VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Spyware
Dropper
|
Threat Names: |
Gen:Variant.Razy.601945
Gen:Variant.Razy.484160
Win32.Trojan.Genkryptik
|
msader15.dll.exe
Windows Exe (x86-32)
Created at 2020-01-21T07:56:00
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\msader15.dll.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x405440 |
Size Of Code | 0x6000 |
Size Of Initialized Data | 0x20000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-01-16 15:50:09+00:00 |
Version Information (8)
»
CompanyName | Microsoft Corporation |
FileDescription | Microsoft Data Access - ActiveX Data Objects Resources |
FileVersion | 2.81.1117.0 (xpsp_sp2_rtm.040803-2158) |
InternalName | ADOER15 |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | msader15.dll |
ProductName | Microsoft Data Access Components |
ProductVersion | 2.81.1117.0 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x57d6 | 0x6000 | 0x1000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.22 |
.bdata | 0x407000 | 0xf92 | 0x1000 | 0x7000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.81 |
.data | 0x408000 | 0x233c | 0x1000 | 0x8000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.04 |
.crt | 0x40b000 | 0x8d8f | 0x9000 | 0x9000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.96 |
.crt07 | 0x414000 | 0x469e | 0x5000 | 0x12000 | IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.55 |
.crt02 | 0x419000 | 0x8fdf | 0x9000 | 0x17000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.96 |
.rsrc | 0x422000 | 0x3f60 | 0x4000 | 0x20000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.23 |
.reloc | 0x426000 | 0x8a0 | 0x1000 | 0x24000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 2.6 |
Imports (10)
»
ADVAPI32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InitiateSystemShutdownA | 0x0 | 0x407000 | 0x7a64 | 0x7a64 | 0x17b |
GetTrusteeNameA | 0x0 | 0x407004 | 0x7a68 | 0x7a68 | 0x160 |
GetSidLengthRequired | 0x0 | 0x407008 | 0x7a6c | 0x7a6c | 0x156 |
LogonUserExW | 0x0 | 0x40700c | 0x7a70 | 0x7a70 | 0x18c |
msvcrt.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
memset | 0x0 | 0x4070ec | 0x7b50 | 0x7b50 | 0x4ee |
strlen | 0x0 | 0x4070f0 | 0x7b54 | 0x7b54 | 0x51c |
GDI32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LineTo | 0x0 | 0x407014 | 0x7a78 | 0x7a78 | 0x236 |
GetRandomRgn | 0x0 | 0x407018 | 0x7a7c | 0x7a7c | 0x208 |
GetWorldTransform | 0x0 | 0x40701c | 0x7a80 | 0x7a80 | 0x22d |
GetMapMode | 0x0 | 0x407020 | 0x7a84 | 0x7a84 | 0x1f0 |
FlattenPath | 0x0 | 0x407024 | 0x7a88 | 0x7a88 | 0x144 |
GetCharWidthW | 0x0 | 0x407028 | 0x7a8c | 0x7a8c | 0x1bd |
KERNEL32.dll (20)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetCommandLineW | 0x0 | 0x407030 | 0x7a94 | 0x7a94 | 0x187 |
GetProcessVersion | 0x0 | 0x407034 | 0x7a98 | 0x7a98 | 0x253 |
