VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Ransomware, Keylogger, Dropper, Trojan, Virus |
Stubctborgfinrrrrrrrrrrrrrrr.exe
Windows Exe (x86-32)
Created at 2020-01-06T07:12:00
Remarks
(0x200001b): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Stubctborgfinrrrrrrrrrrrrrrr.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2020-01-03 04:56 (UTC+1) |
Last Seen | 2020-01-05 08:58 (UTC+1) |
Names | ByteCode-MSIL.Trojan.Filecoder |
Families | Filecoder |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4ac3fe |
Size Of Code | 0xaa600 |
Size Of Initialized Data | 0x4800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-10-28 03:49:33+00:00 |
Version Information (9)
»
Assembly Version | 2.0.0.1 |
CompanyName | Host Process for Windows Services |
FileDescription | Host Process for Windows Services |
FileVersion | 2.0.0.1 |
InternalName | Stubctborgfinrrrrrrrrrrrrrrr.exe |
LegalCopyright | |
OriginalFilename | Stubctborgfinrrrrrrrrrrrrrrr.exe |
ProductName | Host Process for Windows Services |
ProductVersion | 2.0.0.1 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0xaa404 | 0xaa600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.81 |
.sdata | 0x4ae000 | 0x1e8 | 0x200 | 0xaaa00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.58 |
.rsrc | 0x4b0000 | 0x4208 | 0x4400 | 0xaac00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.51 |
.reloc | 0x4b6000 | 0xc | 0x200 | 0xaf000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0xac3d8 | 0xaa7d8 | 0x0 |
Memory Dumps (30)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
stubctborgfinrrrrrrrrrrrrrrr.exe | 1 | 0x01270000 | 0x01327FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | First Execution | - | 32-bit | 0x00BBBF9A |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | Content Changed | - | 32-bit | 0x00BBC012 |
![]() |
![]() |
...
|
buffer | 1 | 0x00811000 | 0x00811FFF | First Execution | - | 32-bit | 0x00811D00 |
![]() |
![]() |
...
|
buffer | 1 | 0x009C2000 | 0x009C2FFF | First Execution | - | 32-bit | 0x009C2000 |
![]() |
![]() |
...
|
buffer | 1 | 0x00812000 | 0x00812FFF | First Execution | - | 32-bit | 0x00812100 |
![]() |
![]() |
...
|
buffer | 1 | 0x009C2000 | 0x009C2FFF | Content Changed | - | 32-bit | 0x009C2354 |
![]() |
![]() |
...
|
buffer | 1 | 0x00A50000 | 0x00A5FFFF | Content Changed | - | 32-bit | 0x00A5070C |
![]() |
![]() |
...
|
buffer | 1 | 0x00811000 | 0x00811FFF | Content Changed | - | 32-bit | 0x00811F33 |
![]() |
![]() |
...
|
buffer | 1 | 0x00813000 | 0x00813FFF | First Execution | - | 32-bit | 0x008131A3 |
![]() |
![]() |
...
|
stubctborgfinrrrrrrrrrrrrrrr.exe | 1 | 0x01270000 | 0x01327FFF | Final Dump | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00814000 | 0x00814FFF | First Execution | - | 32-bit | 0x0081406F |
![]() |
![]() |
...
|
buffer | 1 | 0x00815000 | 0x00815FFF | First Execution | - | 32-bit | 0x00815080 |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | Content Changed | - | 32-bit | 0x00BBCC5F |
![]() |
![]() |
...
|
buffer | 1 | 0x00813000 | 0x00813FFF | Content Changed | - | 32-bit | 0x008139B0 |
![]() |
![]() |
...
|
buffer | 1 | 0x00815000 | 0x00815FFF | Content Changed | - | 32-bit | 0x00815D4D |
![]() |
![]() |
...
|
buffer | 1 | 0x00812000 | 0x00812FFF | Content Changed | - | 32-bit | 0x00812238 |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | Content Changed | - | 32-bit | 0x00BBC432 |
![]() |
![]() |
...
