Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Jw1Ua7eGIy

Overview

General Information

Sample name:Jw1Ua7eGIy
renamed because original name is a hash value
Original sample name:339755fa1ea64f3f0f7ce7950d8186ef008655369fbe527750eccabe9aaeb3e8
Analysis ID:1598458
MD5:81f58e67dcf91406a7f0f2aa59f0cf26
SHA1:9b820051894cd024b5ebb72c019fba0eca85d55e
SHA256:339755fa1ea64f3f0f7ce7950d8186ef008655369fbe527750eccabe9aaeb3e8
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Drops PE files
Enables debug privileges
Enables driver privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64_ra
  • Jw1Ua7eGIy.exe (PID: 5992 cmdline: "C:\Users\user\Desktop\Jw1Ua7eGIy.exe" MD5: 81F58E67DCF91406A7F0F2AA59F0CF26)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Jw1Ua7eGIyReversingLabs: Detection: 83%
Source: Jw1Ua7eGIyVirustotal: Detection: 73%Perma Link
Source: Jw1Ua7eGIyStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: zh-cnReferer: http://www.baidu.com/User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)Host: www.baidu.com
Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: zh-cnReferer: http://www.baidu.com/User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)Host: www.baidu.com
Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: zh-cnReferer: http://www.baidu.com/User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)Host: www.baidu.com
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.baidu.com
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess token adjusted: Load Driver
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess token adjusted: Security
Source: Jw1Ua7eGIyStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal52.evad.win@1/4@3/23
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile created: C:\Users\user\Desktop\ \
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeMutant created: NULL
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile created: C:\Users\user\AppData\Local\Temp\5cd9c6.tmp
Source: Jw1Ua7eGIyStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile read: C:\Users\user\Desktop\ \ .ini
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Jw1Ua7eGIyReversingLabs: Detection: 83%
Source: Jw1Ua7eGIyVirustotal: Detection: 73%
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: winmm.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: ntmarta.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: textshaping.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: winhttpcom.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: sxs.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: winhttp.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: webio.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: mswsock.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: winnsi.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: sspicli.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: dnsapi.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: rasadhlp.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: fwpuclnt.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: wininet.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: textinputframework.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: coreuicomponents.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: coremessaging.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: wintypes.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: wintypes.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: wintypes.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeSection loaded: iertutil.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}\InProcServer32
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile written: C:\Users\user\Desktop\ \ .ini
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeWindow found: window name: SysTabControl32
Source: Jw1Ua7eGIyStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Jw1Ua7eGIyStatic file information: File size 1966080 > 1048576
Source: Jw1Ua7eGIyStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x128000
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile created: C:\Users\user\AppData\Local\Temp\5cd9c6.tmpJump to dropped file
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile created: C:\Users\user\AppData\Local\Temp\5cda33.tmpJump to dropped file