FindVolumeMountPointClose | 0x0 | 0x407038 | 0x7a9c | 0x7a9c | 0x151 |
GetLongPathNameW | 0x0 | 0x40703c | 0x7aa0 | 0x7aa0 | 0x20f |
GetModuleFileNameW | 0x0 | 0x407040 | 0x7aa4 | 0x7aa4 | 0x214 |
GlobalGetAtomNameW | 0x0 | 0x407044 | 0x7aa8 | 0x7aa8 | 0x2bc |
WritePrivateProfileStringW | 0x0 | 0x407048 | 0x7aac | 0x7aac | 0x52b |
GetDiskFreeSpaceExA | 0x0 | 0x40704c | 0x7ab0 | 0x7ab0 | 0x1cd |
GetSystemDefaultUILanguage | 0x0 | 0x407050 | 0x7ab4 | 0x7ab4 | 0x26e |
FindResourceW | 0x0 | 0x407054 | 0x7ab8 | 0x7ab8 | 0x14e |
GlobalFree | 0x0 | 0x407058 | 0x7abc | 0x7abc | 0x2ba |
EraseTape | 0x0 | 0x40705c | 0x7ac0 | 0x7ac0 | 0x117 |
GetCalendarInfoW | 0x0 | 0x407060 | 0x7ac4 | 0x7ac4 | 0x17b |
Module32NextW | 0x0 | 0x407064 | 0x7ac8 | 0x7ac8 | 0x35d |
FindFirstFileA | 0x0 | 0x407068 | 0x7acc | 0x7acc | 0x132 |
DeleteCriticalSection | 0x0 | 0x40706c | 0x7ad0 | 0x7ad0 | 0xd1 |
GetCommMask | 0x0 | 0x407070 | 0x7ad4 | 0x7ad4 | 0x181 |
ReleaseMutex | 0x0 | 0x407074 | 0x7ad8 | 0x7ad8 | 0x3fa |
Sleep | 0x0 | 0x407078 | 0x7adc | 0x7adc | 0x4b2 |
IsValidLanguageGroup | 0x0 | 0x40707c | 0x7ae0 | 0x7ae0 | 0x30b |
WININET.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FindCloseUrlCache | 0x0 | 0x4070d4 | 0x7b38 | 0x7b38 | 0x13 |
WINSPOOL.DRV (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FindNextPrinterChangeNotification | 0x0 | 0x4070dc | 0x7b40 | 0x7b40 | 0x6c |
DeletePrinterDriverW | 0x0 | 0x4070e0 | 0x7b44 | 0x7b44 | 0x41 |
GetPrinterDriverW | 0x0 | 0x4070e4 | 0x7b48 | 0x7b48 | 0x86 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VarCyFromUI4 | 0xe3 | 0x407084 | 0x7ae8 | 0x7ae8 | - |
Secur32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteSecurityContext | 0x0 | 0x407094 | 0x7af8 | 0x7af8 | 0x11 |
SHLWAPI.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetMenuPosFromID | 0x0 | 0x40708c | 0x7af0 | 0x7af0 | 0x13 |
USER32.dll (13)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ToUnicode | 0x0 | 0x40709c | 0x7b00 | 0x7b00 | 0x2f3 |
IsWindowVisible | 0x0 | 0x4070a0 | 0x7b04 | 0x7b04 | 0x1e0 |
IsCharLowerA | 0x0 | 0x4070a4 | 0x7b08 | 0x7b08 | 0x1c5 |
CountClipboardFormats | 0x0 | 0x4070a8 | 0x7b0c | 0x7b0c | 0x56 |
EnumWindows | 0x0 | 0x4070ac | 0x7b10 | 0x7b10 | 0xf2 |
GetWindowTextW | 0x0 | 0x4070b0 | 0x7b14 | 0x7b14 | 0x1a3 |
GetMenuBarInfo | 0x0 | 0x4070b4 | 0x7b18 | 0x7b18 | 0x14c |
GetDlgItem | 0x0 | 0x4070b8 | 0x7b1c | 0x7b1c | 0x127 |
GetShellWindow | 0x0 | 0x4070bc | 0x7b20 | 0x7b20 | 0x179 |
GetDlgItemTextW | 0x0 | 0x4070c0 | 0x7b24 | 0x7b24 | 0x12a |
GetClientRect | 0x0 | 0x4070c4 | 0x7b28 | 0x7b28 | 0x114 |
GetUpdateRgn | 0x0 | 0x4070c8 | 0x7b2c | 0x7b2c | 0x188 |
IsWindowEnabled | 0x0 | 0x4070cc | 0x7b30 | 0x7b30 | 0x1dc |
Memory Dumps (28)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Relevant Image |
![]() |
32-bit | 0x004033EB |
![]() |
![]() |
...
