VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Dropper
Spyware
|
Threat Names: |
Win32.Neshta.A
Generic.Ransom.MedusaLocker.87AF3DD7
Win32.Neshta.H
...
|
va-1.8.exe
Windows Exe (x86-32)
Created at 2020-02-23T12:46:00
Remarks (1/1)
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
(0x0200001B): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\va-1.8.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
va-1.8.exe | 1 | 0x00400000 | 0x0041AFFF | Relevant Image |
![]() |
32-bit | 0x00402E4C |
![]() |
![]() |
...
|
va-1.8.exe | 1 | 0x00400000 | 0x0041AFFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.93 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{91140~2\ose.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{91140~1\setup.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.16 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.34 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROTE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.24 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\WOW_HE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ACROBA~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\READER~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaucheck.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.5 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.08 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Google\Chrome\APPLIC~1\580302~1.110\INSTAL~1\chrmstp.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 2.85 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.1 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\JABSWI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\java.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javacpl.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javaw.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javaws.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\JP2LAU~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\jqs.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\ssvagent.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\UNPACK~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\CRASHR~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.31 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\firefox.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.77 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\MAINTE~2.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\UNINST~1\helper.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\updater.exe | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.41 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\WEBAPP~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 2.64 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\WEBAPP~2.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~2\UNINST~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{3C3AA~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{E52A6~1\VC_RED~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{E6E75~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{F325F~1\VC_RED~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Apps\2.0\DQQ19BCJ.JAX\YVORLGOR.PNT\CLICEX~1.000\GOOGLE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.26 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Temp\3582-490\va-1.8.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x439aef |
Size Of Code | 0x72200 |
Size Of Initialized Data | 0x35800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-12-18 16:34:58+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x72016 | 0x72200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.54 |
.rdata | 0x474000 | 0x2ad52 | 0x2ae00 | 0x72600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.59 |
.data | 0x49f000 | 0x4b68 | 0x3a00 | 0x9d400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.78 |
.rsrc | 0x4a4000 | 0x1e0 | 0x200 | 0xa0e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.71 |
.reloc | 0x4a5000 | 0x5a6c | 0x5c00 | 0xa1000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.57 |
Imports (11)
»
KERNEL32.dll (138)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Process32NextW | 0x0 | 0x474078 | 0x9dc80 | 0x9c280 | 0x42e |
Process32FirstW | 0x0 | 0x47407c | 0x9dc84 | 0x9c284 | 0x42c |
CreateProcessW | 0x0 | 0x474080 | 0x9dc88 | 0x9c288 | 0xe5 |
GetTickCount | 0x0 | 0x474084 | 0x9dc8c | 0x9c28c | 0x307 |
CopyFileW | 0x0 | 0x474088 | 0x9dc90 | 0x9c290 | 0xad |
GetCurrentProcess | 0x0 | 0x47408c | 0x9dc94 | 0x9c294 | 0x217 |
WriteConsoleW | 0x0 | 0x474090 | 0x9dc98 | 0x9c298 | 0x611 |
CreateToolhelp32Snapshot | 0x0 | 0x474094 | 0x9dc9c | 0x9c29c | 0xfc |
OpenProcess | 0x0 | 0x474098 | 0x9dca0 | 0x9c2a0 | 0x40d |
WaitForSingleObject | 0x0 | 0x47409c | 0x9dca4 | 0x9c2a4 | 0x5d7 |
TerminateProcess | 0x0 | 0x4740a0 | 0x9dca8 | 0x9c2a8 | 0x58c |
FindClose | 0x0 | 0x4740a4 | 0x9dcac | 0x9c2ac | 0x175 |
FindNextVolumeW | 0x0 | 0x4740a8 | 0x9dcb0 | 0x9c2b0 | 0x191 |
GetVolumePathNamesForVolumeNameW | 0x0 | 0x4740ac | 0x9dcb4 | 0x9c2b4 | 0x324 |
FindVolumeClose | 0x0 | 0x4740b0 | 0x9dcb8 | 0x9c2b8 | 0x198 |
SetVolumeMountPointW | 0x0 | 0x4740b4 | 0x9dcbc | 0x9c2bc | 0x574 |
FindFirstVolumeW | 0x0 | 0x4740b8 | 0x9dcc0 | 0x9c2c0 | 0x186 |
QueryDosDeviceW | 0x0 | 0x4740bc | 0x9dcc4 | 0x9c2c4 | 0x445 |
GetEnvironmentVariableW | 0x0 | 0x4740c0 | 0x9dcc8 | 0x9c2c8 | 0x239 |
GetLogicalDrives | 0x0 | 0x4740c4 | 0x9dccc | 0x9c2cc | 0x268 |
GetProcessHeap | 0x0 | 0x4740c8 | 0x9dcd0 | 0x9c2d0 | 0x2b4 |
MoveFileExW | 0x0 | 0x4740cc | 0x9dcd4 | 0x9c2d4 | 0x3e8 |
SetFilePointerEx | 0x0 | 0x4740d0 | 0x9dcd8 | 0x9c2d8 | 0x523 |
