Analysis Report EasyEPD.exe
Overview
General Information
Detection
| Score: | 10 |
| Range: | 0 - 100 |
| Whitelisted: | false |
| Confidence: | 40% |
Signatures
Contains functionality for read data from the clipboard
Contains functionality locales information (e.g. system language)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
One or more processes crash
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries keyboard layouts
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Classification
Startup |
|---|
|
Malware Configuration |
|---|
| No configs have been found |
|---|
Yara Overview |
|---|
Initial Sample |
|---|
| Source | Rule | Description | Author | Strings |
|---|---|---|---|---|
| JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Memory Dumps |
|---|
| Source | Rule | Description | Author | Strings |
|---|---|---|---|---|
| JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
| JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Unpacked PEs |
|---|
| Source | Rule | Description | Author | Strings |
|---|---|---|---|---|
| JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
| JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Sigma Overview |
|---|
| No Sigma rule has matched |
|---|
Signature Overview |
|---|
Click to jump to signature section
| Source: | Code function: | 0_2_00409E50 | |
| Source: | Code function: | 0_2_0040C472 | |
| Source: | Code function: | 0_2_004098E8 | |
| Source: | Code function: | 0_2_0040D04E | |
| Source: | Code function: | 0_2_0040CDAE | |
| Source: | Code function: | 0_2_0040CE36 | |
| Source: | File created: | Jump to behavior | ||
| Source: | Code function: | 0_2_004036E4 | |
| Source: | Code function: | 0_2_00408718 | |
| Source: | Process created: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Section loaded: | Jump to behavior | ||
| Source: | Classification label: | ||
| Source: | Code function: | 0_2_0040C50A | |
| Source: | Code function: | 0_2_0040C4D2 | |
| Source: | File created: | Jump to behavior | ||
| Source: | Mutant created: | ||
| Source: | File created: | Jump to behavior | ||
| Source: | File source: | ||
| Source: | File source: | ||
| Source: | File source: | ||
| Source: | File source: | ||
| Source: | File source: | ||
| Source: | Key opened: | Jump to behavior | ||
| Source: | Key opened: | Jump to behavior | ||
| Source: | Key opened: | Jump to behavior | ||
| Source: | File read: | Jump to behavior | ||
| Source: | File read: | Jump to behavior | ||
| Source: | Process created: | ||
| Source: | Process created: | ||
| Source: | Automated click: | ||
| Source: | Automated click: | ||
| Source: | Static PE information: | ||
| Source: | Static file information: | ||
| Source: | Static PE information: | ||
| Source: | Static PE information: | ||
| Source: | Code function: | 0_2_00405380 | |
| Source: | Code function: | 0_2_004085D5 | |
| Source: | Code function: | 0_2_004EB808 | |
| Source: | Code function: | 0_2_0041CBA5 | |
| Source: | Code function: | 0_2_0040AE63 | |
| Source: | Code function: | 0_2_004F2B08 | |
| Source: | Code function: | 0_2_004F2B88 | |
| Source: | Key value created or modified: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | Process information set: | Jump to behavior | ||
| Source: | API coverage: | ||
| Source: | File opened: | Jump to behavior | ||
| Source: | Key opened: | Jump to behavior | ||
| Source: | Code function: | 0_2_00409E50 | |
| Source: | Code function: | 0_2_0040C472 | |
| Source: | Code function: | 0_2_004098E8 | |
| Source: | Code function: | 0_2_0040A97E | |
| Source: | Binary or memory string: | ||
| Source: | Binary or memory string: | ||
| Source: | Process information queried: | Jump to behavior | ||
| Source: | Process queried: | Jump to behavior | ||
| Source: | Code function: | 0_2_0040C686 | |
| Source: | Process token adjusted: | Jump to behavior | ||
| Source: | Code function: | 0_2_0040C33E | |
| Source: | Code function: | 0_2_00409F38 | |
| Source: | Code function: | 0_2_00409480 | |
| Source: | Code function: | 0_2_0040C53A | |
| Source: | Code function: | 0_2_0040C532 | |
| Source: | Code function: | 0_2_0040C5F6 | |
| Source: | Code function: | 0_2_0040C5FE | |
Mitre Att&ck Matrix |
|---|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Graphical User Interface1 | Winlogon Helper DLL | Process Injection1 | Masquerading11 | Input Capture11 | System Time Discovery2 | Application Deployment Software | Input Capture11 | Data Encrypted1 | Standard Cryptographic Protocol1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
| Replication Through Removable Media | Service Execution | Port Monitors | Accessibility Features | Modify Registry1 | Network Sniffing | Virtualization/Sandbox Evasion2 | Remote Services | Clipboard Data2 | Exfiltration Over Other Network Medium | Fallback Channels | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