|
buffer | 1 | 0x00230000 | 0x00234FFF | First Execution |
![]() |
32-bit | 0x00232021 |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040113A |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040BD8E |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040D03B |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040EBA4 |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x00402017 |
![]() |
![]() |
...
|
buffer | 1 | 0x00210000 | 0x00226FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00240000 | 0x00257FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
msader15.dll.exe | 1 | 0x00400000 | 0x00426FFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x001C0000 | 0x001C4FFF | First Execution |
![]() |
32-bit | 0x001C2021 |
![]() |
![]() |
...
|
msader15.dll.exe | 2 | 0x00400000 | 0x00426FFF | First Execution |
![]() |
32-bit | 0x0040113A |
![]() |
![]() |
...
|
msader15.dll.exe | 2 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040BD8E |
![]() |
![]() |
...
|
buffer | 20 | 0x001D0000 | 0x001D4FFF | First Execution |
![]() |
32-bit | 0x001D2021 |
![]() |
![]() |
...
|
msader15.dll.exe | 20 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040113A |
![]() |
![]() |
...
|
msader15.dll.exe | 20 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040BD8E |
![]() |
![]() |
...
|
buffer | 2 | 0x001A0000 | 0x001B6FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x00260000 | 0x00277FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 22 | 0x003B0000 | 0x003B4FFF | First Execution |
![]() |
32-bit | 0x003B2021 |
![]() |
![]() |
...
|
msader15.dll.exe | 22 | 0x00400000 | 0x00426FFF | First Execution |
![]() |
32-bit | 0x0040113A |
![]() |
![]() |
...
|
msader15.dll.exe | 22 | 0x00400000 | 0x00426FFF | Content Changed |
![]() |
32-bit | 0x0040BD8E |
![]() |
![]() |
...
|
buffer | 22 | 0x00390000 | 0x003A6FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 20 | 0x001B0000 | 0x001C6FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 22 | 0x003C0000 | 0x003D7FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 67 | 0x00230000 | 0x00234FFF | First Execution |
![]() |
32-bit | 0x00232021 |
![]() |
![]() |
...
|
buffer | 68 | 0x00240000 | 0x00244FFF | First Execution |
![]() |
32-bit | 0x00242021 |
![]() |
![]() |
...
|
buffer | 68 | 0x00220000 | 0x00236FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 67 | 0x00210000 | 0x00226FFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.601945 |
Malicious
|
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2011-06-02 05:37 (UTC+2) |
Last Seen | 2019-07-18 18:39 (UTC+2) |
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_32.db | Modified File | Stream |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2013-02-11 15:46 (UTC+1) |
Last Seen | 2019-05-03 10:33 (UTC+2) |