HeapAlloc | 0x0 | 0x4740d4 | 0x9dcdc | 0x9c2dc | 0x345 |
CloseHandle | 0x0 | 0x4740d8 | 0x9dce0 | 0x9c2e0 | 0x86 |
GetLastError | 0x0 | 0x4740dc | 0x9dce4 | 0x9c2e4 | 0x261 |
SetFileAttributesW | 0x0 | 0x4740e0 | 0x9dce8 | 0x9c2e8 | 0x51d |
GetFileAttributesW | 0x0 | 0x4740e4 | 0x9dcec | 0x9c2ec | 0x245 |
CreateFileW | 0x0 | 0x4740e8 | 0x9dcf0 | 0x9c2f0 | 0xcb |
WriteFile | 0x0 | 0x4740ec | 0x9dcf4 | 0x9c2f4 | 0x612 |
HeapSize | 0x0 | 0x4740f0 | 0x9dcf8 | 0x9c2f8 | 0x34e |
GetConsoleMode | 0x0 | 0x4740f4 | 0x9dcfc | 0x9c2fc | 0x1fc |
GetConsoleCP | 0x0 | 0x4740f8 | 0x9dd00 | 0x9c300 | 0x1ea |
FlushFileBuffers | 0x0 | 0x4740fc | 0x9dd04 | 0x9c304 | 0x19f |
SetStdHandle | 0x0 | 0x474100 | 0x9dd08 | 0x9c308 | 0x54a |
FreeEnvironmentStringsW | 0x0 | 0x474104 | 0x9dd0c | 0x9c30c | 0x1aa |
GetEnvironmentStringsW | 0x0 | 0x474108 | 0x9dd10 | 0x9c310 | 0x237 |
GetCommandLineW | 0x0 | 0x47410c | 0x9dd14 | 0x9c314 | 0x1d7 |
GetCommandLineA | 0x0 | 0x474110 | 0x9dd18 | 0x9c318 | 0x1d6 |
GetOEMCP | 0x0 | 0x474114 | 0x9dd1c | 0x9c31c | 0x297 |
GetACP | 0x0 | 0x474118 | 0x9dd20 | 0x9c320 | 0x1b2 |
IsValidCodePage | 0x0 | 0x47411c | 0x9dd24 | 0x9c324 | 0x38b |
HeapReAlloc | 0x0 | 0x474120 | 0x9dd28 | 0x9c328 | 0x34c |
GetFileType | 0x0 | 0x474124 | 0x9dd2c | 0x9c32c | 0x24e |
GetTimeZoneInformation | 0x0 | 0x474128 | 0x9dd30 | 0x9c330 | 0x30e |
EnumSystemLocalesW | 0x0 | 0x47412c | 0x9dd34 | 0x9c334 | 0x154 |
HeapFree | 0x0 | 0x474130 | 0x9dd38 | 0x9c338 | 0x349 |
GetFileSizeEx | 0x0 | 0x474134 | 0x9dd3c | 0x9c33c | 0x24c |
GetUserDefaultLCID | 0x0 | 0x474138 | 0x9dd40 | 0x9c340 | 0x312 |
IsValidLocale | 0x0 | 0x47413c | 0x9dd44 | 0x9c344 | 0x38d |
GetTimeFormatW | 0x0 | 0x474140 | 0x9dd48 | 0x9c348 | 0x30c |
GetDateFormatW | 0x0 | 0x474144 | 0x9dd4c | 0x9c34c | 0x221 |
GetStdHandle | 0x0 | 0x474148 | 0x9dd50 | 0x9c350 | 0x2d2 |
ReadFile | 0x0 | 0x47414c | 0x9dd54 | 0x9c354 | 0x473 |
OpenMutexW | 0x0 | 0x474150 | 0x9dd58 | 0x9c358 | 0x409 |
Sleep | 0x0 | 0x474154 | 0x9dd5c | 0x9c35c | 0x57d |
CreateMutexW | 0x0 | 0x474158 | 0x9dd60 | 0x9c360 | 0xda |
GetModuleFileNameW | 0x0 | 0x47415c | 0x9dd64 | 0x9c364 | 0x274 |
SetEnvironmentVariableW | 0x0 | 0x474160 | 0x9dd68 | 0x9c368 | 0x514 |
EncodePointer | 0x0 | 0x474164 | 0x9dd6c | 0x9c36c | 0x12d |
DecodePointer | 0x0 | 0x474168 | 0x9dd70 | 0x9c370 | 0x109 |
RaiseException | 0x0 | 0x47416c | 0x9dd74 | 0x9c374 | 0x462 |
GetCurrentThreadId | 0x0 | 0x474170 | 0x9dd78 | 0x9c378 | 0x21c |
IsProcessorFeaturePresent | 0x0 | 0x474174 | 0x9dd7c | 0x9c37c | 0x386 |
QueueUserWorkItem | 0x0 | 0x474178 | 0x9dd80 | 0x9c380 | 0x457 |
GetModuleHandleExW | 0x0 | 0x47417c | 0x9dd84 | 0x9c384 | 0x277 |
EnterCriticalSection | 0x0 | 0x474180 | 0x9dd88 | 0x9c388 | 0x131 |
LeaveCriticalSection | 0x0 | 0x474184 | 0x9dd8c | 0x9c38c | 0x3bd |
