d:\CP Articles\XPEInfoTest\1.0\console app\vs2005\Release\HDPEInfo.pdb
Overview
overview
9Static
static
9ef8df9070d...18.exe
windows7-x64
7ef8df9070d...18.exe
windows10-2004-x64
7$0/AWF.cmd
windows7-x64
1$0/AWF.cmd
windows10-2004-x64
1$0/AppDataFile.vbs
windows7-x64
1$0/AppDataFile.vbs
windows10-2004-x64
1$0/Assoc.cmd
windows7-x64
1$0/Assoc.cmd
windows10-2004-x64
1$0/Auto-RC.cmd
windows7-x64
1$0/Auto-RC.cmd
windows10-2004-x64
1$0/Boot-Rk.cmd
windows7-x64
1$0/Boot-Rk.cmd
windows10-2004-x64
1$0/Boot.bat
windows7-x64
4$0/Boot.bat
windows10-2004-x64
4$0/BootDrv.vbs
windows7-x64
1$0/BootDrv.vbs
windows10-2004-x64
1$0/CF-Script.cmd
windows7-x64
1$0/CF-Script.cmd
windows10-2004-x64
1$0/CSet.cmd
windows7-x64
1$0/CSet.cmd
windows10-2004-x64
1$0/Catch-sub.cmd
windows7-x64
1$0/Catch-sub.cmd
windows10-2004-x64
1$0/Combo-Fix.sys
windows7-x64
1$0/Combo-Fix.sys
windows10-2004-x64
1$0/ComboFi...ad.exe
windows7-x64
1$0/ComboFi...ad.exe
windows10-2004-x64
3$0/Combobatch.bat
windows7-x64
1$0/Combobatch.bat
windows10-2004-x64
1$0/Create.cmd
windows7-x64
1$0/Create.cmd
windows10-2004-x64
1$0/CregC.cmd
windows7-x64
1$0/CregC.cmd
windows10-2004-x64
1Behavioral task
behavioral1
Sample
ef8df9070d1157464797ad9c54520696_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef8df9070d1157464797ad9c54520696_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0/AWF.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$0/AWF.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$0/AppDataFile.vbs
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$0/AppDataFile.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$0/Assoc.cmd
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$0/Assoc.cmd
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$0/Auto-RC.cmd
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$0/Auto-RC.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$0/Boot-Rk.cmd
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$0/Boot-Rk.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$0/Boot.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$0/Boot.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$0/BootDrv.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$0/BootDrv.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$0/CF-Script.cmd
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$0/CF-Script.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$0/CSet.cmd
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$0/CSet.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$0/Catch-sub.cmd
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$0/Catch-sub.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$0/Combo-Fix.sys
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$0/Combo-Fix.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$0/ComboFix-Download.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$0/ComboFix-Download.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$0/Combobatch.bat
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$0/Combobatch.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$0/Create.cmd
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$0/Create.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$0/CregC.cmd
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$0/CregC.cmd
Resource
win10v2004-20240802-en
General
-
Target
ef8df9070d1157464797ad9c54520696_JaffaCakes118
-
Size
1.9MB
-
MD5
ef8df9070d1157464797ad9c54520696
-
SHA1
cacf75ac8bf78a7c22dfd3c7ec8a8a85a365aeb8
-
SHA256
41e69f62f69b09bfd8fd95e1abdb256199f7d5192ba0ea897d7aa0e3f931f209
-
SHA512
d443469fc84c58070c8356793bf8588df08e56ce6e24de819d2fc89a3a9af75989ca41934c2ef4794a43dae32673808f2e12ee14364a5ff487751f23a7cb79e7
-
SSDEEP
49152:AFT8Yw58W8PEO9h9pbI9sSqz4mv1SZ1gwIbC3aY9mOv4:AFWeph/cssqk3X4
Malware Config
Signatures
-
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule static1/unpack001/$0/NirCmd.cfxxe Nirsoft static1/unpack001/$0/NirCmdC.cfxxe Nirsoft static1/unpack001/$0/firefox.exe Nirsoft static1/unpack001/$0/iexplore.exe Nirsoft static1/unpack001/$0/n.pif Nirsoft -
resource yara_rule sample upx static1/unpack001/$0/ERDNT.e_e upx -
Unsigned PE 15 IoCs
Checks for missing Authenticode signature.