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_1024.db | Modified File | Stream |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2013-01-10 06:35 (UTC+1) |
Last Seen | 2019-05-03 10:33 (UTC+2) |
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_sr.db | Modified File | Stream |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2013-01-10 06:33 (UTC+1) |
Last Seen | 2019-05-03 10:33 (UTC+2) |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe:0 | Dropped File | Binary |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2015-07-21 07:40 (UTC+2) |
Last Seen | 2019-03-07 19:55 (UTC+1) |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40295a |
Size Of Code | 0x12600 |
Size Of Initialized Data | 0x3800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2015-06-20 03:54:53+00:00 |
Version Information (10)
»
Comments | Flavor=Retail |
CompanyName | Microsoft Corporation |
FileDescription | .NET Runtime Optimization Service |
FileVersion | 4.6.81.0 built by: NETFXREL2 |
InternalName | mscorsvw.exe |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | mscorsvw.exe |
PrivateBuild | DDBLD031C |
ProductName | Microsoft® .NET Framework |
ProductVersion | 4.6.81.0 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x124f8 | 0x12600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.22 |
.data | 0x414000 | 0xa18 | 0x400 | 0x12a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.41 |
.idata | 0x415000 | 0xf46 | 0x1000 | 0x12e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.37 |
.rsrc | 0x416000 | 0x764 | 0x800 | 0x13e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.36 |
.reloc | 0x417000 | 0x1400 | 0x1400 | 0x14600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.69 |
Imports (7)
»
ADVAPI32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryInfoKeyW | 0x0 | 0x415000 | 0x15374 | 0x13174 | 0x290 |
SetTokenInformation | 0x0 | 0x415004 | 0x15378 | 0x13178 | 0x2ef |
DuplicateTokenEx | 0x0 | 0x415008 | 0x1537c | 0x1317c | 0xef |
RegCloseKey | 0x0 | 0x41500c | 0x15380 | 0x13180 | 0x258 |
EventWrite | 0x0 | 0x415010 | 0x15384 | 0x13184 | 0x123 |
RegQueryValueExW | 0x0 | 0x415014 | 0x15388 | 0x13188 | 0x296 |
RegOpenKeyExW | 0x0 | 0x415018 | 0x1538c | 0x1318c | 0x289 |
KERNEL32.dll (69)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WaitForMultipleObjects | 0x0 | 0x415020 | 0x15394 | 0x13194 | 0x5b9 |
IsDebuggerPresent | 0x0 | 0x415024 | 0x15398 | 0x13198 | 0x383 |
CloseHandle | 0x0 | 0x415028 | 0x1539c | 0x1319c | 0x8e |
GetWindowsDirectoryW | 0x0 | 0x41502c | 0x153a0 | 0x131a0 | 0x32e |
DebugBreak | 0x0 | 0x415030 | 0x153a4 | 0x131a4 | 0x114 |
CreateThread | 0x0 | 0x415034 | 0x153a8 | 0x131a8 | 0x101 |
TlsFree | 0x0 | 0x415038 | 0x153ac | 0x131ac | 0x582 |
TlsAlloc | 0x0 | 0x41503c | 0x153b0 | 0x131b0 | 0x581 |