TryEnterCriticalSection | 0x0 | 0x474188 | 0x9dd90 | 0x9c390 | 0x5a7 |
DeleteCriticalSection | 0x0 | 0x47418c | 0x9dd94 | 0x9c394 | 0x110 |
QueryPerformanceCounter | 0x0 | 0x474190 | 0x9dd98 | 0x9c398 | 0x44d |
QueryPerformanceFrequency | 0x0 | 0x474194 | 0x9dd9c | 0x9c39c | 0x44e |
FormatMessageW | 0x0 | 0x474198 | 0x9dda0 | 0x9c3a0 | 0x1a7 |
WideCharToMultiByte | 0x0 | 0x47419c | 0x9dda4 | 0x9c3a4 | 0x5fe |
MultiByteToWideChar | 0x0 | 0x4741a0 | 0x9dda8 | 0x9c3a8 | 0x3ef |
FindFirstFileExW | 0x0 | 0x4741a4 | 0x9ddac | 0x9c3ac | 0x17b |
FindNextFileW | 0x0 | 0x4741a8 | 0x9ddb0 | 0x9c3b0 | 0x18c |
GetFileAttributesExW | 0x0 | 0x4741ac | 0x9ddb4 | 0x9c3b4 | 0x242 |
SetLastError | 0x0 | 0x4741b0 | 0x9ddb8 | 0x9c3b8 | 0x532 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x4741b4 | 0x9ddbc | 0x9c3bc | 0x35f |
CreateEventW | 0x0 | 0x4741b8 | 0x9ddc0 | 0x9c3c0 | 0xbf |
SwitchToThread | 0x0 | 0x4741bc | 0x9ddc4 | 0x9c3c4 | 0x587 |
TlsAlloc | 0x0 | 0x4741c0 | 0x9ddc8 | 0x9c3c8 | 0x59e |
TlsGetValue | 0x0 | 0x4741c4 | 0x9ddcc | 0x9c3cc | 0x5a0 |
TlsSetValue | 0x0 | 0x4741c8 | 0x9ddd0 | 0x9c3d0 | 0x5a1 |
TlsFree | 0x0 | 0x4741cc | 0x9ddd4 | 0x9c3d4 | 0x59f |
GetSystemTimeAsFileTime | 0x0 | 0x4741d0 | 0x9ddd8 | 0x9c3d8 | 0x2e9 |
GetModuleHandleW | 0x0 | 0x4741d4 | 0x9dddc | 0x9c3dc | 0x278 |
GetProcAddress | 0x0 | 0x4741d8 | 0x9dde0 | 0x9c3e0 | 0x2ae |
WaitForSingleObjectEx | 0x0 | 0x4741dc | 0x9dde4 | 0x9c3e4 | 0x5d8 |
GetStringTypeW | 0x0 | 0x4741e0 | 0x9dde8 | 0x9c3e8 | 0x2d7 |
CompareStringW | 0x0 | 0x4741e4 | 0x9ddec | 0x9c3ec | 0x9b |
LCMapStringW | 0x0 | 0x4741e8 | 0x9ddf0 | 0x9c3f0 | 0x3b1 |
GetLocaleInfoW | 0x0 | 0x4741ec | 0x9ddf4 | 0x9c3f4 | 0x265 |
GetCPInfo | 0x0 | 0x4741f0 | 0x9ddf8 | 0x9c3f8 | 0x1c1 |
SetEvent | 0x0 | 0x4741f4 | 0x9ddfc | 0x9c3fc | 0x516 |
ResetEvent | 0x0 | 0x4741f8 | 0x9de00 | 0x9c400 | 0x4c6 |
UnhandledExceptionFilter | 0x0 | 0x4741fc | 0x9de04 | 0x9c404 | 0x5ad |
SetUnhandledExceptionFilter | 0x0 | 0x474200 | 0x9de08 | 0x9c408 | 0x56d |
IsDebuggerPresent | 0x0 | 0x474204 | 0x9de0c | 0x9c40c | 0x37f |
GetStartupInfoW | 0x0 | 0x474208 | 0x9de10 | 0x9c410 | 0x2d0 |
GetCurrentProcessId | 0x0 | 0x47420c | 0x9de14 | 0x9c414 | 0x218 |
InitializeSListHead | 0x0 | 0x474210 | 0x9de18 | 0x9c418 | 0x363 |
LocalFree | 0x0 | 0x474214 | 0x9de1c | 0x9c41c | 0x3cf |
CreateTimerQueue | 0x0 | 0x474218 | 0x9de20 | 0x9c420 | 0xfa |
SignalObjectAndWait | 0x0 | 0x47421c | 0x9de24 | 0x9c424 | 0x57b |
CreateThread | 0x0 | 0x474220 | 0x9de28 | 0x9c428 | 0xf3 |
SetThreadPriority | 0x0 | 0x474224 | 0x9de2c | 0x9c42c | 0x55e |
GetThreadPriority | 0x0 | 0x474228 | 0x9de30 | 0x9c430 | 0x301 |
GetLogicalProcessorInformation | 0x0 | 0x47422c | 0x9de34 | 0x9c434 | 0x269 |
CreateTimerQueueTimer | 0x0 | 0x474230 | 0x9de38 | 0x9c438 | 0xfb |