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile opened: C:\Windows\SysWOW64\ntdll.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeFile opened: C:\Windows\SysWOW64\ntdll.dll
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5cd9c6.tmpJump to dropped file
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5cda33.tmpJump to dropped file
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exe TID: 6344Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exe TID: 6400Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exe TID: 6348Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exe TID: 6344Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\Jw1Ua7eGIy.exeProcess token adjusted: Debug
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
LSASS Driver
1
LSASS Driver
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory2
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Jw1Ua7eGIy83%ReversingLabsWin32.PUA.Packunwan
Jw1Ua7eGIy74%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\5cd9c6.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\5cd9c6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\5cda33.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\5cda33.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.wshifen.com
103.235.47.188
truefalse
    high
    www.baidu.com
    unknown
    unknownfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      103.235.47.188
      www.wshifen.comHong Kong
      55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
      103.235.46.96
      unknownHong Kong
      55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1598458
      Start date and time:2025-01-24 10:05:34 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      Analysis Mode:stream
      Analysis stop reason:Timeout
      Sample name:Jw1Ua7eGIy
      renamed because original name is a hash value
      Original Sample Name:339755fa1ea64f3f0f7ce7950d8186ef008655369fbe527750eccabe9aaeb3e8
      Detection:MAL
      Classification:mal52.evad.win@1/4@3/23
      • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
      • Not all processes where analyzed, report is missing behavior information
      Process:C:\Users\user\Desktop\Jw1Ua7eGIy.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1699896
      Entropy (8bit):6.290547513916722
      Encrypted:false
      SSDEEP:
      MD5:5564A98A4692BA8B2D25770FB834D5F6
      SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
      SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
      SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 0%, Browse
      Reputation:unknown
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\Jw1Ua7eGIy.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1679648
      Entropy (8bit):5.3288490918902225
      Encrypted:false
      SSDEEP:
      MD5:2E8AB67DC55089DFBCBFA7710BD15B07
      SHA1:159434853CE512029314C6B70070220D251A924A
      SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
      SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 0%, Browse
      Reputation:unknown
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\Jw1Ua7eGIy.exe
      File Type:ISO-8859 text, with CRLF line terminators
      Category:modified
      Size (bytes):848
      Entropy (8bit):4.848891775683341
      Encrypted:false
      SSDEEP:
      MD5:5DC802E89EC0DEB285F71E6FE6170FA0
      SHA1:C29A45FA276E7A482960E6408AFB901B04CCCFE1
      SHA-256:C02D1415BE3BB27FC215C30C450354D0B059A6A706CCF97900B8BAFEDB2B5253
      SHA-512:55013E5D4DC402E28BC9CD60628C8C146BF724F0E806309FD43666DBE8B75771CB020E50B229192CD9D38E87B4E242DFDB516580550A98D46D5BBCD5AA5695E6
      Malicious:false
      Reputation:unknown
      Preview:[....]...........=32..........13=............13=...........13=..........14=............14=...........14=..........15=............15=...........15=..........16=............16=...........16=..........9=............9=...........9=..........10=............10=...........10=..........11=............11=...........11=..........12=............12=...........12=..........5=............5=...........5=..........6=............6=...........6=..........7=............7=...........7=..........8=............8=...........8=..........4=............4=...........4=..........3=............3=...........3=..........2=............2=...........2=............1=...........1=..........1=..