ReleaseMutex | 0x0 | 0x415040 | 0x153b4 | 0x131b4 | 0x497 |
DeleteCriticalSection | 0x0 | 0x415044 | 0x153b8 | 0x131b8 | 0x11e |
VirtualProtect | 0x0 | 0x415048 | 0x153bc | 0x131bc | 0x5b1 |
CreateSemaphoreW | 0x0 | 0x41504c | 0x153c0 | 0x131c0 | 0xf5 |
ResetEvent | 0x0 | 0x415050 | 0x153c4 | 0x131c4 | 0x4ae |
EnterCriticalSection | 0x0 | 0x415054 | 0x153c8 | 0x131c8 | 0x140 |
VirtualAlloc | 0x0 | 0x415058 | 0x153cc | 0x131cc | 0x5ab |
ReleaseSemaphore | 0x0 | 0x41505c | 0x153d0 | 0x131d0 | 0x49b |
HeapValidate | 0x0 | 0x415060 | 0x153d4 | 0x131d4 | 0x359 |
HeapCreate | 0x0 | 0x415064 | 0x153d8 | 0x131d8 | 0x34f |
LeaveCriticalSection | 0x0 | 0x415068 | 0x153dc | 0x131dc | 0x3bd |
HeapDestroy | 0x0 | 0x41506c | 0x153e0 | 0x131e0 | 0x350 |
TlsSetValue | 0x0 | 0x415070 | 0x153e4 | 0x131e4 | 0x584 |
InitializeCriticalSection | 0x0 | 0x415074 | 0x153e8 | 0x131e8 | 0x365 |
VirtualFree | 0x0 | 0x415078 | 0x153ec | 0x131ec | 0x5ae |
WaitForSingleObjectEx | 0x0 | 0x41507c | 0x153f0 | 0x131f0 | 0x5bc |
SleepEx | 0x0 | 0x415080 | 0x153f4 | 0x131f4 | 0x562 |
VirtualQuery | 0x0 | 0x415084 | 0x153f8 | 0x131f8 | 0x5b3 |
TlsGetValue | 0x0 | 0x415088 | 0x153fc | 0x131fc | 0x583 |
CreateMutexW | 0x0 | 0x41508c | 0x15400 | 0x13200 | 0xe5 |
GetCurrentThreadId | 0x0 | 0x415090 | 0x15404 | 0x13204 | 0x228 |
GetSystemTimeAsFileTime | 0x0 | 0x415094 | 0x15408 | 0x13208 | 0x2f4 |
SetLastError | 0x0 | 0x415098 | 0x1540c | 0x1320c | 0x517 |
HeapSetInformation | 0x0 | 0x41509c | 0x15410 | 0x13210 | 0x355 |
CreateEventW | 0x0 | 0x4150a0 | 0x15414 | 0x13214 | 0xca |
CreateFileW | 0x0 | 0x4150a4 | 0x15418 | 0x13218 | 0xd6 |
WaitForSingleObject | 0x0 | 0x4150a8 | 0x1541c | 0x1321c | 0x5bb |
FindFirstFileW | 0x0 | 0x4150ac | 0x15420 | 0x13220 | 0x18f |
GetEnvironmentVariableW | 0x0 | 0x4150b0 | 0x15424 | 0x13224 | 0x242 |
LocalFree | 0x0 | 0x4150b4 | 0x15428 | 0x13228 | 0x3cd |
MultiByteToWideChar | 0x0 | 0x4150b8 | 0x1542c | 0x1322c | 0x3ec |
GetACP | 0x0 | 0x4150bc | 0x15430 | 0x13230 | 0x1be |
FormatMessageW | 0x0 | 0x4150c0 | 0x15434 | 0x13234 | 0x1b4 |
GetCPInfo | 0x0 | 0x4150c4 | 0x15438 | 0x13238 | 0x1cd |
RaiseException | 0x0 | 0x4150c8 | 0x1543c | 0x1323c | 0x448 |
GetProcessHeap | 0x0 | 0x4150cc | 0x15440 | 0x13240 | 0x2ba |
HeapFree | 0x0 | 0x4150d0 | 0x15444 | 0x13244 | 0x351 |
HeapAlloc | 0x0 | 0x4150d4 | 0x15448 | 0x13248 | 0x34d |
GetFileType | 0x0 | 0x4150d8 | 0x1544c | 0x1324c | 0x257 |
GetProcAddress | 0x0 | 0x4150dc | 0x15450 | 0x13250 | 0x2b5 |
GetLastError | 0x0 | 0x4150e0 | 0x15454 | 0x13254 | 0x26a |
QueryPerformanceCounter | 0x0 | 0x4150e4 | 0x15458 | 0x13258 | 0x43c |
IsProcessorFeaturePresent | 0x0 | 0x4150e8 | 0x1545c | 0x1325c | 0x388 |
DecodePointer | 0x0 | 0x4150ec | 0x15460 | 0x13260 | 0x117 |