ChangeTimerQueueTimer | 0x0 | 0x474234 | 0x9de3c | 0x9c43c | 0x78 |
DeleteTimerQueueTimer | 0x0 | 0x474238 | 0x9de40 | 0x9c440 | 0x11a |
GetNumaHighestNodeNumber | 0x0 | 0x47423c | 0x9de44 | 0x9c444 | 0x289 |
GetProcessAffinityMask | 0x0 | 0x474240 | 0x9de48 | 0x9c448 | 0x2af |
SetThreadAffinityMask | 0x0 | 0x474244 | 0x9de4c | 0x9c44c | 0x553 |
RegisterWaitForSingleObject | 0x0 | 0x474248 | 0x9de50 | 0x9c450 | 0x4a9 |
UnregisterWait | 0x0 | 0x47424c | 0x9de54 | 0x9c454 | 0x5b6 |
GetCurrentThread | 0x0 | 0x474250 | 0x9de58 | 0x9c458 | 0x21b |
GetThreadTimes | 0x0 | 0x474254 | 0x9de5c | 0x9c45c | 0x305 |
FreeLibrary | 0x0 | 0x474258 | 0x9de60 | 0x9c460 | 0x1ab |
FreeLibraryAndExitThread | 0x0 | 0x47425c | 0x9de64 | 0x9c464 | 0x1ac |
GetModuleHandleA | 0x0 | 0x474260 | 0x9de68 | 0x9c468 | 0x275 |
LoadLibraryExW | 0x0 | 0x474264 | 0x9de6c | 0x9c46c | 0x3c3 |
GetVersionExW | 0x0 | 0x474268 | 0x9de70 | 0x9c470 | 0x31b |
VirtualAlloc | 0x0 | 0x47426c | 0x9de74 | 0x9c474 | 0x5c6 |
VirtualProtect | 0x0 | 0x474270 | 0x9de78 | 0x9c478 | 0x5cc |
VirtualFree | 0x0 | 0x474274 | 0x9de7c | 0x9c47c | 0x5c9 |
DuplicateHandle | 0x0 | 0x474278 | 0x9de80 | 0x9c480 | 0x12b |
ReleaseSemaphore | 0x0 | 0x47427c | 0x9de84 | 0x9c484 | 0x4b4 |
InterlockedPopEntrySList | 0x0 | 0x474280 | 0x9de88 | 0x9c488 | 0x36e |
InterlockedPushEntrySList | 0x0 | 0x474284 | 0x9de8c | 0x9c48c | 0x36f |
InterlockedFlushSList | 0x0 | 0x474288 | 0x9de90 | 0x9c490 | 0x36c |
QueryDepthSList | 0x0 | 0x47428c | 0x9de94 | 0x9c494 | 0x443 |
UnregisterWaitEx | 0x0 | 0x474290 | 0x9de98 | 0x9c498 | 0x5b7 |
LoadLibraryW | 0x0 | 0x474294 | 0x9de9c | 0x9c49c | 0x3c4 |
RtlUnwind | 0x0 | 0x474298 | 0x9dea0 | 0x9c4a0 | 0x4d3 |
ExitProcess | 0x0 | 0x47429c | 0x9dea4 | 0x9c4a4 | 0x15e |
ADVAPI32.dll (22)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptExportKey | 0x0 | 0x474000 | 0x9dc08 | 0x9c208 | 0xd0 |
RegCreateKeyW | 0x0 | 0x474004 | 0x9dc0c | 0x9c20c | 0x267 |
RegOpenKeyExW | 0x0 | 0x474008 | 0x9dc10 | 0x9c210 | 0x28c |
RegSetValueExW | 0x0 | 0x47400c | 0x9dc14 | 0x9c214 | 0x2a9 |
RegCloseKey | 0x0 | 0x474010 | 0x9dc18 | 0x9c218 | 0x25b |
CryptReleaseContext | 0x0 | 0x474014 | 0x9dc1c | 0x9c21c | 0xdc |
CryptGenKey | 0x0 | 0x474018 | 0x9dc20 | 0x9c220 | 0xd1 |
CryptImportKey | 0x0 | 0x47401c | 0x9dc24 | 0x9c224 | 0xdb |
OpenProcessToken | 0x0 | 0x474020 | 0x9dc28 | 0x9c228 | 0x215 |
GetTokenInformation | 0x0 | 0x474024 | 0x9dc2c | 0x9c22c | 0x170 |
CloseServiceHandle | 0x0 | 0x474028 | 0x9dc30 | 0x9c230 | 0x65 |
OpenSCManagerW | 0x0 | 0x47402c | 0x9dc34 | 0x9c234 | 0x217 |
DeleteService | 0x0 | 0x474030 | 0x9dc38 | 0x9c238 | 0xec |
ControlService | 0x0 | 0x474034 | 0x9dc3c | 0x9c23c | 0x6a |
EnumDependentServicesW | 0x0 | 0x474038 | 0x9dc40 | 0x9c240 | 0x10f |
OpenServiceW | 0x0 | 0x47403c | 0x9dc44 | 0x9c244 | 0x219 |