| External Remote Services | Windows Management Instrumentation | Accessibility Features | Path Interception | Virtualization/Sandbox Evasion2 | Input Capture | Process Discovery1 | Windows Remote Management | Data from Network Shared Drive | Automated Exfiltration | Custom Cryptographic Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
| Drive-by Compromise | Scheduled Task | System Firmware | DLL Search Order Hijacking | Process Injection1 | Credentials in Files | Application Window Discovery1 | Logon Scripts | Input Capture | Data Encrypted | Multiband Communication | SIM Card Swap | Premium SMS Toll Fraud | |
| Exploit Public-Facing Application | Command-Line Interface | Shortcut Modification | File System Permissions Weakness | Obfuscated Files or Information1 | Account Manipulation | Security Software Discovery31 | Shared Webroot | Data Staged | Scheduled Transfer | Standard Cryptographic Protocol | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
| Spearphishing Link | Graphical User Interface | Modify Existing Service | New Service | DLL Side-Loading1 | Brute Force | Remote System Discovery1 | Third-party Software | Screen Capture | Data Transfer Size Limits | Commonly Used Port | Jamming or Denial of Service | Abuse Accessibility Features | |
| Spearphishing Attachment | Scripting | Path Interception | Scheduled Task | Software Packing | Two-Factor Authentication Interception | File and Directory Discovery1 | Pass the Hash | Email Collection | Exfiltration Over Command and Control Channel | Uncommonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
| Spearphishing via Service | Third-party Software | Logon Scripts | Process Injection | Indicator Blocking | Bash History | System Information Discovery35 | Remote Desktop Protocol | Clipboard Data | Exfiltration Over Alternative Protocol | Standard Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
Behavior Graph |
|---|
Screenshots |
|---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
|---|
Initial Sample |
|---|
| Source | Detection | Scanner | Label | Link |
|---|---|---|---|---|
| 0% | Virustotal | Browse |
Dropped Files |
|---|
| No Antivirus matches |
|---|
Unpacked PE Files |
|---|
| No Antivirus matches |
|---|
Domains |
|---|
| No Antivirus matches |
|---|
URLs |
|---|
| No Antivirus matches |
|---|
Domains and IPs |
|---|
General Information |
|---|
| Joe Sandbox Version: | 28.0.0 Lapis Lazuli |
| Analysis ID: | 232400 |
| Start date: | 22.05.2020 |
| Start time: | 14:09:09 |
| Joe Sandbox Product: | CloudBasic |
| Overall analysis duration: | 0h 4m 16s |
| Hypervisor based Inspection enabled: | false |
| Report type: | full |
| Sample file name: | EasyEPD.exe |
| Cookbook file name: | default.jbs |
| Analysis system description: | Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 |
| Number of analysed new started processes analysed: | 5 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 0 |
| Technologies: |
|
| Analysis Mode: | default |
| Analysis stop reason: | Timeout |
| Detection: | CLEAN |
| Classification: | clean10.winEXE@2/4@0/0 |
| EGA Information: |
|
| HDC Information: |
|
| HCA Information: | Failed |
| Cookbook Comments: |
|
| Warnings: | Show All
|
Simulations |
|---|
Behavior and APIs |
|---|
| Time | Type | Description |
|---|---|---|
| 14:09:51 | API Interceptor |
Joe Sandbox View / Context |
|---|
Created / dropped Files |
|---|
| Process: | C:\Windows\SysWOW64\WerFault.exe |
| File Type: | |
| Size (bytes): | 12212 |
| Entropy (8bit): | 3.7649932015320884 |
| Encrypted: | false |
| MD5: | 05DE54E2E6594FEEC567745C71ED9136 |
| SHA1: | DC77881C1826B9B4202E0A9F004F837EA9CCF69A |
| SHA-256: | 66605135779B18A3B59A0BD645E82917B923D193755ED4D7793C0CA4CAC3CFE1 |
| SHA-512: | 1AB1C6EDE29C5CDBC9651933E99536B994E61CAE9CD1F5D29111847D51F71765F7D10FCBBE1C140A915CEB8BB2507B4E4C0CA383E8C64DD36F0376B7C0223C79 |
| Malicious: | false |
| Reputation: | low |
| Preview: |
|
| Process: | C:\Windows\SysWOW64\WerFault.exe |
| File Type: | |
| Size (bytes): | 51562 |
| Entropy (8bit): | 2.306193875158645 |
| Encrypted: | false |
| MD5: | C3EDA35CA0A32CFC6055267F7F16BF8F |
| SHA1: | 4130097952B5A0ADEC77311F0A4944B04CA50462 |
| SHA-256: | E51BAF511E51E0903019A9D10E7F7CFC36A5B04D37F3A823C3654994F7E94734 |
| SHA-512: | 37D255E4B37A02D3EA24CC63E6E5D902CB5A631D705110A813692C9A9F1B811A26CDE214EB373DEE0E92E83C7AEE362C9425CCC113410D93BA5CBE531E8CEFA7 |
| Malicious: | false |
| Reputation: | low |
| Preview: |
|
| Process: | C:\Windows\SysWOW64\WerFault.exe |
| File Type: | |
| Size (bytes): | 8280 |
| Entropy (8bit): | 3.699006658372394 |
| Encrypted: | false |
| MD5: | 56386C940A0BA006C0F20F985C3257FE |
| SHA1: | 3159657E5503F2DF8579153B1D3872A91AB748E8 |