EncodePointer | 0x0 | 0x4150f0 | 0x15464 | 0x13264 | 0x13c |
GetStdHandle | 0x0 | 0x4150f4 | 0x15468 | 0x13268 | 0x2dd |
GetCurrentProcessId | 0x0 | 0x4150f8 | 0x1546c | 0x1326c | 0x224 |
GetModuleFileNameW | 0x0 | 0x4150fc | 0x15470 | 0x13270 | 0x27d |
TerminateProcess | 0x0 | 0x415100 | 0x15474 | 0x13274 | 0x56f |
GetFileAttributesW | 0x0 | 0x415104 | 0x15478 | 0x13278 | 0x24e |
GetVersionExW | 0x0 | 0x415108 | 0x1547c | 0x1327c | 0x323 |
WerSetFlags | 0x0 | 0x41510c | 0x15480 | 0x13280 | 0x5cc |
WriteFile | 0x0 | 0x415110 | 0x15484 | 0x13284 | 0x5f1 |
OutputDebugStringW | 0x0 | 0x415114 | 0x15488 | 0x13288 | 0x415 |
SetEvent | 0x0 | 0x415118 | 0x1548c | 0x1328c | 0x4fc |
SetEnvironmentVariableW | 0x0 | 0x41511c | 0x15490 | 0x13290 | 0x4fa |
GetCurrentProcess | 0x0 | 0x415120 | 0x15494 | 0x13294 | 0x223 |
LoadLibraryExW | 0x0 | 0x415124 | 0x15498 | 0x13298 | 0x3c2 |
FreeLibrary | 0x0 | 0x415128 | 0x1549c | 0x1329c | 0x1b8 |
GetCommandLineW | 0x0 | 0x41512c | 0x154a0 | 0x132a0 | 0x1e3 |
FindClose | 0x0 | 0x415130 | 0x154a4 | 0x132a4 | 0x184 |
MSVCR120_CLR0400.dll (55)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CxxThrowException | 0x0 | 0x415138 | 0x154ac | 0x132ac | 0x158 |
__CxxFrameHandler3 | 0x0 | 0x41513c | 0x154b0 | 0x132b0 | 0x174 |
memcpy | 0x0 | 0x415140 | 0x154b4 | 0x132b4 | 0x6e6 |
_except_handler4_common | 0x0 | 0x415144 | 0x154b8 | 0x132b8 | 0x27a |
_controlfp_s | 0x0 | 0x415148 | 0x154bc | 0x132bc | 0x243 |
_invoke_watson | 0x0 | 0x41514c | 0x154c0 | 0x132c0 | 0x314 |
__crtSetUnhandledExceptionFilter | 0x0 | 0x415150 | 0x154c4 | 0x132c4 | 0x1a9 |
?terminate@@YAXXZ | 0x0 | 0x415154 | 0x154c8 | 0x132c8 | 0x135 |
__crtTerminateProcess | 0x0 | 0x415158 | 0x154cc | 0x132cc | 0x1ab |
__crtUnhandledException | 0x0 | 0x41515c | 0x154d0 | 0x132d0 | 0x1ac |
_crt_debugger_hook | 0x0 | 0x415160 | 0x154d4 | 0x132d4 | 0x250 |
??1type_info@@UAE@XZ | 0x0 | 0x415164 | 0x154d8 | 0x132d8 | 0x6f |
_onexit | 0x0 | 0x415168 | 0x154dc | 0x132dc | 0x43a |
__dllonexit | 0x0 | 0x41516c | 0x154e0 | 0x132e0 | 0x1ae |
_calloc_crt | 0x0 | 0x415170 | 0x154e4 | 0x132e4 | 0x22e |
_unlock | 0x0 | 0x415174 | 0x154e8 | 0x132e8 | 0x504 |
_lock | 0x0 | 0x415178 | 0x154ec | 0x132ec | 0x394 |
_commode | 0x0 | 0x41517c | 0x154f0 | 0x132f0 | 0x23f |
_fmode | 0x0 | 0x415180 | 0x154f4 | 0x132f4 | 0x2a2 |
_acmdln | 0x0 | 0x415184 | 0x154f8 | 0x132f8 | 0x20e |
_initterm | 0x0 | 0x415188 | 0x154fc | 0x132fc | 0x30c |
_initterm_e | 0x0 | 0x41518c | 0x15500 | 0x13300 | 0x30d |
__setusermatherr | 0x0 | 0x415190 | 0x15504 | 0x13304 | 0x1f4 |
_configthreadlocale | 0x0 | 0x415194 | 0x15508 | 0x13308 | 0x240 |
_ismbblead | 0x0 | 0x415198 | 0x1550c | 0x1330c | 0x331 |
_cexit | 0x0 | 0x41519c | 0x15510 | 0x13310 | 0x22f |
_exit | 0x0 | 0x4151a0 | 0x15514 | 0x13314 | 0x283 |