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.518213571267381
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.83%
      • Windows Screen Saver (13104/52) 0.13%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Jw1Ua7eGIy
      File size:1'966'080 bytes
      MD5:81f58e67dcf91406a7f0f2aa59f0cf26
      SHA1:9b820051894cd024b5ebb72c019fba0eca85d55e
      SHA256:339755fa1ea64f3f0f7ce7950d8186ef008655369fbe527750eccabe9aaeb3e8
      SHA512:a41c9f7a762ddbbbb859fc66c374a8d43a2f7d27c102446979c4d505e8b9f46f6a7ef739494fcd7705a2f70fb2a3b6f5520b7472579d0cdd92f646e4e60b8791
      SSDEEP:24576:dFH6RN4saziteyzMVkbkc+/PrP7W4VW5eKz5ohGHbVdCHBIZ740Q5yv49s:dMZHzc7MeK+iJdChqQG
      TLSH:B8958D23B103C0B2E11A1EF291A51B78ADB44B692C78D69BFBE0DD657C72432D77620D
      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........+.r.Jr!.Jr!.Jr!.Uy!.Jr!.Ux!.Jr!.V|!.Jr!.V~!.Jr!.Ua!.Jr!.Ua!.Jr!.Js!.Hr!.B/!.Jr!.ly!.Jr!.lx!OJr!pUy!.Jr!pUx!.Jr!.Jr!.Jr!_Lt!.Jr
      Icon Hash:9eb3c18c2ceea99a
      Entrypoint:0x508081
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:
      Time Stamp:0x675B0EEA [Thu Dec 12 16:27:22 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:1842a2bea56f918ab8efc402aa0c88e7
      Instruction
      push ebp
      mov ebp, esp
      push FFFFFFFFh
      push 005B6F18h
      push 0050B254h
      mov eax, dword ptr fs:[00000000h]
      push eax
      mov dword ptr fs:[00000000h], esp
      sub esp, 58h
      push ebx
      push esi
      push edi
      mov dword ptr [ebp-18h], esp
      call dword ptr [00529184h]
      xor edx, edx
      mov dl, ah
      mov dword ptr [00607494h], edx
      mov ecx, eax
      and ecx, 000000FFh
      mov dword ptr [00607490h], ecx
      shl ecx, 08h
      add ecx, edx
      mov dword ptr [0060748Ch], ecx
      shr eax, 10h
      mov dword ptr [00607488h], eax
      push 00000001h
      call 00007F387C6C805Ch
      pop ecx
      test eax, eax
      jne 00007F387C6C2DCAh
      push 0000001Ch
      call 00007F387C6C2E88h
      pop ecx
      call 00007F387C6C7E07h
      test eax, eax
      jne 00007F387C6C2DCAh
      push 00000010h
      call 00007F387C6C2E77h
      pop ecx
      xor esi, esi
      mov dword ptr [ebp-04h], esi
      call 00007F387C6C7C35h
      call dword ptr [00529324h]
      mov dword ptr [0060C6C4h], eax
      call 00007F387C6C7AF3h
      mov dword ptr [00607400h], eax
      call 00007F387C6C789Ch
      call 00007F387C6C77DEh
      call 00007F387C6C6A95h
      mov dword ptr [ebp-30h], esi
      lea eax, dword ptr [ebp-5Ch]
      push eax
      call dword ptr [005291B0h]
      call 00007F387C6C776Fh
      mov dword ptr [ebp-64h], eax
      test byte ptr [ebp-30h], 00000001h
      je 00007F387C6C2DC8h
      movzx eax, word ptr [ebp+00h]
      Programming Language:
      • [C++] VS98 (6.0) SP6 build 8804
      • [ C ] VS98 (6.0) SP6 build 8804
      • [C++] VS98 (6.0) build 8168
      • [ C ] VS98 (6.0) build 8168
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1befe80x104.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x20d0000x5958.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x1290000x728.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1275be0x1280000512cd3a237dfcd6cf4cc21edf9d374aFalse0.4221974965688345data6.447154656554235IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x1290000x984700x9900037877205610508fc966267d5d4989dcaFalse0.5766984528186274data6.6148385786976895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x1c20000x4a6ca0x18000dc162f5d39a0ccb6ff040fd8bce7a3adFalse0.2975565592447917data5.020245712398399IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x20d0000x59580x6000528ca5b2cec3665728cc3ed6a9aaab74False0.2978515625data4.822628667004094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      TEXTINCLUDE0x20dbfc0xbASCII text, with no line terminatorsChineseChina1.7272727272727273
      TEXTINCLUDE0x20dc080x16dataChineseChina1.3636363636363635
      TEXTINCLUDE0x20dc200x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
      RT_CURSOR0x20dd740x134dataChineseChina0.5811688311688312
      RT_CURSOR0x20dea80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
      RT_CURSOR0x20dfdc0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