| SHA-256: | 3FC838625AD9153237B632369861B7528456436674057AD29BE29D59BD48C239 |
| SHA-512: | E09C76C3E39B2366BAE5E7559AEEF2AB768387A6A79D733D32394741F458B1996A21E5618F54D5966FBE319B36EB5168E99022938F4874B4D328B128469523E3 |
| Malicious: | false |
| Reputation: | low |
| Preview: |
|
| Process: | C:\Windows\SysWOW64\WerFault.exe |
| File Type: | |
| Size (bytes): | 4509 |
| Entropy (8bit): | 4.464635924622455 |
| Encrypted: | false |
| MD5: | 87450C1ACB574A64C1A054397361DD49 |
| SHA1: | E806CE71532376641B14CF5BCF28E10039C78F87 |
| SHA-256: | 8981B252B91595FBC59EB182EDC17869EFED97D38F5A9DAE9441490351DDCDCB |
| SHA-512: | 8C1AD37DA45A1FA4E2D8BA77D13B673E0423832AE6E1271E6FF0BABB8D8478F2F47E272711DE62E4F342F697AD7C0389B142518E35CEE522373ED54D5783C02A |
| Malicious: | false |
| Reputation: | low |
| Preview: |
|
Static File Info |
|---|
General | |
|---|---|
| File type: | |
| Entropy (8bit): | 6.523875690685476 |
| TrID: |
|
| File name: | EasyEPD.exe |
| File size: | 2666496 |
| MD5: | 90ab8ce5d40593917a4615d83e84c3ab |
| SHA1: | b5be87c104ca7ed8164aa50149482b75bf2d68fa |
| SHA256: | 1cfc4117a10016e0d035ffe7fa6ada896908f79687c3c276b162369b1c07f221 |
| SHA512: | ad7ca606d2af28a0acedf478b25db5c83a4dbe25cfc0d3c259a87f81885184ae5d2446a5c2c6f55c682aa9a2d3a2bf6284c6401c15fb5006ebcb49546f7872dd |
| SSDEEP: | 24576:Nd+kWxAX7aWj6NBvCBYC6ELvE4exoOiUM9Z5aB9BmScO99ngpT3woFuKbSp1dDxD:jneoEximASz9nmpUKGpvDkXVH6 |
| File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
File Icon |
|---|
| Icon Hash: | fcf6cbf32f22eefe |
Static PE Info |
|---|
General | |
|---|---|
| Entrypoint: | 0x5f331c |
| Entrypoint Section: | .itext |
| Digitally signed: | false |
| Imagebase: | 0x400000 |
| Subsystem: | windows gui |
| Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
| DLL Characteristics: | |
| Time Stamp: | 0x4C7CE3F9 [Tue Aug 31 11:14:01 2010 UTC] |
| TLS Callbacks: | |
| CLR (.Net) Version: | |
| OS Version Major: | 5 |
| OS Version Minor: | 0 |
| File Version Major: | 5 |
| File Version Minor: | 0 |
| Subsystem Version Major: | 5 |
| Subsystem Version Minor: | 0 |
| Import Hash: | 3874336b8c671d55e7434460e2ffaf7f |
Entrypoint Preview |
|---|
| Instruction |
|---|
| push ebp |
| mov ebp, esp |
| add esp, FFFFFFF0h |
| push ebx |
| mov eax, 005EB3C4h |
| call 00007F945444679Ch |
| mov ebx, dword ptr [005F8228h] |
| mov eax, dword ptr [ebx] |
| call 00007F945453A98Fh |
| mov eax, dword ptr [ebx] |
| mov dl, 01h |
| call 00007F945453C6C2h |
| mov eax, dword ptr [ebx] |
| mov edx, 005F343Ch |
| call 00007F945453A396h |
| mov ecx, dword ptr [005F7B8Ch] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [005DA69Ch] |
| call 00007F945453A97Fh |
| mov ecx, dword ptr [005F7B20h] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [0055A5ACh] |
| call 00007F945453A96Ch |
| mov ecx, dword ptr [005F7D9Ch] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [0054229Ch] |
| call 00007F945453A959h |
| mov ecx, dword ptr [005F8074h] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [0052DED8h] |
| call 00007F945453A946h |
| mov ecx, dword ptr [005F7FCCh] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [005E954Ch] |
| call 00007F945453A933h |
| mov ecx, dword ptr [005F8638h] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [00543F18h] |
| call 00007F945453A920h |
| mov ecx, dword ptr [005F7A54h] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [00541188h] |
| call 00007F945453A90Dh |
| mov ecx, dword ptr [005F84A0h] |
| mov eax, dword ptr [ebx] |
| mov edx, dword ptr [0055AE40h] |
| call 00007F945462EBFAh |
Data Directories |
|---|
| Name | Virtual Address | Virtual Size | Is in Section |
|---|---|---|---|
| IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IMPORT | 0x201000 | 0x3dee | .idata |
| IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x234000 | 0x65000 | .rsrc |
| IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x208000 | 0x2b490 | .reloc |
| IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x207018 | 0x9 | .rdata |
| IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_TLS | 0x207000 | 0x18 | .rdata |
| IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IAT | 0x201b48 | 0x97c | .idata |
| IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x205000 | 0x3a6 | .didata |
| IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
|---|---|---|---|---|---|---|---|---|
| .text | 0x1000 | 0x1f0248 | 0x1f0400 | False | 0.437141845088 | data | 6.41398012348 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
| .itext | 0x1f2000 | 0x144c | 0x1600 | False | 0.518821022727 | data | 6.06364322695 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