|
buffer | 1 | 0x009C2000 | 0x009C2FFF | Content Changed | - | 32-bit | 0x009C2C30 |
![]() |
![]() |
...
|
buffer | 1 | 0x00814000 | 0x00814FFF | Content Changed | - | 32-bit | 0x008146EA |
![]() |
![]() |
...
|
buffer | 1 | 0x00816000 | 0x00816FFF | First Execution | - | 32-bit | 0x00816224 |
![]() |
![]() |
...
|
buffer | 1 | 0x009C3000 | 0x009C3FFF | First Execution | - | 32-bit | 0x009C3000 |
![]() |
![]() |
...
|
buffer | 1 | 0x00817000 | 0x00817FFF | First Execution | - | 32-bit | 0x00817000 |
![]() |
![]() |
...
|
buffer | 1 | 0x00818000 | 0x00818FFF | First Execution | - | 32-bit | 0x00818018 |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | Content Changed | - | 32-bit | 0x00BBBF9A |
![]() |
![]() |
...
|
buffer | 1 | 0x009C3000 | 0x009C3FFF | Content Changed | - | 32-bit | 0x009C3A16 |
![]() |
![]() |
...
|
buffer | 1 | 0x00BB6000 | 0x00BBCFFF | Content Changed | - | 32-bit | 0x00BBBF9A |
![]() |
![]() |
...
|
buffer | 1 | 0x00818000 | 0x00818FFF | Content Changed | - | 32-bit | 0x008186D8 |
![]() |
![]() |
...
|
buffer | 1 | 0x009C3000 | 0x009C3FFF | Content Changed | - | 32-bit | 0x009C3864 |
![]() |
![]() |
...
|
buffer | 1 | 0x00818000 | 0x00818FFF | Content Changed | - | 32-bit | 0x008186D8 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Heur.Ransom.HiddenTears.1 |
Malicious
|
C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-09-24 20:53 (UTC+2) |
Last Seen | 2019-06-09 21:53 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.93 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-07-23 14:33 (UTC+2) |
Last Seen | 2019-05-30 00:00 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{91140~2\ose.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-07-03 16:05 (UTC+2) |
Last Seen | 2019-09-19 01:00 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\MSOCache\ALLUSE~1\{91140~3\setup.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-07-03 16:04 (UTC+2) |
Last Seen | 2019-12-28 22:37 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.16 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-08-26 15:34 (UTC+2) |
Last Seen | 2019-03-07 21:24 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-02-24 22:24 (UTC+1) |
Last Seen | 2019-10-02 17:23 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.34 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-08-26 15:34 (UTC+2) |
Last Seen | 2018-07-20 00:50 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.24 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-08-26 03:42 (UTC+2) |
Last Seen | 2019-10-17 22:52 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROTE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-08-26 15:34 (UTC+2) |
Last Seen | 2019-04-18 21:15 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2016-05-02 13:28 (UTC+2) |
Last Seen | 2018-01-18 04:03 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\Reader\WOW_HE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-05-05 17:19 (UTC+2) |
Last Seen | 2019-10-25 13:46 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-12-25 08:22 (UTC+1) |
Last Seen | 2018-09-07 13:18 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2016-08-18 18:00 (UTC+2) |
Last Seen | 2018-02-02 07:07 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ACROBA~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\READER~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2015-01-02 04:14 (UTC+1) |
