cdata0.38082437275985664
              RT_STRING0x69c7380x57cdata0.34971509971509973
              RT_STRING0x69ccb40x394data0.38318777292576417
              RT_STRING0x69d0480x3a0data0.3286637931034483
              RT_STRING0x69d3e80x40cdata0.3735521235521235
              RT_STRING0x69d7f40xd0data0.5288461538461539
              RT_STRING0x69d8c40xb8data0.6467391304347826
              RT_STRING0x69d97c0x298data0.4819277108433735
              RT_STRING0x69dc140x438data0.3212962962962963
              RT_STRING0x69e04c0x344data0.39593301435406697
              RT_STRING0x69e3900x2dcdata0.38114754098360654
              RT_STRING0x69e66c0x34cdata0.3246445497630332
              RT_RCDATA0x69e9b80xcbfPNG image data, 60 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033711308611708
              RT_RCDATA0x69f6780x3a5PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0117899249732047
              RT_RCDATA0x69fa200x286acTrueType Font data, 13 tables, 1st "FFTM", 24 names, MacintoshEnglishUnited States0.5930183390919854
              RT_RCDATA0x6c80cc0x10data1.5
              RT_RCDATA0x6c80dc0x1394data0.5203511572226656
              RT_RCDATA0x6c94700x2dataEnglishUnited States5.0
              RT_RCDATA0x6c94740x5eaPNG image data, 48 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0072655217965654
              RT_RCDATA0x6c9a600x5c9PNG image data, 48 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0074274139095205
              RT_RCDATA0x6ca02c0x314PNG image data, 48 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.013959390862944
              RT_RCDATA0x6ca3400xb88PNG image data, 48 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9088753387533876
              RT_RCDATA0x6caec80xabcPNG image data, 48 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8966521106259098
              RT_RCDATA0x6cb9840xb4afDelphi compiled form 'Td'0.18999027132201923
              RT_RCDATA0x6d6e340x153Delphi compiled form 'TForm2'0.7197640117994101
              RT_RCDATA0x6d6f880xc3Delphi compiled form 'Tfscarga'0.8615384615384616
              RT_RCDATA0x6d704c0x494Delphi compiled form 'TLoginDialog'0.48976109215017066
              RT_RCDATA0x6d74e00x3c4Delphi compiled form 'TPasswordDialog'0.4678423236514523
              RT_RCDATA0x6d78a40x572Delphi compiled form 'TPathDialogForm'0.5186513629842181
              RT_RCDATA0x6d7e180x1984Delphi compiled form 'TsCalcForm'0.1979485609308022
              RT_RCDATA0x6d979c0x15b4Delphi compiled form 'TsColorDialogForm'0.32199424046076314
              RT_RCDATA0x6dad500x1c0Delphi compiled form 'TsPopupCalendar'0.671875
              RT_GROUP_CURSOR0x6daf100x14dataEnglishUnited States1.3
              RT_GROUP_CURSOR0x6daf240x14Lotus unknown worksheet or configuration, revision 0x11.3
              RT_GROUP_CURSOR0x6daf380x14Lotus unknown worksheet or configuration, revision 0x11.3
              RT_GROUP_CURSOR0x6daf4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x6daf600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
              RT_GROUP_CURSOR0x6daf740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x6daf880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x6daf9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x6dafb00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x6dafc40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_ICON0x6dafd80x4cdataEnglishUnited States0.7763157894736842
              RT_VERSION0x6db0240x34cdataEnglishUnited States0.4537914691943128
              RT_MANIFEST0x6db3700x69fXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.4176991150442478
              DLLImport
              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
              advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
              user32.dllCharNextW, LoadStringW
              kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, CreateDirectoryW, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
              kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
              user32.dllSetClassLongW, GetClassLongW, SetWindowLongW, GetWindowLongW, CreateWindowExW, WindowFromPoint, WindowFromDC, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostThreadMessageW, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, NotifyWinEvent, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MoveWindow, MessageBoxIndirectW, MessageBoxA, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowRgn, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemRect, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCaretPos, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawStateW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyRect, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, CharLowerBuffA, CharUpperBuffA, AdjustWindowRectEx, ActivateKeyboardLayout
              gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetDCPenColor, SetBrushOrgEx, SetBkMode, SetBkColor, SetBitmapBits, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, RemoveFontMemResourceEx, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlgBlt, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStretchBltMode, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetGlyphOutlineW, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetCurrentObject, GetClipBox, GetBrushOrgEx, GetBitmapDimensionEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePen, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, Chord, BitBlt, ArcTo, Arc, AngleArc, AddFontMemResourceEx, AbortDoc
              version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
              kernel32.dlllstrcmpiA, lstrcmpW, WriteProcessMemory, WriteFile, WideCharToMultiByte, WaitNamedPipeW, WaitForSingleObject, WaitForMultipleObjectsEx, WaitForMultipleObjects, VirtualQueryEx, VirtualQuery, VirtualProtectEx, VirtualProtect, VirtualFreeEx, VirtualFree, VirtualAllocEx, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, TerminateThread, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetNamedPipeHandleState, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReleaseMutex, ReadProcessMemory, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileW, LockResource, LocalFree, LoadResource, LoadLibraryW, LoadLibraryExW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStringTypeExW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindNextChangeNotification, FindFirstFileW, FindFirstChangeNotificationW, FindCloseChangeNotification, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateMutexW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringA, CompareStringW, CloseHandle
              advapi32.dllReportEventW, RegisterEventSourceW, RegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExA, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExA, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey, DeregisterEventSource
              advapi32.dllStartServiceCtrlDispatcherW, SetServiceStatus, RegisterServiceCtrlHandlerW, OpenServiceW, OpenSCManagerW, DeleteService, CreateServiceW, CloseServiceHandle
              IMAGEHLP.DLLImageDirectoryEntryToData
              kernel32.dllSleep
              netapi32.dllNetApiBufferFree, NetWkstaGetInfo
              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
              oleaut32.dllGetErrorInfo, VariantInit, SysStringLen, SysFreeString
              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoGetMalloc, CoUninitialize, CoInitialize, IsEqualGUID
              comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
              user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
              msvcrt.dllmemset, memcpy
              shell32.dllShellExecuteExW, ShellExecuteW, Shell_NotifyIconW, ExtractIconW
              shell32.dllSHGetSpecialFolderLocation, SHGetMalloc, SHGetDesktopFolder
              winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
              winspool.drvGetDefaultPrinterW
              wsock32.dll__WSAFDIsSet, WSACleanup, WSAStartup, WSAGetLastError, gethostbyname, socket, shutdown, setsockopt, send, select, recv, ntohs, listen, ioctlsocket, inet_ntoa, inet_addr, htons, getsockopt, getsockname, connect, closesocket, bind, accept
              winmm.dllsndPlaySoundW
              kernel32.dllMulDiv
              oleacc.dllLresultFromObject
              kernel32.dllGetVersionExW
              NameOrdinalAddress
              TMethodImplementationIntercept30x469904
              __dbk_fcall_wrapper20x4121a8
              dbkFCallWrapperAddr10x956634
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              RussianRussia
              FrenchFrance
              GermanGermany
              ItalianItaly
              PolishPoland
              PortuguesePortugal
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:05:32:02
              Start date:20/04/2024
              Path:C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BScope.Backdoor.Androm.14487.24591.exe"
              Imagebase:0x400000
              File size:6'604'800 bytes
              MD5 hash:B1F4DE35BBE7146F49C7D99E1E3428D7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Yara matches:
              • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.2043298741.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              No disassembly