| .data | 0x1f4000 | 0x477c | 0x4800 | False | 0.437065972222 | data | 4.56880242419 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .bss | 0x1f9000 | 0x7ef0 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .idata | 0x201000 | 0x3dee | 0x3e00 | False | 0.310357862903 | data | 5.19740978236 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .didata | 0x205000 | 0x3a6 | 0x400 | False | 0.4130859375 | data | 3.64975205447 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .tls | 0x206000 | 0x48 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .rdata | 0x207000 | 0x21 | 0x200 | False | 0.072265625 | data | 0.359934664436 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
| .reloc | 0x208000 | 0x2b490 | 0x2b600 | False | 0.55546987572 | data | 6.71599868557 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
| .rsrc | 0x234000 | 0x65000 | 0x65000 | False | 0.169431176516 | data | 5.5006673695 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
|---|
| Name | RVA | Size | Type | Language | Country |
|---|---|---|---|---|---|
| RT_CURSOR | 0x236738 | 0x134 | data | English | United States |
| RT_CURSOR | 0x23686c | 0x134 | data | English | United States |
| RT_CURSOR | 0x2369a0 | 0x134 | data | English | United States |
| RT_CURSOR | 0x236ad4 | 0x134 | data | English | United States |
| RT_CURSOR | 0x236c08 | 0x134 | data | English | United States |
| RT_CURSOR | 0x236d3c | 0x134 | data | English | United States |
| RT_CURSOR | 0x236e70 | 0x134 | data | English | United States |
| RT_CURSOR | 0x236fa4 | 0x134 | data | English | United States |
| RT_BITMAP | 0x2370d8 | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x2372a8 | 0x1e4 | data | English | United States |
| RT_BITMAP | 0x23748c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x23765c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x23782c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x2379fc | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x237bcc | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x237d9c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x237f6c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x23813c | 0x1d0 | data | English | United States |
| RT_BITMAP | 0x23830c | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x2383cc | 0xd8 | data | English | United States |
| RT_BITMAP | 0x2384a4 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x238584 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x238664 | 0x138 | data | English | United States |
| RT_BITMAP | 0x23879c | 0x138 | data | English | United States |
| RT_BITMAP | 0x2388d4 | 0x138 | data | English | United States |
| RT_BITMAP | 0x238a0c | 0x138 | data | English | United States |
| RT_BITMAP | 0x238b44 | 0x138 | data | English | United States |
| RT_BITMAP | 0x238c7c | 0x138 | data | English | United States |
| RT_BITMAP | 0x238db4 | 0x104 | data | English | United States |
| RT_BITMAP | 0x238eb8 | 0x138 | data | English | United States |
| RT_BITMAP | 0x238ff0 | 0x104 | data | English | United States |
| RT_BITMAP | 0x2390f4 | 0x138 | data | English | United States |
| RT_BITMAP | 0x23922c | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x23930c | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x2393cc | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x23948c | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x23956c | 0xd8 | data | English | United States |
| RT_BITMAP | 0x239644 | 0xd8 | data | English | United States |
| RT_BITMAP | 0x23971c | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x2397dc | 0xd8 | data | English | United States |
| RT_BITMAP | 0x2398b4 | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x239994 | 0xd8 | data | English | United States |
| RT_BITMAP | 0x239a6c | 0xc0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_BITMAP | 0x239b2c | 0x668 | data | English | United States |
| RT_BITMAP | 0x23a194 | 0x668 | data | English | United States |
| RT_BITMAP | 0x23a7fc | 0x668 | data | English | United States |
| RT_BITMAP | 0x23ae64 | 0x668 | data | English | United States |
| RT_BITMAP | 0x23b4cc | 0x110 | data | English | United States |
| RT_BITMAP | 0x23b5dc | 0x110 | data | English | United States |
| RT_BITMAP | 0x23b6ec | 0x668 | data | English | United States |
| RT_BITMAP | 0x23bd54 | 0x668 | data | English | United States |
| RT_BITMAP | 0x23c3bc | 0xe0 | GLS_BINARY_LSB_FIRST | English | United States |
| RT_ICON | 0x23c49c | 0xca8 | dBase IV DBT of @.DBF, block length 3072, next free block index 40, next free block 1334425935, next used block 3108997561 | English | Great Britain |
| RT_STRING | 0x23d144 | 0x248 | data | ||
| RT_STRING | 0x23d38c | 0x30c | data | ||
| RT_STRING | 0x23d698 | 0x3cc | data | ||
| RT_STRING | 0x23da64 | 0x304 | data | ||
| RT_STRING | 0x23dd68 | 0x21c | data | ||
| RT_STRING | 0x23df84 | 0x158 | data | ||
| RT_STRING | 0x23e0dc | 0x38c | data | ||
| RT_STRING | 0x23e468 | 0x2ec | data | ||
| RT_STRING | 0x23e754 | 0x1ec | data | ||
| RT_STRING | 0x23e940 | 0xb4 | data | ||