Last Seen | 2019-04-28 21:16 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.99 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-02-06 15:28 (UTC+1) |
Last Seen | 2019-04-28 21:12 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-02-06 15:28 (UTC+1) |
Last Seen | 2019-04-28 21:25 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-04-06 20:40 (UTC+2) |
Last Seen | 2019-04-18 21:19 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.5 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaucheck.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-01-08 02:27 (UTC+1) |
Last Seen | 2017-07-19 07:27 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.03 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-05-27 20:42 (UTC+2) |
Last Seen | 2019-06-01 01:11 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.08 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-05-27 20:24 (UTC+2) |
Last Seen | 2019-03-07 21:13 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Google\Chrome\APPLIC~1\580302~1.110\INSTAL~1\setup.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2017-05-11 21:04 (UTC+2) |
Last Seen | 2018-07-01 13:25 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 2.85 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2017-05-14 08:38 (UTC+2) |
Last Seen | 2018-07-01 22:16 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.1 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\JABSWI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-12-02 09:41 (UTC+1) |
Last Seen | 2019-04-28 21:13 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\java.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-01-11 05:11 (UTC+1) |
Last Seen | 2017-07-20 06:57 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javaw.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-29 06:15 (UTC+1) |
Last Seen | 2017-08-07 06:48 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javacpl.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-01-06 17:34 (UTC+1) |
Last Seen | 2017-11-09 14:26 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\JP2LAU~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-03-03 20:38 (UTC+1) |
Last Seen | 2019-03-12 21:22 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\jqs.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-12-02 09:41 (UTC+1) |
Last Seen | 2017-08-07 06:18 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\javaws.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-29 06:15 (UTC+1) |
Last Seen | 2019-03-07 21:17 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.0 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\ssvagent.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-12-02 09:41 (UTC+1) |
Last Seen | 2017-07-18 07:40 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\Java\jre7\bin\UNPACK~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-29 06:15 (UTC+1) |
Last Seen | 2017-08-07 08:45 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MICROS~4\DESKTO~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MICROS~4\DESKTO~2.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2012-11-28 09:12 (UTC+1) |
Last Seen | 2018-12-08 18:31 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2016-03-11 13:59 (UTC+1) |