QueryServiceStatusEx | 0x0 | 0x474040 | 0x9dc48 | 0x9c248 | 0x251 |
CryptDestroyKey | 0x0 | 0x474044 | 0x9dc4c | 0x9c24c | 0xc8 |
CryptAcquireContextW | 0x0 | 0x474048 | 0x9dc50 | 0x9c250 | 0xc2 |
CryptEncrypt | 0x0 | 0x47404c | 0x9dc54 | 0x9c254 | 0xcb |
CryptDuplicateKey | 0x0 | 0x474050 | 0x9dc58 | 0x9c258 | 0xca |
RegDeleteValueW | 0x0 | 0x474054 | 0x9dc5c | 0x9c25c | 0x273 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHEmptyRecycleBinW | 0x0 | 0x4742ec | 0x9def4 | 0x9c4f4 | 0x13a |
ole32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CLSIDFromString | 0x0 | 0x4742fc | 0x9df04 | 0x9c504 | 0xc |
IIDFromString | 0x0 | 0x474300 | 0x9df08 | 0x9c508 | 0x102 |
CoInitializeEx | 0x0 | 0x474304 | 0x9df0c | 0x9c50c | 0x5e |
CoGetObject | 0x0 | 0x474308 | 0x9df10 | 0x9c510 | 0x51 |
CoInitialize | 0x0 | 0x47430c | 0x9df14 | 0x9c514 | 0x5d |
CoUninitialize | 0x0 | 0x474310 | 0x9df18 | 0x9c518 | 0x8d |
CoCreateInstance | 0x0 | 0x474314 | 0x9df1c | 0x9c51c | 0x28 |
CoInitializeSecurity | 0x0 | 0x474318 | 0x9df20 | 0x9c520 | 0x5f |
OLEAUT32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysAllocStringByteLen | 0x96 | 0x4742b8 | 0x9dec0 | 0x9c4c0 | - |
VariantClear | 0x9 | 0x4742bc | 0x9dec4 | 0x9c4c4 | - |
SysAllocString | 0x2 | 0x4742c0 | 0x9dec8 | 0x9c4c8 | - |
SysStringByteLen | 0x95 | 0x4742c4 | 0x9decc | 0x9c4cc | - |
VariantInit | 0x8 | 0x4742c8 | 0x9ded0 | 0x9c4d0 | - |
SysFreeString | 0x6 | 0x4742cc | 0x9ded4 | 0x9c4d4 | - |
CRYPT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptStringToBinaryA | 0x0 | 0x47405c | 0x9dc64 | 0x9c264 | 0xe3 |
MPR.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetGetConnectionW | 0x0 | 0x4742a4 | 0x9deac | 0x9c4ac | 0x2b |
NETAPI32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
NetApiBufferFree | 0x0 | 0x4742ac | 0x9deb4 | 0x9c4b4 | 0x51 |
NetShareEnum | 0x0 | 0x4742b0 | 0x9deb8 | 0x9c4b8 | 0xde |
IPHLPAPI.DLL (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IcmpSendEcho | 0x0 | 0x474064 | 0x9dc6c | 0x9c26c | 0x99 |
IcmpCloseHandle | 0x0 | 0x474068 | 0x9dc70 | 0x9c270 | 0x96 |
GetAdaptersInfo | 0x0 | 0x47406c | 0x9dc74 | 0x9c274 | 0x44 |
IcmpCreateFile | 0x0 | 0x474070 | 0x9dc78 | 0x9c278 | 0x97 |
WS2_32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
inet_addr | 0xb | 0x4742f4 | 0x9defc | 0x9c4fc | - |
RstrtMgr.DLL (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RmShutdown | 0x0 | 0x4742d4 | 0x9dedc | 0x9c4dc | 0xa |
RmRegisterResources | 0x0 | 0x4742d8 | 0x9dee0 | 0x9c4e0 | 0x6 |
RmStartSession | 0x0 | 0x4742dc | 0x9dee4 | 0x9c4e4 | 0xb |
RmGetList | 0x0 | 0x4742e0 | 0x9dee8 | 0x9c4e8 | 0x4 |
RmEndSession | 0x0 | 0x4742e4 | 0x9deec | 0x9c4ec | 0x2 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
va-1.8.exe | 2 | 0x00090000 | 0x0013AFFF | Relevant Image |
![]() |
32-bit | 0x000FE4F1 |
![]() |
![]() |
...