| RT_STRING | 0x23e9f4 | 0x138 | data | ||
| RT_STRING | 0x23eb2c | 0x194 | data | ||
| RT_STRING | 0x23ecc0 | 0x39c | data | ||
| RT_STRING | 0x23f05c | 0x2c0 | data | ||
| RT_STRING | 0x23f31c | 0x17c | data | ||
| RT_STRING | 0x23f498 | 0x4d8 | data | ||
| RT_STRING | 0x23f970 | 0x2d0 | data | ||
| RT_STRING | 0x23fc40 | 0x1a0 | data | ||
| RT_STRING | 0x23fde0 | 0x1fc | data | ||
| RT_STRING | 0x23ffdc | 0x158 | data | ||
| RT_STRING | 0x240134 | 0x250 | data | ||
| RT_STRING | 0x240384 | 0x250 | data | ||
| RT_STRING | 0x2405d4 | 0x110 | data | ||
| RT_STRING | 0x2406e4 | 0x17c | data | ||
| RT_STRING | 0x240860 | 0x214 | data | ||
| RT_STRING | 0x240a74 | 0x258 | data | ||
| RT_STRING | 0x240ccc | 0x418 | data | ||
| RT_STRING | 0x2410e4 | 0x494 | data | ||
| RT_STRING | 0x241578 | 0x158 | data | ||
| RT_STRING | 0x2416d0 | 0xd4 | data | ||
| RT_STRING | 0x2417a4 | 0x2c4 | data | ||
| RT_STRING | 0x241a68 | 0x148 | data | ||
| RT_STRING | 0x241bb0 | 0x410 | data | ||
| RT_STRING | 0x241fc0 | 0x3e4 | data | ||
| RT_STRING | 0x2423a4 | 0x3a8 | data | ||
| RT_STRING | 0x24274c | 0x458 | data | ||
| RT_STRING | 0x242ba4 | 0x3b0 | data | ||
| RT_STRING | 0x242f54 | 0x3d8 | data | ||
| RT_STRING | 0x24332c | 0x2dc | data | ||
| RT_STRING | 0x243608 | 0xc4 | data | ||
| RT_STRING | 0x2436cc | 0x9c | data | ||
| RT_STRING | 0x243768 | 0x30c | data | ||
| RT_STRING | 0x243a74 | 0x4ac | data | ||
| RT_STRING | 0x243f20 | 0x314 | data | ||
| RT_STRING | 0x244234 | 0x2e0 | data | ||
| RT_RCDATA | 0x244514 | 0x82e8 | data | English | United States |
| RT_RCDATA | 0x24c7fc | 0x14 | data | ||
| RT_RCDATA | 0x24c810 | 0x10 | data | ||
| RT_RCDATA | 0x24c820 | 0x6e8 | data | ||
| RT_RCDATA | 0x24cf08 | 0x1192 | Delphi compiled form 'TfmAbout' | ||
| RT_RCDATA | 0x24e09c | 0xb38 | Delphi compiled form 'TfmAccessAdmin' | ||
| RT_RCDATA | 0x24ebd4 | 0xdee | Delphi compiled form 'TfmAccessControl' | ||
| RT_RCDATA | 0x24f9c4 | 0x2d8e | Delphi compiled form 'TfmAdjustAll' | ||
| RT_RCDATA | 0x252754 | 0x141e | Delphi compiled form 'TfmADS' | ||
| RT_RCDATA | 0x253b74 | 0x2346 | Delphi compiled form 'TfmAdsData' | ||
| RT_RCDATA | 0x255ebc | 0x12ebb | Delphi compiled form 'TFMain' | ||
| RT_RCDATA | 0x268d78 | 0x2378 | Delphi compiled form 'TfmAlarmControls' | ||
| RT_RCDATA | 0x26b0f0 | 0x579 | Delphi compiled form 'TfmAlarmGrid' | ||
| RT_RCDATA | 0x26b66c | 0xa97 | Delphi compiled form 'TfmAlarmStatus' | ||
| RT_RCDATA | 0x26c104 | 0x1731 | Delphi compiled form 'TfmBatch' | ||
| RT_RCDATA | 0x26d838 | 0x4a61 | Delphi compiled form 'TfmCalibration' | ||
| RT_RCDATA | 0x27229c | 0x844 | Delphi compiled form 'TfmChangePassword' | ||
| RT_RCDATA | 0x272ae0 | 0x2f43 | Delphi compiled form 'TfmConfig' | ||
| RT_RCDATA | 0x275a24 | 0xe6e | Delphi compiled form 'TfmCounts' | ||
| RT_RCDATA | 0x276894 | 0xbbf | Delphi compiled form 'TfmDisplayControl' | ||
| RT_RCDATA | 0x277454 | 0x3b9d | Delphi compiled form 'TfmDoseAlarms' | ||
| RT_RCDATA | 0x27aff4 | 0x2122 | Delphi compiled form 'TfmDoseProfile' | ||
| RT_RCDATA | 0x27d118 | 0x15da | Delphi compiled form 'TfmEasyEpdSetUp' | ||
| RT_RCDATA | 0x27e6f4 | 0xbf7 | Delphi compiled form 'TFMemory' | ||
| RT_RCDATA | 0x27f2ec | 0x221a | Delphi compiled form 'TfmEngCal' | ||
| RT_RCDATA | 0x281508 | 0x243e | Delphi compiled form 'TfmEngineering' | ||
| RT_RCDATA | 0x283948 | 0x22b1 | Delphi compiled form 'TfmEpdStatus' | ||
| RT_RCDATA | 0x285bfc | 0xa18 | Delphi compiled form 'TfmErrorDetails' | ||
| RT_RCDATA | 0x286614 | 0xad0 | Delphi compiled form 'TfmErrorStatus' | ||
| RT_RCDATA | 0x2870e4 | 0x18d6 | Delphi compiled form 'TfmEventHistory' | ||
| RT_RCDATA | 0x2889bc | 0xc48 | Delphi compiled form 'TfmGeneralControl' | ||
| RT_RCDATA | 0x289604 | 0x1177 | Delphi compiled form 'TfmIdentity' | ||
| RT_RCDATA | 0x28a77c | 0x291 | Delphi compiled form 'TfmMessage' | ||
| RT_RCDATA | 0x28aa10 | 0xad9 | Delphi compiled form 'TfmOtherAlarms' | ||
| RT_RCDATA | 0x28b4ec | 0x3e5 | Delphi compiled form 'TfmPassword' | ||
| RT_RCDATA | 0x28b8d4 | 0xa52 | Delphi compiled form 'TfmQuality' | ||
| RT_RCDATA | 0x28c328 | 0x703 | Delphi compiled form 'TfmReadRam' | ||
| RT_RCDATA | 0x28ca2c | 0x1808 | Delphi compiled form 'TfmResourceStrings' | ||
| RT_RCDATA | 0x28e234 | 0xa26 | Delphi compiled form 'TfmScratchPad' | ||
| RT_RCDATA | 0x28ec5c | 0x1512 | Delphi compiled form 'TfmSetUpComms' | ||
| RT_RCDATA | 0x290170 | 0x1c63 | Delphi compiled form 'TfmSetUpDisplay' | ||
| RT_RCDATA | 0x291dd4 | 0xbf6 | Delphi compiled form 'TfmSetupDLL' | ||
| RT_RCDATA | 0x2929cc | 0x27a1 | Delphi compiled form 'TfmSetUpEvents' | ||
| RT_RCDATA | 0x295170 | 0xe48 | Delphi compiled form 'TfmSetUpSwitch' | ||
| RT_RCDATA | 0x295fb8 | 0xab3 | Delphi compiled form 'TfmSpecial' | ||
| RT_RCDATA | 0x296a6c | 0xa99 | Delphi compiled form 'TfmStatus' | ||