Last Seen | 2019-06-04 20:39 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\CRASHR~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-17 19:14 (UTC+2) |
Last Seen | 2019-08-01 07:50 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.31 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\MAINTE~2.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-17 19:15 (UTC+2) |
Last Seen | 2019-08-07 11:39 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\UNINST~1\helper.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-17 19:15 (UTC+2) |
Last Seen | 2019-11-21 18:21 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\WEBAPP~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-14 00:26 (UTC+1) |
Last Seen | 2019-06-02 10:35 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 2.64 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\WEBAPP~2.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-14 00:24 (UTC+1) |
Last Seen | 2019-06-02 10:31 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\updater.exe | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-17 19:15 (UTC+2) |
Last Seen | 2019-08-05 13:34 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.41 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2013-11-14 00:23 (UTC+1) |
Last Seen | 2019-06-05 10:53 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~2\MOZILL~2\UNINST~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-17 19:15 (UTC+2) |
Last Seen | 2019-07-28 02:12 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.81 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-03-25 01:04 (UTC+1) |
Last Seen | 2019-06-04 23:26 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{3C3AA~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2016-03-22 13:11 (UTC+1) |
Last Seen | 2018-05-27 00:53 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-06-01 22:26 (UTC+2) |
Last Seen | 2019-06-04 20:36 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{E6E75~1\VCREDI~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2018-05-23 12:36 (UTC+2) |
Last Seen | 2019-03-26 04:26 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{E52A6~1\VC_RED~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2017-10-21 04:41 (UTC+2) |
Last Seen | 2018-09-16 18:08 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\PROGRA~3\PACKAG~1\{F325F~1\VC_RED~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2017-10-21 04:41 (UTC+2) |
Last Seen | 2018-09-09 03:22 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 3.96 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Apps\2.0\DQQ19BCJ.JAX\YVORLGOR.PNT\CLICEX~1.000\GOOGLE~1.EXE | Modified File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2017-04-28 19:49 (UTC+2) |
Last Seen | 2018-05-18 18:47 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 4.26 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Tempexplorer.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-11-01 00:12 (UTC+1) |
Last Seen | 2020-01-06 08:13 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Memory Dumps (4)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tempexplorer.exe | 4 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 11 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 12 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorer.exe | 4 | 0x00400000 | 0x0041AFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Tempspwak.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-01-29 22:02 (UTC+1) |