|
va-1.8.exe | 2 | 0x00090000 | 0x0013AFFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Generic.Ransom.MedusaLocker.87AF3DD7 |
Malicious
|
C:\Boot\BOOTSTAT.DAT.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\OneNoteMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\ProjectMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\GrooveMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\DW20.EXE.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\Microsoft.VC90.CRT.manifest | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUISet.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\ShellUI.MST.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\AccessMUI.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\branding.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\AccessMUISet.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\PrjProrWW.xml.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\pkeyconfig-office.xrm-ms.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\VisiorWW.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\Winre.wim.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\Administrator.contact.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\asdlfk poopvy.contact.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\chucu jadnvk.contact.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\lulcit amkdfe.contact | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\0eq4J7bKgXwC-.mp4.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\0QQfjstKfS.pps.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\1dGvxEoi3gm0T.avi.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\1-R4MP2C4Qbs54.flv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\bQEKbQfEE.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\3T0rH4i0l5QQpYh.flv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\DOj2q2eoapVkDICDKF.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\Hta3pa28.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\j7gr.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\TYJvpp8N_sf.jpg | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\5MhWMyuYeLyf1OE.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\bO6qEEjs1wiVC-i.m4a.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\H79lw\80haq7i.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\H79lw\F_f4rPkCl.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\H79lw\NjH2zCvYOXtJz7.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Hr4sDXJtn6WwD.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\J3Nc SGi7Ix-bCc.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jasoy4U.swf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KF7giSobhHyUgYTtS.png.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Kltw91fRDuS3Wb7aI2s7.mp3.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\lKJHbX_KPoL3z-n.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\nagQ.pps.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NpPNmqhQ7821lpO.docx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Q0FdRAhE.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\t53gs1hiTaXv52EH.mp3.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\tBKr0.mp4.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\X9BTADwDIzB2uwdwBFhD.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\XU 4jTBlsQNL76e.mp4.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\yurqzK7drLPM7.m4a.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zLAUPacevLeeeU_O.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zXsCJxy6.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\2LiupJvdbti.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\P23U.pdf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\Q7c4oMyc429OroOAX.ods | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\WPdL.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\CRw7MqUMAxdnYPslX_R.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\dWlpm.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\fLFPzC180Y.odt.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\LhosEI9F5SFrie.xlsx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\lrC 4tDSD4ceB06u60.pptx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\MNqeHyOAhEWRYiaQz_.pdf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\My Shapes\Favorites.vss.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\qEt1wi.xls.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\qnLFDID-KlHDn4Z.pptx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\t4YVY yfDSOQ_pqfU.docx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\T9gshfLFkyfs.xlsx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\TAdh5BX-WkuPD9.pptx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Y9zAFTO-dNzvRVWGMUK\CRottuTys.odt.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Y9zAFTO-dNzvRVWGMUK\tiXfJKSs-S5Tiq0y.pdf.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\YGCd1S45Lw.xlsx.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\Microsoft At Work.url.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN.url.ReadInstructions | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Recovery_Instructions.html | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\VisioMUI.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\pss10r.chm.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\setup.chm | Modified File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\ProPlusrWW.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\Office32WW.xml.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\Setup.xml.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\boot.sdi.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\sikvnb huvuib.contact | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\-1okxtK2AJxK.avi.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\60BZbE8XuNOo.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\ffLad6zn6yMjATGS.xls | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2kOePIUk91ashW\iFEL_z\JH_iUb0NOl.avi.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\7FezEQ.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\gkAaBDnf7QM7mOHG5bD3.flv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\H79lw\eISj5nvAzrReID.mp4.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\H79lw\qtMMBf.gif | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\msuHG62OSkt1uD.avi.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\oePr4ttvEubz1XfRI.odp.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pFXMqEWF DJBSxrMwMwS.swf.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Puwrt.mp3.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\RSu4kMBBtJpnCCTeO.csv.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\S5a0JmL.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\tngj2Z5jiGI.png | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\ktoCr.ots | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\PWD oMs5aZrBZQr-.odt.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Btb2pBA9FI9D5J\x3QnZuBoW4hy.pdf.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\F--a13OJJ2wMulYTfy.doc.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\fFDr7WrIUk2o1.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\FhiVbqcj.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\hGMrE0n8cW.csv.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\IOGviqRTOf.rtf.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\olchP0XravFS0.ppt.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\ppGMy.xls.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\SBdasca95c9zW.xlsx.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Uju9W8n91s.docx.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\XqxbGFCg4US5E_.pptx.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Y-xx_K69pu.xlsx.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Y9zAFTO-dNzvRVWGMUK\aQDE8guAka.odp.ReadInstructions | Dropped File | Stream |
Not Queried
|
...
|
»