| RT_RCDATA | 0x297508 | 0x458 | Delphi compiled form 'TfmTimings' | ||
| RT_RCDATA | 0x297960 | 0x5ce | Delphi compiled form 'TfmTranslation' | ||
| RT_RCDATA | 0x297f30 | 0x494 | Delphi compiled form 'TLoginDialog' | ||
| RT_RCDATA | 0x2983c4 | 0x3c4 | Delphi compiled form 'TPasswordDialog' | ||
| RT_GROUP_CURSOR | 0x298788 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x29879c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x2987b0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x2987c4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x2987d8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x2987ec | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x298800 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_CURSOR | 0x298814 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
| RT_GROUP_ICON | 0x298828 | 0x14 | data | English | Great Britain |
| RT_VERSION | 0x29883c | 0x33c | data | English | Great Britain |
| RT_MANIFEST | 0x298b78 | 0x352 | XML 1.0 document, ASCII text, with CRLF line terminators | English | Great Britain |
Imports |
|---|
| DLL | Import |
|---|---|
| oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
| advapi32.dll | RegQueryValueExW, RegOpenKeyExW, RegCloseKey |
| user32.dll | LoadStringW, MessageBoxA, CharNextW |
| kernel32.dll | lstrcmpiA, LoadLibraryA, LocalFree, LocalAlloc, GetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryW, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, IsValidLocale, GetSystemDefaultUILanguage, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetUserDefaultUILanguage, GetLocaleInfoW, GetLastError, GetCurrentDirectoryW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, CreateDirectoryW, ExitProcess, ExitThread, CreateThread, CompareStringW, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, CreateFileW, CloseHandle |
| kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW |
| user32.dll | CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetClassLongW, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassLongW, GetClassInfoW, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DeferWindowPos, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, BeginDeferWindowPos, AdjustWindowRectEx, ActivateKeyboardLayout |
| msimg32.dll | AlphaBlend |
| gdi32.dll | WidenPath, UnrealizeObject, TextOutW, StrokePath, StrokeAndFillPath, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextCharacterExtra, SetTextColor, SetTextAlign, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetGraphicsMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetArcDirection, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SelectClipPath, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, PtVisible, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetTextCharacterExtra, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBkMode, GetBkColor, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtSelectClipRgn, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPath, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateEnhMetaFileW, CreateEllipticRgnIndirect, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, CloseEnhMetaFile, Chord, BitBlt, BeginPath, ArcTo, Arc, AbortDoc |
| version.dll | VerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW |
| kernel32.dll | lstrcpyW, lstrcmpW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualFree, VirtualAlloc, TryEnterCriticalSection, SystemTimeToTzSpecificLocalTime, SystemTimeToFileTime, SwitchToThread, SuspendThread, SizeofResource, SignalObjectAndWait, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, ReadFile, RaiseException, IsDebuggerPresent, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetSystemTime, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedExchangeAdd, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringW, CloseHandle |
| advapi32.dll | RegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey, OpenThreadToken, OpenProcessToken, GetTokenInformation, FreeSid, EqualSid, AllocateAndInitializeSid |
| oleaut32.dll | GetErrorInfo, SysFreeString |
| ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID |
| comctl32.dll | InitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
| kernel32.dll | Sleep |
| ole32.dll | CLSIDFromString |
| oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
| shell32.dll | SHGetSpecialFolderPathW, SHGetPathFromIDListW, SHGetMalloc, SHGetDesktopFolder, SHBrowseForFolderW |
| comdlg32.dll | PrintDlgW, GetSaveFileNameW, GetOpenFileNameW |
| winspool.drv | OpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter |
| winspool.drv | GetDefaultPrinterW |
| kernel32.dll | MulDiv |
Version Infos |
|---|
| Description | Data |
|---|---|
| LegalCopyright | Copyright 2010 Thermo Fisher Scientific |