      RT_CURSOR0x20e1100xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
      RT_BITMAP0x20e1c40x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
      RT_BITMAP0x20e40c0x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
      RT_BITMAP0x20e5500x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
      RT_BITMAP0x20e6a80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
      RT_BITMAP0x20e8000x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
      RT_BITMAP0x20e9580x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
      RT_BITMAP0x20eab00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
      RT_BITMAP0x20ec080x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
      RT_BITMAP0x20ed600x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
      RT_BITMAP0x20eeb80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
      RT_BITMAP0x20f0100x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
      RT_BITMAP0x20f5f40xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
      RT_BITMAP0x20f6ac0x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
      RT_BITMAP0x20f8180x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
      RT_ICON0x20f95c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
      RT_ICON0x20fc440x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
      RT_ICON0x20fd6c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.3885135135135135
      RT_ICON0x20fe940x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.33198924731182794
      RT_ICON0x21017c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.22378048780487805
      RT_MENU0x2107e40xcdataChineseChina1.5
      RT_MENU0x2107f00x284dataChineseChina0.5
      RT_DIALOG0x210a740x98dataChineseChina0.7171052631578947
      RT_DIALOG0x210b0c0x17adataChineseChina0.5185185185185185
      RT_DIALOG0x210c880xfadataChineseChina0.696
      RT_DIALOG0x210d840xeadataChineseChina0.6239316239316239
      RT_DIALOG0x210e700x8aedataChineseChina0.39603960396039606
      RT_DIALOG0x2117200xb2dataChineseChina0.7359550561797753
      RT_DIALOG0x2117d40xccdataChineseChina0.7647058823529411
      RT_DIALOG0x2118a00xb2dataChineseChina0.6629213483146067
      RT_DIALOG0x2119540xe2dataChineseChina0.6637168141592921
      RT_DIALOG0x211a380x18cdataChineseChina0.5227272727272727
      RT_STRING0x211bc40x50dataChineseChina0.85
      RT_STRING0x211c140x2cdataChineseChina0.5909090909090909
      RT_STRING0x211c400x78dataChineseChina0.925
      RT_STRING0x211cb80x1c4dataChineseChina0.8141592920353983
      RT_STRING0x211e7c0x12adataChineseChina0.5201342281879194
      RT_STRING0x211fa80x146dataChineseChina0.6288343558282209
      RT_STRING0x2120f00x40dataChineseChina0.65625
      RT_STRING0x2121300x64dataChineseChina0.73
      RT_STRING0x2121940x1d8dataChineseChina0.6758474576271186
      RT_STRING0x21236c0x114dataChineseChina0.6376811594202898
      RT_STRING0x2124800x24dataChineseChina0.4444444444444444
      RT_GROUP_CURSOR0x2124a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
      RT_GROUP_CURSOR0x2124b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
      RT_GROUP_CURSOR0x2124cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
      RT_GROUP_ICON0x2124f00x30data0.9166666666666666
      RT_GROUP_ICON0x2125200x14dataChineseChina1.2
      RT_GROUP_ICON0x2125340x14dataChineseChina1.25
      RT_VERSION0x2125480x240dataChineseChina0.5642361111111112
      RT_MANIFEST0x2127880x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
      DLLImport
      WINMM.dllmidiStreamOut, midiOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, waveOutGetNumDevs, waveOutOpen, midiOutUnprepareHeader, midiStreamOpen, midiStreamProperty, midiStreamStop, midiOutReset, midiStreamClose, midiStreamRestart, waveOutUnprepareHeader, waveOutRestart, waveOutPrepareHeader
      WS2_32.dllWSACleanup, inet_ntoa, closesocket, getpeername, accept, ntohl, WSAAsyncSelect, recvfrom, ioctlsocket, recv