exit | 0x0 | 0x4151a4 | 0x15518 | 0x13318 | 0x64e |
__set_app_type | 0x0 | 0x4151a8 | 0x1551c | 0x1331c | 0x1f2 |
__getmainargs | 0x0 | 0x4151ac | 0x15520 | 0x13320 | 0x1b6 |
_amsg_exit | 0x0 | 0x4151b0 | 0x15524 | 0x13324 | 0x217 |
__crtGetShowWindowMode | 0x0 | 0x4151b4 | 0x15528 | 0x13328 | 0x19d |
_XcptFilter | 0x0 | 0x4151b8 | 0x1552c | 0x1332c | 0x16b |
malloc | 0x0 | 0x4151bc | 0x15530 | 0x13330 | 0x6db |
free | 0x0 | 0x4151c0 | 0x15534 | 0x13334 | 0x683 |
iswspace | 0x0 | 0x4151c4 | 0x15538 | 0x13338 | 0x6b6 |
wcsncmp | 0x0 | 0x4151c8 | 0x1553c | 0x1333c | 0x78b |
strcpy_s | 0x0 | 0x4151cc | 0x15540 | 0x13340 | 0x733 |
_vsnprintf_s | 0x0 | 0x4151d0 | 0x15544 | 0x13344 | 0x52d |
strncmp | 0x0 | 0x4151d4 | 0x15548 | 0x13348 | 0x73b |
wcscat_s | 0x0 | 0x4151d8 | 0x1554c | 0x1334c | 0x780 |
_errno | 0x0 | 0x4151dc | 0x15550 | 0x13350 | 0x276 |
wcscpy_s | 0x0 | 0x4151e0 | 0x15554 | 0x13354 | 0x785 |
_vsnwprintf_s | 0x0 | 0x4151e4 | 0x15558 | 0x13358 | 0x531 |
freopen | 0x0 | 0x4151e8 | 0x1555c | 0x1335c | 0x684 |
_purecall | 0x0 | 0x4151ec | 0x15560 | 0x13360 | 0x449 |
fflush | 0x0 | 0x4151f0 | 0x15564 | 0x13364 | 0x668 |
__iob_func | 0x0 | 0x4151f4 | 0x15568 | 0x13368 | 0x1b8 |
_wcsnicmp | 0x0 | 0x4151f8 | 0x1556c | 0x1336c | 0x55b |
fwprintf | 0x0 | 0x4151fc | 0x15570 | 0x13370 | 0x68c |
wcstoul | 0x0 | 0x415200 | 0x15574 | 0x13374 | 0x79f |
memmove | 0x0 | 0x415204 | 0x15578 | 0x13378 | 0x6e8 |
wcsncpy_s | 0x0 | 0x415208 | 0x1557c | 0x1337c | 0x78d |
_wcsicmp | 0x0 | 0x41520c | 0x15580 | 0x13380 | 0x551 |
memset | 0x0 | 0x415210 | 0x15584 | 0x13384 | 0x6ea |
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetRequestedRuntimeInfo | 0x0 | 0x415218 | 0x1558c | 0x1338c | 0x37 |
ole32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoTaskMemFree | 0x0 | 0x415220 | 0x15594 | 0x13394 | 0x79 |
CreateStreamOnHGlobal | 0x0 | 0x415224 | 0x15598 | 0x13398 | 0x98 |
CoUninitialize | 0x0 | 0x415228 | 0x1559c | 0x1339c | 0x7d |
CoInitializeEx | 0x0 | 0x41522c | 0x155a0 | 0x133a0 | 0x4f |
CoAddRefServerProcess | 0x0 | 0x415230 | 0x155a4 | 0x133a4 | 0x10 |
CoReleaseServerProcess | 0x0 | 0x415234 | 0x155a8 | 0x133a8 | 0x6b |
CoMarshalInterface | 0x0 | 0x415238 | 0x155ac | 0x133ac | 0x5a |
OLEAUT32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysAllocString | 0x2 | 0x415240 | 0x155b4 | 0x133b4 | - |
SetErrorInfo | 0xc9 | 0x415244 | 0x155b8 | 0x133b8 | - |
SysFreeString | 0x6 | 0x415248 | 0x155bc | 0x133bc | - |
SysStringLen | 0x7 | 0x41524c | 0x155c0 | 0x133c0 | - |
USER32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DispatchMessageW | 0x0 | 0x415254 | 0x155c8 | 0x133c8 | 0xb6 |
LoadStringW | 0x0 | 0x415258 | 0x155cc | 0x133cc | 0x22f |
MsgWaitForMultipleObjectsEx | 0x0 | 0x41525c | 0x155d0 | 0x133d0 | 0x253 |
PeekMessageW | 0x0 | 0x415260 | 0x155d4 | 0x133d4 | 0x26a |