Last Seen | 2020-01-06 08:13 (UTC+1) |
Names | Win32.Trojan.Fakeransom |
Families | Fakeransom |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4134e0 |
Size Of Code | 0x8000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0xc000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2016-01-26 12:22:25+00:00 |
Packer | UPX 2.93 - 3.00 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0xc000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x40d000 | 0x8000 | 0x7200 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.92 |
.rsrc | 0x415000 | 0x1000 | 0x600 | 0x7400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.85 |
Imports (9)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x415470 | 0x15470 | 0x7870 | 0x0 |
GetProcAddress | 0x0 | 0x415474 | 0x15474 | 0x7874 | 0x0 |
VirtualProtect | 0x0 | 0x415478 | 0x15478 | 0x7878 | 0x0 |
VirtualAlloc | 0x0 | 0x41547c | 0x1547c | 0x787c | 0x0 |
VirtualFree | 0x0 | 0x415480 | 0x15480 | 0x7880 | 0x0 |
ExitProcess | 0x0 | 0x415484 | 0x15484 | 0x7884 | 0x0 |
COMCTL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InitCommonControlsEx | 0x0 | 0x41548c | 0x1548c | 0x788c | 0x0 |
GDI32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
BitBlt | 0x0 | 0x415494 | 0x15494 | 0x7894 | 0x0 |
MSVCRT.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
fabs | 0x0 | 0x41549c | 0x1549c | 0x789c | 0x0 |
OLE32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | 0x0 | 0x4154a4 | 0x154a4 | 0x78a4 | 0x0 |
SHELL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteExA | 0x0 | 0x4154ac | 0x154ac | 0x78ac | 0x0 |
SHLWAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PathQuoteSpacesA | 0x0 | 0x4154b4 | 0x154b4 | 0x78b4 | 0x0 |
USER32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetDC | 0x0 | 0x4154bc | 0x154bc | 0x78bc | 0x0 |
WINMM.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeBeginPeriod | 0x0 | 0x4154c4 | 0x154c4 | 0x78c4 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tempspwak.exe | 5 | 0x00400000 | 0x00415FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
tempspwak.exe | 5 | 0x00400000 | 0x00415FFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.30748527 |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Temp\3582-490\Tempexplorer.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-11-01 00:10 (UTC+1) |
Last Seen | 2019-11-17 18:33 (UTC+1) |
Names | Win32.Virus.Ramnit |
Families | Ramnit |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x412000 |
Size Of Code | 0xbe00 |
Size Of Initialized Data | 0x2800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2016-01-26 12:22:25+00:00 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.code | 0x401000 | 0x20fb | 0x2200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.38 |
.text | 0x404000 | 0x9bfe | 0x9c00 | 0x2600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.6 |
.rdata | 0x40e000 | 0x97e | 0xa00 | 0xc200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.61 |
.data | 0x40f000 | 0x1734 | 0x1400 | 0xcc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.75 |
.rsrc | 0x411000 | 0x9b4 | 0xa00 | 0xe000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.2 |
.rmnet | 0x412000 | 0x1d000 | 0x1c400 | 0xea00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.99 |