| InternalName | |
| FileVersion | 3.1.0.0 |
| CompanyName | Thermo Fisher Scientific |
| LegalTrademarks | EPD |
| Comments | |
| ProductName | EasyEPD2 |
| ProductVersion | 3.0 |
| FileDescription | Reading and Configuring EPDs. |
| OriginalFilename | |
| Translation | 0x0809 0x04e4 |
Possible Origin |
|---|
| Language of compilation system | Country where language is spoken | Map |
|---|---|---|
| English | United States | |
| English | Great Britain |
Network Behavior |
|---|
Network Port Distribution |
|---|
UDP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| May 22, 2020 14:09:49.334294081 CEST | 58369 | 53 | 192.168.2.6 | 8.8.8.8 |
| May 22, 2020 14:09:49.359700918 CEST | 53 | 58369 | 8.8.8.8 | 192.168.2.6 |
| May 22, 2020 14:09:49.910268068 CEST | 62093 | 53 | 192.168.2.6 | 8.8.8.8 |
| May 22, 2020 14:09:49.935606956 CEST | 53 | 62093 | 8.8.8.8 | 192.168.2.6 |
| May 22, 2020 14:10:23.033837080 CEST | 54675 | 53 | 192.168.2.6 | 8.8.8.8 |
| May 22, 2020 14:10:23.084763050 CEST | 53 | 54675 | 8.8.8.8 | 192.168.2.6 |
| May 22, 2020 14:10:23.331907988 CEST | 63883 | 53 | 192.168.2.6 | 8.8.8.8 |
| May 22, 2020 14:10:23.357237101 CEST | 53 | 63883 | 8.8.8.8 | 192.168.2.6 |
Code Manipulations |
|---|
Statistics |
|---|
CPU Usage |
|---|
Click to jump to process
Memory Usage |
|---|
Click to jump to process
High Level Behavior Distribution |
|---|
back
Click to dive into process behavior distribution
Behavior |
|---|
Click to jump to process
System Behavior |
|---|
General |
|---|
| Start time: | 14:09:40 |
| Start date: | 22/05/2020 |
| Path: | C:\Users\user\Desktop\EasyEPD.exe |
| Wow64 process (32bit): | true |
| Commandline: | |
| Imagebase: | 0x400000 |
| File size: | 2666496 bytes |
| MD5 hash: | 90AB8CE5D40593917A4615D83E84C3AB |
| Has administrator privileges: | false |
| Programmed in: | Borland Delphi |
| Yara matches: |
|
| Reputation: | low |
General |
|---|
| Start time: | 14:09:47 |
| Start date: | 22/05/2020 |
| Path: | C:\Windows\SysWOW64\WerFault.exe |
| Wow64 process (32bit): | true |
| Commandline: | |
| Imagebase: | 0xc0000 |
| File size: | 434584 bytes |
| MD5 hash: | 80E91E3C0F5563E4049B62FCAF5D67AC |
| Has administrator privileges: | false |
| Programmed in: | C, C++ or other language |
| Reputation: | high |
Disassembly |
|---|
Code Analysis |
|---|
Execution Graph |
|---|
| Execution Coverage: | 5.5% |
| Dynamic/Decrypted Code Coverage: | 0% |
| Signature Coverage: | 1.8% |
| Total number of Nodes: | 821 |
| Total number of Limit Nodes: | 12 |
Graph
Executed Functions |
|---|
Function 00409F38, Relevance: 3.0, APIs: 2, Instructions: 35COMMON
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00409E50, Relevance: 3.0, APIs: 2, Instructions: 21fileCOMMON
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040A97E, Relevance: 1.5, APIs: 1, Instructions: 7COMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00409AE4, Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 156registrystringCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 75% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004097A0, Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 77stringCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 61% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00500E70, Relevance: 12.1, APIs: 8, Instructions: 98COMMON
Control-flow Graph |
|---|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004FDCBC, Relevance: 7.6, APIs: 5, Instructions: 107COMMON
Control-flow Graph |
|---|
| C-Code - Quality: 90% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D383, Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 105libraryCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 81% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D430, Relevance: 7.0, APIs: 1, Strings: 3, Instructions: 23libraryCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
|---|
| C-Code - Quality: 80% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004FD9FC, Relevance: 6.1, APIs: 4, Instructions: 56COMMON
Control-flow Graph |
|---|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
|---|
| C-Code - Quality: 91% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00405E06, Relevance: 4.6, APIs: 3, Instructions: 83COMMON
Control-flow Graph |
|---|
| C-Code - Quality: 63% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040678C, Relevance: 4.6, APIs: 3, Instructions: 79threadCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 83% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00406784, Relevance: 4.6, APIs: 3, Instructions: 76threadCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 83% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00406788, Relevance: 4.6, APIs: 3, Instructions: 74threadCOMMON
Control-flow Graph |
|---|
| C-Code - Quality: 83% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00406346, Relevance: 3.1, APIs: 2, Instructions: 68COMMON