      KERNEL32.dllGetCurrentProcess, TerminateProcess, SetLastError, GetTimeZoneInformation, GetVersion, CreateMutexA, ReleaseMutex, GetFileSize, SuspendThread, GetACP, HeapSize, RaiseException, GetLocalTime, GetSystemTime, RtlUnwind, GetStartupInfoA, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GlobalFlags, GetCurrentThread, GetFileTime, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, lstrcmpiA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, DuplicateHandle, lstrcpynA, FileTimeToLocalFileTime, FileTimeToSystemTime, LocalFree, InterlockedDecrement, InterlockedIncrement, SetFilePointer, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, InterlockedExchange, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, ExpandEnvironmentStringsA, GlobalAlloc, GlobalLock, GlobalUnlock, FindFirstFileA, FindClose, GetFileAttributesA, DeleteFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, GetCommandLineA, GetTickCount, WaitForSingleObject, CloseHandle, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, VirtualAlloc, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetStdHandle, TerminateThread
      USER32.dllDestroyAcceleratorTable, GetWindow, GetActiveWindow, SetFocus, IsIconic, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, GetSysColorBrush, IsZoomed, PostQuitMessage, CopyAcceleratorTableA, GetKeyState, TranslateAcceleratorA, IsWindowEnabled, ShowWindow, SystemParametersInfoA, LoadImageA, EnumDisplaySettingsA, ClientToScreen, EnableMenuItem, GetSubMenu, GetDlgCtrlID, CreateAcceleratorTableA, CreateMenu, ModifyMenuA, AppendMenuA, DrawIconEx, CreateIconFromResource, CreateIconFromResourceEx, RegisterClipboardFormatA, CopyRect, LoadBitmapA, WinHelpA, SetRectEmpty, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, LoadStringA, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, InflateRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, PeekMessageA, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, SetMenu, GetMenu, DispatchMessageA, GetMessageA, WindowFromPoint, DrawFocusRect, DrawEdge, DrawFrameControl, TranslateMessage, LoadIconA, GetKeyboardLayout, VkKeyScanExA, GetDesktopWindow, GetClassNameA, keybd_event, GetDlgItem, GetWindowTextA, DeleteMenu, GetSystemMenu, DefWindowProcA, EnableWindow, GetClassInfoA, KillTimer, UnregisterClassA, CreatePopupMenu, GetWindowTextLengthA, CharUpperA, GetWindowDC, BeginPaint, EndPaint, TabbedTextOutA, DrawTextA, GrayStringA, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetNextDlgTabItem, GetWindowPlacement, RegisterWindowMessageA, GetForegroundWindow, GetLastActivePopup, GetMessageTime, RemovePropA, CallWindowProcA, GetPropA, UnhookWindowsHookEx, SetPropA, GetClassLongA, CallNextHookEx, SetWindowsHookExA, CreateWindowExA, GetMenuItemID, GetMenuItemCount, RegisterClassA, GetScrollPos, AdjustWindowRectEx, MapWindowPoints, SendDlgItemMessageA, ScrollWindowEx, IsDialogMessageA, SetWindowTextA, MoveWindow, CheckMenuItem
      GDI32.dllTextOutA, RectVisible, PtVisible, GetViewportExtEx, ExtSelectClipRgn, LineTo, MoveToEx, ExcludeClipRect, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, CreateCompatibleDC, Ellipse, Rectangle, LPtoDP, ExtTextOutA, GetCurrentObject, RoundRect, GetTextExtentPoint32A, GetDeviceCaps, CreateDIBitmap, DeleteObject, SelectClipRgn, CreatePolygonRgn, GetClipRgn, SetStretchBltMode, CreateRectRgnIndirect, SetBkColor, GetClipBox, ScaleWindowExtEx, SetWindowExtEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetTextColor, SetROP2, Escape, GetTextMetricsA, GetStockObject, CreateFontIndirectA, CreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, SetPolyFillMode, SetBkMode, RestoreDC, SaveDC, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, GetDIBits, RealizePalette, GetSystemPaletteEntries, StretchBlt, DPtoLP, SelectPalette, CreatePalette
      WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
      ADVAPI32.dllRegQueryValueExA, RegOpenKeyExA, RegSetValueExA, RegQueryValueA, RegCreateKeyExA, RegCloseKey
      SHELL32.dllShellExecuteA, Shell_NotifyIconA
      ole32.dllCLSIDFromProgID, OleRun, CoCreateInstance, CLSIDFromString, OleUninitialize, OleInitialize
      OLEAUT32.dllUnRegisterTypeLib, LoadTypeLib, LHashValOfNameSys, RegisterTypeLib, SafeArrayPutElement, SafeArrayCreate, SafeArrayDestroy, SysAllocString, VariantInit, VariantCopyInd, SafeArrayGetElement, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, VariantChangeType, VariantClear
      COMCTL32.dllImageList_Destroy
      comdlg32.dllChooseColorA, GetFileTitleA, GetSaveFileNameA, GetOpenFileNameA
      Language of compilation systemCountry where language is spokenMap
      ChineseChina