Imports (9)
»
MSVCRT.dll (19)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
memset | 0x0 | 0x40f5e8 | 0xf374 | 0xcf74 | 0x299 |
strncmp | 0x0 | 0x40f5ec | 0xf378 | 0xcf78 | 0x2c0 |
memmove | 0x0 | 0x40f5f0 | 0xf37c | 0xcf7c | 0x298 |
strncpy | 0x0 | 0x40f5f4 | 0xf380 | 0xcf80 | 0x2c1 |
strstr | 0x0 | 0x40f5f8 | 0xf384 | 0xcf84 | 0x2c5 |
_strnicmp | 0x0 | 0x40f5fc | 0xf388 | 0xcf88 | 0x1c5 |
_stricmp | 0x0 | 0x40f600 | 0xf38c | 0xcf8c | 0x1c1 |
strlen | 0x0 | 0x40f604 | 0xf390 | 0xcf90 | 0x2be |
strcmp | 0x0 | 0x40f608 | 0xf394 | 0xcf94 | 0x2b8 |
sprintf | 0x0 | 0x40f60c | 0xf398 | 0xcf98 | 0x2b2 |
fabs | 0x0 | 0x40f610 | 0xf39c | 0xcf9c | 0x24b |
ceil | 0x0 | 0x40f614 | 0xf3a0 | 0xcfa0 | 0x241 |
malloc | 0x0 | 0x40f618 | 0xf3a4 | 0xcfa4 | 0x291 |
floor | 0x0 | 0x40f61c | 0xf3a8 | 0xcfa8 | 0x255 |
free | 0x0 | 0x40f620 | 0xf3ac | 0xcfac | 0x25e |
fclose | 0x0 | 0x40f624 | 0xf3b0 | 0xcfb0 | 0x24c |
memcpy | 0x0 | 0x40f628 | 0xf3b4 | 0xcfb4 | 0x297 |
strcpy | 0x0 | 0x40f62c | 0xf3b8 | 0xcfb8 | 0x2ba |
tolower | 0x0 | 0x40f630 | 0xf3bc | 0xcfbc | 0x2d3 |
KERNEL32.dll (45)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleA | 0x0 | 0x40f638 | 0xf3c4 | 0xcfc4 | 0x1f7 |
HeapCreate | 0x0 | 0x40f63c | 0xf3c8 | 0xcfc8 | 0x2a4 |
RemoveDirectoryA | 0x0 | 0x40f640 | 0xf3cc | 0xcfcc | 0x383 |
GetShortPathNameA | 0x0 | 0x40f644 | 0xf3d0 | 0xcfd0 | 0x23a |
HeapDestroy | 0x0 | 0x40f648 | 0xf3d4 | 0xcfd4 | 0x2a5 |
ExitProcess | 0x0 | 0x40f64c | 0xf3d8 | 0xcfd8 | 0x105 |
GetExitCodeProcess | 0x0 | 0x40f650 | 0xf3dc | 0xcfdc | 0x1c6 |
GetTempFileNameA | 0x0 | 0x40f654 | 0xf3e0 | 0xcfe0 | 0x25c |
FindResourceA | 0x0 | 0x40f658 | 0xf3e4 | 0xcfe4 | 0x137 |
LoadResource | 0x0 | 0x40f65c | 0xf3e8 | 0xcfe8 | 0x2fb |
SizeofResource | 0x0 | 0x40f660 | 0xf3ec | 0xcfec | 0x42a |
HeapAlloc | 0x0 | 0x40f664 | 0xf3f0 | 0xcff0 | 0x2a2 |
HeapFree | 0x0 | 0x40f668 | 0xf3f4 | 0xcff4 | 0x2a6 |
Sleep | 0x0 | 0x40f66c | 0xf3f8 | 0xcff8 | 0x42b |
LoadLibraryA | 0x0 | 0x40f670 | 0xf3fc | 0xcffc | 0x2f6 |
GetProcAddress | 0x0 | 0x40f674 | 0xf400 | 0xd000 | 0x222 |
FreeLibrary | 0x0 | 0x40f678 | 0xf404 | 0xd004 | 0x14d |
GetCurrentThreadId | 0x0 | 0x40f67c | 0xf408 | 0xd008 | 0x1ae |
GetCurrentProcessId | 0x0 | 0x40f680 | 0xf40c | 0xd00c | 0x1ab |
CloseHandle | 0x0 | 0x40f684 | 0xf410 | 0xd010 | 0x44 |
InitializeCriticalSection | 0x0 | 0x40f688 | 0xf414 | 0xd014 | 0x2b9 |
GetCommandLineA | 0x0 | 0x40f68c | 0xf418 | 0xd018 | 0x170 |
GetModuleFileNameA | 0x0 | 0x40f690 | 0xf41c | 0xd01c | 0x1f5 |
GetEnvironmentVariableA | 0x0 | 0x40f694 | 0xf420 | 0xd020 | 0x1c3 |
SetEnvironmentVariableA | 0x0 | 0x40f698 | 0xf424 | 0xd024 | 0x3d8 |
GetCurrentProcess | 0x0 | 0x40f69c | 0xf428 | 0xd028 | 0x1aa |
TerminateProcess | 0x0 | 0x40f6a0 | 0xf42c | 0xd02c | 0x437 |
SetUnhandledExceptionFilter | 0x0 | 0x40f6a4 | 0xf430 | 0xd030 | 0x41f |
EnterCriticalSection | 0x0 | 0x40f6a8 | 0xf434 | 0xd034 | 0xda |
LeaveCriticalSection | 0x0 | 0x40f6ac | 0xf438 | 0xd038 | 0x2f4 |
GetVersionExA | 0x0 | 0x40f6b0 | 0xf43c | 0xd03c | 0x27a |
HeapReAlloc | 0x0 | 0x40f6b4 | 0xf440 | 0xd040 | 0x2a9 |
SetLastError | 0x0 | 0x40f6b8 | 0xf444 | 0xd044 | 0x3f4 |
TlsAlloc | 0x0 | 0x40f6bc | 0xf448 | 0xd048 | 0x43c |
GetCurrentDirectoryA | 0x0 | 0x40f6c0 | 0xf44c | 0xd04c | 0x1a8 |
SetCurrentDirectoryA | 0x0 | 0x40f6c4 | 0xf450 | 0xd050 | 0x3ce |