resource ef8df9070d1157464797ad9c54520696_JaffaCakes118 unpack001/$0/Combo-Fix.sys unpack001/$0/ComboFix-Download.cfxxe unpack001/$0/ERDNT.e_e unpack001/$0/ERUNT.cfxxe unpack001/$0/FileKill.cfxxe unpack001/$0/HDPEInfo.cfxxe unpack001/$0/NirCmd.cfxxe unpack001/$0/NirCmdC.cfxxe unpack001/$0/firefox.exe unpack001/$0/iexplore.exe unpack001/$0/n.pif unpack001/$PLUGINSDIR/System.dll unpack001/$PLUGINSDIR/UserInfo.dll unpack001/out.upx -
NSIS installer 1 IoCs
resource yara_rule static1/unpack001/out.upx nsis_installer_2
Files
-
ef8df9070d1157464797ad9c54520696_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
$0/023.dat
-
$0/023v.dat
-
$0/023w7.dat
-
$0/AWF.cmd
-
$0/AppDataFile.cfx.vbs
-
$0/AppDataFolder.cfx
-
$0/Assoc.cmd
-
$0/Auto-RC.cmd
-
$0/Boot-Rk.cmd
-
$0/Boot.bat
-
$0/BootDrv.vbs.vbs
-
$0/CF-Script.cmd.cmd .ps1
-
$0/CSet.cmd
-
$0/Catch-sub.cmd
-
$0/Combo-Fix.sys.sys windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32B - Virtual size: 5B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$0/ComboFix-Download.cfxxe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 592B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
$0/Combobatch.bat
-
$0/Create.cmd
-
$0/Creg.dat
-
$0/CregC.cmd
-
$0/CregC.dat
-
$0/DPF.str
-
$0/DelClsid.bat
-
$0/DelClsid64.bat
-
$0/DesktopFile.cfx
-
$0/Dnl.dat
-
$0/DrvRun.vbs.vbs
-
$0/ERDNT.e_e.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 248KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
$0/ERDNTDOS.LOC
-
$0/ERDNTWIN.LOC
-
$0/ERUNT.LOC
-
$0/ERUNT.cfxxe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 324KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/Exe.reg
-
$0/FD-SV.cmd
-
$0/FIND3M.bat
-
$0/FIXLSP.bat
-
$0/FKMGen.cmd
-
$0/FavoriteFolder.cfx
-
$0/FavoritesFile.cfx
-
$0/FileKill.cfxxe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: - Virtual size: 204KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 141KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
$0/Fin.dat
-
$0/GetHive.cmd
-
$0/HDPEInfo.cfxxe.exe windows:4 windows x86 arch:x86
1497f1c937d7f1a5eceac482c2801f5a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr80
_exit
_XcptFilter
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
_cexit
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
exit
_swprintf
__wgetmainargs
_amsg_exit
??3@YAXPAX@Z
strncmp
wcschr
wprintf
_waccess
__p__commode
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/Imefile.dat
-
$0/Install-RC.cmd
-
$0/Kill-All.cmd
-
$0/Ksvchost.vbs.vbs
-
$0/Lang.bat
-
$0/List-B.bat
-
$0/List-C.bat
-
$0/List-D.bat
-
$0/List.bat
-
$0/LocalAppDataFile.cfx
-
$0/LocalAppDataFolder.cfx
-
$0/LocalService.dat
-
$0/LocalServiceNetworkRestricted.dat
-
$0/LocalSettingsFile.cfx
-
$0/LocalSystemNetworkRestricted.dat
-
$0/MoveIt.bat
-
$0/ND_.bat
-
$0/ND_64.bat
-
$0/NT-OS.cmd.cmd .ps1
-
$0/NetworkService.dat
-
$0/NirCmd.cfxxe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/NirCmd.chm.chm
-
$0/NirCmdC.cfxxe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/OSid.vbs.vbs
-
$0/P.cmd
-
$0/PersonalFile.cfx
-
$0/PersonalFolder.cfx
-
$0/Policies.dat
-
$0/Prep.inf
-
$0/ProfilesFile.cfx.vbs
-
$0/ProfilesFolder.cfx
-
$0/ProgramsFile.cfx
-
$0/ProgramsFolder.cfx
-
$0/Purity.dat
-
$0/RCLink.dat
-
$0/REGDACL.sed
-
$0/RegDo.sed
-
$0/RegScan.cmd
-
$0/RegScan64.cmd
-
$0/Rkey.cmd
-
$0/Rust.str
-
$0/SRestore.cmd
-
$0/Safeboot.def.w7.dat
-
$0/SetEnvmt.bat
-
$0/SnapShot.cmd
-
$0/StartMenuFile.cfx
-
$0/StartMenuFolder.cfx
-
$0/StartUpFile.cfx
-
$0/SuppScan.cmd
-
$0/SvcDrv.vbs.vbs
-
$0/TemplatesFile.cfx
-
$0/TemplatesFolder.cfx
-
$0/Update-CF.cmd
-
$0/VInfo
-
$0/VInfo2
-
$0/Vipev.dat
-
$0/VwinTemp.dacl
-
$0/Wmi_rem.vbs.vbs
-
$0/XPSBoot.reg
-
$0/appinit.bad
-
$0/asp.str
-
$0/av.cmd
-
$0/av.vbs.vbs
-
$0/badclsid.c
-
$0/firefox.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/iexplore.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$0/n.pif.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/System.dll.dll windows:4 windows x86 arch:x86
2017f2acbdaa42ab3e4adeb8b4c37e7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
user32
wsprintfA
ole32
StringFromGUID2
CLSIDFromString
Exports
Exports
Alloc
Call
Copy
Free
Get
Int64Op
Store
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/UserInfo.dll.dll windows:4 windows x86 arch:x86
afa8e526425f3585465337467d0b5909
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
advapi32
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
Exports
Exports
GetAccountType
GetName
GetOriginalAccountType
Sections
.text Size: 1024B - Virtual size: 741B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 673B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 190B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