Control-flow Graph |
|---|
| C-Code - Quality: 50% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 58% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004FEB50, Relevance: 3.0, APIs: 2, Instructions: 29COMMON
| C-Code - Quality: 88% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040418C, Relevance: 2.6, APIs: 2, Instructions: 55COMMON
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D28A, Relevance: 1.5, APIs: 1, Instructions: 45COMMON
| C-Code - Quality: 82% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00408F28, Relevance: 1.5, APIs: 1, Instructions: 26COMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D5F9, Relevance: 1.5, APIs: 1, Instructions: 8COMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00409E88, Relevance: 1.3, APIs: 1, Instructions: 57stringCOMMON
| C-Code - Quality: 78% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00402A68, Relevance: 1.3, APIs: 1, Instructions: 38memoryCOMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
|---|
Function 004098E8, Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 152stringlibraryfileCOMMON
| C-Code - Quality: 78% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 88% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00409480, Relevance: 4.6, APIs: 3, Instructions: 100COMMON
| C-Code - Quality: 73% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004F2B08, Relevance: 1.5, APIs: 1, Instructions: 11windowCOMMON
| C-Code - Quality: 64% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004036E4, Relevance: .1, Instructions: 94COMMONCrypto
| C-Code - Quality: 46% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00408718, Relevance: .1, Instructions: 64COMMONCrypto
| C-Code - Quality: 53% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C33E, Relevance: .0, Instructions: 4COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D04E, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C472, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C4D2, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C50A, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C532, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C53A, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C5F6, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C5FE, Relevance: .0, Instructions: 2COMMON
| C-Code - Quality: 100% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040CDAE, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040CE36, Relevance: .0, Instructions: 2COMMON
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C686, Relevance: .0, Instructions: 2COMMON
| C-Code - Quality: 100% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D2E4, Relevance: 19.3, APIs: 6, Strings: 5, Instructions: 62windowregistryCOMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AB07, Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 182libraryloaderCOMMON
| C-Code - Quality: 65% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 70% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 77% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004066FC, Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 38filewindowCOMMON
| C-Code - Quality: 79% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 91% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 86% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004032F8, Relevance: 10.9, APIs: 7, Instructions: 407COMMON
| C-Code - Quality: 88% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 59% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00402D7C, Relevance: 9.0, APIs: 7, Instructions: 298sleepCOMMON
| C-Code - Quality: 67% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004FD038, Relevance: 9.0, APIs: 6, Instructions: 37threadCOMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00403C3C, Relevance: 7.3, APIs: 1, Strings: 3, Instructions: 277windowCOMMON
| C-Code - Quality: 97% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00422940, Relevance: 6.1, APIs: 4, Instructions: 115COMMON
| C-Code - Quality: 82% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 00409680, Relevance: 6.1, APIs: 4, Instructions: 97threadCOMMON
| C-Code - Quality: 58% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 95% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004FE7D4, Relevance: 6.1, APIs: 4, Instructions: 74COMMON
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AD6A, Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 41stringCOMMON
| C-Code - Quality: 75% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
Function 004CB990, Relevance: 6.0, APIs: 4, Instructions: 35threadCOMMON
| C-Code - Quality: 87% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| Yara matches |
| Similarity |
|
| Uniqueness |
Uniqueness Score: -1.00% |