Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ee2dh.exe

Overview

General Information

Sample Name:ee2dh.exe
Analysis ID:590130
MD5:1eb820e4003cdcd9b2ee3252d4333950
SHA1:489e4e88c6bbd601ceeeddb629d5f05b2a43bfc6
SHA256:ee2d920c7fa032c3bc22365770ea3b79b2d97c4177438758e95d8d31b37b9a92
Tags:exe
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MailPassView
Multi AV Scanner detection for submitted file
Yara detected HawkEye Keylogger
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Detected HawkEye Rat
Multi AV Scanner detection for domain / URL
Yara detected WebBrowserPassView password recovery tool
Uses 32bit PE files
PE file does not import any functions
Yara signature match
Sample file is different than original file name gathered from version info
May infect USB drives
PE file overlay found

Classification

No configs have been found
SourceRuleDescriptionAuthorStrings
ee2dh.exeRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
  • 0x7bdb7:$key: HawkEyeKeylogger
  • 0x7dff3:$salt: 099u787978786
  • 0x7c3f0:$string1: HawkEye_Keylogger
  • 0x7d243:$string1: HawkEye_Keylogger
  • 0x7df53:$string1: HawkEye_Keylogger
  • 0x7c7d9:$string2: holdermail.txt
  • 0x7c7f9:$string2: holdermail.txt
  • 0x7c71b:$string3: wallet.dat
  • 0x7c733:$string3: wallet.dat
  • 0x7c749:$string3: wallet.dat
  • 0x7db35:$string4: Keylog Records
  • 0x7de4d:$string4: Keylog Records
  • 0x7e04b:$string5: do not script -->
  • 0x7bd9f:$string6: \pidloc.txt
  • 0x7be05:$string7: BSPLIT
  • 0x7be15:$string7: BSPLIT
ee2dh.exeHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
  • 0x7901:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
ee2dh.exeJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    ee2dh.exeJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
      ee2dh.exeJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        Click to see the 2 entries
        No Sigma rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ee2dh.exeVirustotal: Detection: 41%Perma Link
        Source: ee2dh.exeMetadefender: Detection: 22%Perma Link
        Source: ee2dh.exeReversingLabs: Detection: 42%
        Source: http://22ssh.com/32.exeAvira URL Cloud: Label: PUA
        Source: http://22ssh.com/32.exeVirustotal: Detection: 9%Perma Link
        Source: ee2dh.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: ee2dh.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: D:\buildbot\slave1\desktop_screen\build\bin\active_desktop_launcher.pdb source: ee2dh.exe
        Source: Binary string: C:\nutideyebibede\soy\gebetugito\meliyo zodoz.pdb source: ee2dh.exe
        Source: Binary string: ]C:\nutideyebibede\soy\gebetugito\meliyo zodoz.pdb source: ee2dh.exe
        Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: ee2dh.exe
        Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: ee2dh.exe
        Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: ee2dh.exe
        Source: Binary string: \MyDriver\x64\Release\MyDriver.pdb source: ee2dh.exe
        Source: ee2dh.exeBinary or memory string: autorun.inf
        Source: ee2dh.exeBinary or memory string: [autorun]
        Source: ee2dh.exeString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
        Source: ee2dh.exeString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
        Source: ee2dh.exeString found in binary or memory: http://22ssh.com/32.exe
        Source: ee2dh.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
        Source: ee2dh.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: ee2dh.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
        Source: ee2dh.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
        Source: ee2dh.exeString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
        Source: ee2dh.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
        Source: ee2dh.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
        Source: ee2dh.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
        Source: ee2dh.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: ee2dh.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: ee2dh.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
        Source: ee2dh.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
        Source: ee2dh.exeString found in binary or memory: http://ocsp.comodoca.com0
        Source: ee2dh.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: ee2dh.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: ee2dh.exeString found in binary or memory: http://ocsp.digicert.com0N
        Source: ee2dh.exeString found in binary or memory: http://ocsp.digicert.com0O
        Source: ee2dh.exeString found in binary or memory: http://ocsp.thawte.com0
        Source: ee2dh.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
        Source: ee2dh.exeString found in binary or memory: http://s2.symcb.com0
        Source: ee2dh.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
        Source: ee2dh.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
        Source: ee2dh.exeString found in binary or memory: http://sv.symcd.com0&
        Source: ee2dh.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: ee2dh.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: ee2dh.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: ee2dh.exeString found in binary or memory: http://whatismyipaddress.com/-
        Source: ee2dh.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
        Source: ee2dh.exeString found in binary or memory: http://www.freeeim.com/D
        Source: ee2dh.exeString found in binary or memory: http://www.nirsoft.net/
        Source: ee2dh.exeString found in binary or memory: http://www.symauth.com/cps0(
        Source: ee2dh.exeString found in binary or memory: http://www.symauth.com/rpa00
        Source: ee2dh.exeString found in binary or memory: https://d.symcb.com/cps0%
        Source: ee2dh.exeString found in binary or memory: https://d.symcb.com/rpa0
        Source: ee2dh.exeString found in binary or memory: https://www.digicert.com/CPS0