Digital Signatures (2)
»
Certificate: Microsoft Dynamic Code Publisher
»
Issued by | Microsoft Dynamic Code Publisher |
Parent Certificate | Microsoft Code Signing PCA |
Country Name | US |
Valid From | 2015-05-14 17:12:59+00:00 |
Valid Until | 2016-08-14 17:12:59+00:00 |
Algorithm | sha1_rsa |
Serial Number | 33 00 00 00 FA 34 E0 48 11 31 F8 1E 07 00 01 00 00 00 FA |
Thumbprint | A4 A0 24 0A D7 C0 75 BF 06 27 9B 6E AF 39 C2 62 0D D7 A7 0F |
Certificate: Microsoft Code Signing PCA
»
Issued by | Microsoft Code Signing PCA |
Country Name | US |
Valid From | 2010-08-31 22:19:32+00:00 |
Valid Until | 2020-08-31 22:29:32+00:00 |
Algorithm | sha1_rsa |
Serial Number | 61 33 26 1A 00 00 00 00 00 31 |
Thumbprint | 3C AF 9B A2 DB 55 70 CA F7 69 42 FF 99 10 1B 99 38 88 E2 57 |
c:\users\5p5nrg~1\appdata\local\temp\armui.ini | Dropped File | Text |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2015-04-17 22:22 (UTC+2) |
Last Seen | 2019-04-11 04:52 (UTC+2) |
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.al1b1nal1 | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\5f5a18eb-dc73-4e45-a11c-b59043598412 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\2470470f-2634-478e-b181-571e98a789bb | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\7afcc0ca-7121-422a-ab45-b0e8d599ff08 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\b2945f6a-2378-4a2d-a700-f64d33f40fe5 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\044a6734-e90e-4f8f-b357-b2dc8ab3b5ec | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_idx.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_256.db | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\2f57269b-1e09-4e2d-ab1e-b0fdac7d279c | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\2470470f-2634-478e-b181-571e98a789bb | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\b2945f6a-2378-4a2d-a700-f64d33f40fe5 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\eaca24ff-236c-401d-a1e7-b3d5267b8a50 | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\explorerstartuplog_runonce.etl | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrg~1\appdata\local\temp\adobearm.log | Modified File | Text |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_idx.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_96.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_256.db | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5P5NRG~1\AppData\Local\Temp\F888F.tmp | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.al1b1nal1_readme | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5P5NRG~1\AppData\Roaming\RSVRYB~1\O0U5OT~1.EXE | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5P5NRG~1\AppData\Roaming\RSVRYB~1\O0U5OT~1.EXE | Dropped File | Stream |
Unknown
|
...
|
»