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: ee2dh.exe, type: SAMPLE

        System Summary

        barindex
        Source: ee2dh.exe, type: SAMPLEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
        Source: ee2dh.exe, type: SAMPLEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
        Source: ee2dh.exe, type: SAMPLEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
        Source: ee2dh.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: ee2dh.exeStatic PE information: No import functions for PE file found
        Source: ee2dh.exe, type: SAMPLEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
        Source: ee2dh.exe, type: SAMPLEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: ee2dh.exe, type: SAMPLEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
        Source: ee2dh.exe, type: SAMPLEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
        Source: ee2dh.exeBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenamemailpv.exe< vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenamePhulli.exe0 vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenameactive_desktop_launcher.exe, vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenameChrome.exe. vs ee2dh.exe
        Source: ee2dh.exeBinary or memory string: OriginalFilenamefreeeim.exe vs ee2dh.exe
        Source: ee2dh.exeStatic PE information: Data appended to the last section found
        Source: ee2dh.exeVirustotal: Detection: 41%
        Source: ee2dh.exeMetadefender: Detection: 22%
        Source: ee2dh.exeReversingLabs: Detection: 42%
        Source: ee2dh.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: ee2dh.exeString found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
        Source: ee2dh.exeBinary string: \Device\Orange64
        Source: classification engineClassification label: mal100.troj.spyw.winEXE@0/0@0/0
        Source: ee2dh.exeStatic file information: File size 4644864 > 1048576
        Source: ee2dh.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: ee2dh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: ee2dh.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1689600
        Source: ee2dh.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: D:\buildbot\slave1\desktop_screen\build\bin\active_desktop_launcher.pdb source: ee2dh.exe
        Source: Binary string: C:\nutideyebibede\soy\gebetugito\meliyo zodoz.pdb source: ee2dh.exe
        Source: Binary string: ]C:\nutideyebibede\soy\gebetugito\meliyo zodoz.pdb source: ee2dh.exe
        Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: ee2dh.exe
        Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: ee2dh.exe
        Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: ee2dh.exe
        Source: Binary string: \MyDriver\x64\Release\MyDriver.pdb source: ee2dh.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: ee2dh.exe, type: SAMPLE
        Source: Yara matchFile source: ee2dh.exe, type: SAMPLE
        Source: Yara matchFile source: ee2dh.exe, type: SAMPLE

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: ee2dh.exe, type: SAMPLE
        Source: ee2dh.exeString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
        Source: ee2dh.exeString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
        Source: ee2dh.exeString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
        Source: ee2dh.exeString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        1
        Replication Through Removable Media
        2
        Command and Scripting Interpreter
        Path InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
        Peripheral Device Discovery
        1
        Replication Through Removable Media
        Data from Local SystemExfiltration Over Other Network Medium1
        Remote Access Software
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        SourceDetectionScannerLabelLink
        ee2dh.exe42%VirustotalBrowse
        ee2dh.exe23%MetadefenderBrowse
        ee2dh.exe43%ReversingLabsByteCode-MSIL.Hacktool.MailPassView
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://22ssh.com/32.exe10%VirustotalBrowse
        http://22ssh.com/32.exe100%Avira URL CloudPUA
        http://www.freeeim.com/D0%Avira URL Cloudsafe
        http://ocsp.thawte.com00%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://22ssh.com/32.exeee2dh.exetrue
        • 10%, Virustotal, Browse
        • Avira URL Cloud: PUA
        unknown
        http://crl.thawte.com/ThawteTimestampingCA.crl0ee2dh.exefalse
          high
          http://www.nirsoft.net/ee2dh.exefalse
            high
            http://www.freeeim.com/Dee2dh.exefalse
            • Avira URL Cloud: safe
            unknown
            http://www.symauth.com/cps0(ee2dh.exefalse
              high
              http://www.symauth.com/rpa00ee2dh.exefalse
                high
                http://ocsp.thawte.com0ee2dh.exefalse
                • URL Reputation: safe
                unknown
                http://whatismyipaddress.com/-ee2dh.exefalse
                  high
                  No contacted IP infos
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:590130
                  Start date and time:2022-03-16 05:41:20 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 2m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:ee2dh.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:1
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.winEXE@0/0@0/0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Unable to launch sample, stop analysis
                  • No process behavior to analyse as no analysis process or sample was found
                  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                  • Exclude process from analysis (whitelisted): svchost.exe
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.160142050290745
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • InstallShield setup (43055/19) 0.21%
                  • UPX compressed Win32 Executable (30571/9) 0.15%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:ee2dh.exe
                  File size:4644864
                  MD5:1eb820e4003cdcd9b2ee3252d4333950
                  SHA1:489e4e88c6bbd601ceeeddb629d5f05b2a43bfc6
                  SHA256:ee2d920c7fa032c3bc22365770ea3b79b2d97c4177438758e95d8d31b37b9a92
                  SHA512:763ea3fd4ced8906b818428469948ce2d57c96578ed9729e6e395f084e17e442fce47b4ae71dda31656e16b39f9f60d407828465bde2e440f3282c2623365b3e
                  SSDEEP:98304:NtqB4mDphEHZ/rDjfLe9cygGdVyVT9nOgmhh:CDw9rLe9dWT9nO7H
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e..a..................h...........h.. ....h...@.. ........................i...........@................................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x1a8b4ae
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x61B51365 [Sat Dec 11 21:08:53 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x168b4540x57.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x168c0000x598.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x168e0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x16894b40x1689600unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0x168c0000x5980x600False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x168e0000xc0x200False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  No network behavior found
                  No statistics
                  No system behavior
                  No disassembly