SetFileAttributesA | 0x0 | 0x40f6c8 | 0xf454 | 0xd054 | 0x3df |
DeleteFileA | 0x0 | 0x40f6cc | 0xf458 | 0xd058 | 0xc1 |
GetTempPathA | 0x0 | 0x40f6d0 | 0xf45c | 0xd05c | 0x25e |
CreateDirectoryA | 0x0 | 0x40f6d4 | 0xf460 | 0xd060 | 0x6d |
WriteFile | 0x0 | 0x40f6d8 | 0xf464 | 0xd064 | 0x497 |
CreateFileA | 0x0 | 0x40f6dc | 0xf468 | 0xd068 | 0x79 |
SetFilePointer | 0x0 | 0x40f6e0 | 0xf46c | 0xd06c | 0x3e7 |
ReadFile | 0x0 | 0x40f6e4 | 0xf470 | 0xd070 | 0x36e |
DeleteCriticalSection | 0x0 | 0x40f6e8 | 0xf474 | 0xd074 | 0xbf |
USER32.DLL (60)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CharLowerA | 0x0 | 0x40f6f0 | 0xf47c | 0xd07c | 0x0 |
MessageBoxA | 0x0 | 0x40f6f4 | 0xf480 | 0xd080 | 0x0 |
SendMessageA | 0x0 | 0x40f6f8 | 0xf484 | 0xd084 | 0x0 |
PostMessageA | 0x0 | 0x40f6fc | 0xf488 | 0xd088 | 0x0 |
GetWindowThreadProcessId | 0x0 | 0x40f700 | 0xf48c | 0xd08c | 0x0 |
IsWindowVisible | 0x0 | 0x40f704 | 0xf490 | 0xd090 | 0x0 |
GetWindowLongA | 0x0 | 0x40f708 | 0xf494 | 0xd094 | 0x0 |
GetForegroundWindow | 0x0 | 0x40f70c | 0xf498 | 0xd098 | 0x0 |
IsWindowEnabled | 0x0 | 0x40f710 | 0xf49c | 0xd09c | 0x0 |
EnableWindow | 0x0 | 0x40f714 | 0xf4a0 | 0xd0a0 | 0x0 |
EnumWindows | 0x0 | 0x40f718 | 0xf4a4 | 0xd0a4 | 0x0 |
SetWindowPos | 0x0 | 0x40f71c | 0xf4a8 | 0xd0a8 | 0x0 |
DestroyWindow | 0x0 | 0x40f720 | 0xf4ac | 0xd0ac | 0x0 |
GetDC | 0x0 | 0x40f724 | 0xf4b0 | 0xd0b0 | 0x0 |
GetWindowTextLengthA | 0x0 | 0x40f728 | 0xf4b4 | 0xd0b4 | 0x0 |
GetWindowTextA | 0x0 | 0x40f72c | 0xf4b8 | 0xd0b8 | 0x0 |
SetRect | 0x0 | 0x40f730 | 0xf4bc | 0xd0bc | 0x0 |
DrawTextA | 0x0 | 0x40f734 | 0xf4c0 | 0xd0c0 | 0x0 |
GetSystemMetrics | 0x0 | 0x40f738 | 0xf4c4 | 0xd0c4 | 0x0 |
ReleaseDC | 0x0 | 0x40f73c | 0xf4c8 | 0xd0c8 | 0x0 |
GetSysColor | 0x0 | 0x40f740 | 0xf4cc | 0xd0cc | 0x0 |
GetSysColorBrush | 0x0 | 0x40f744 | 0xf4d0 | 0xd0d0 | 0x0 |
CreateWindowExA | 0x0 | 0x40f748 | 0xf4d4 | 0xd0d4 | 0x0 |
CallWindowProcA | 0x0 | 0x40f74c | 0xf4d8 | 0xd0d8 | 0x0 |
SetWindowLongA | 0x0 | 0x40f750 | 0xf4dc | 0xd0dc | 0x0 |
SetFocus | 0x0 | 0x40f754 | 0xf4e0 | 0xd0e0 | 0x0 |
RedrawWindow | 0x0 | 0x40f758 | 0xf4e4 | 0xd0e4 | 0x0 |
RemovePropA | 0x0 | 0x40f75c | 0xf4e8 | 0xd0e8 | 0x0 |
DefWindowProcA | 0x0 | 0x40f760 | 0xf4ec | 0xd0ec | 0x0 |
SetPropA | 0x0 | 0x40f764 | 0xf4f0 | 0xd0f0 | 0x0 |
GetParent | 0x0 | 0x40f768 | 0xf4f4 | 0xd0f4 | 0x0 |
GetPropA | 0x0 | 0x40f76c | 0xf4f8 | 0xd0f8 | 0x0 |
GetWindow | 0x0 | 0x40f770 | 0xf4fc | 0xd0fc | 0x0 |
SetActiveWindow | 0x0 | 0x40f774 | 0xf500 | 0xd100 | 0x0 |
UnregisterClassA | 0x0 | 0x40f778 | 0xf504 | 0xd104 | 0x0 |
DestroyAcceleratorTable | 0x0 | 0x40f77c | 0xf508 | 0xd108 | 0x0 |
LoadIconA | 0x0 | 0x40f780 | 0xf50c | 0xd10c | 0x0 |
LoadCursorA | 0x0 | 0x40f784 | 0xf510 | 0xd110 | 0x0 |
RegisterClassA | 0x0 | 0x40f788 | 0xf514 | 0xd114 | 0x0 |
AdjustWindowRectEx | 0x0 | 0x40f78c | 0xf518 | 0xd118 | 0x0 |
ShowWindow | 0x0 | 0x40f790 | 0xf51c | 0xd11c | 0x0 |
CreateAcceleratorTableA | 0x0 | 0x40f794 | 0xf520 | 0xd120 | 0x0 |
PeekMessageA | 0x0 | 0x40f798 | 0xf524 | 0xd124 | 0x0 |
MsgWaitForMultipleObjects | 0x0 | 0x40f79c | 0xf528 | 0xd128 | 0x0 |
GetMessageA | 0x0 | 0x40f7a0 | 0xf52c | 0xd12c | 0x0 |
GetActiveWindow | 0x0 | 0x40f7a4 | 0xf530 | 0xd130 | 0x0 |
TranslateAcceleratorA | 0x0 | 0x40f7a8 | 0xf534 | 0xd134 | 0x0 |
TranslateMessage | 0x0 | 0x40f7ac | 0xf538 | 0xd138 | 0x0 |
DispatchMessageA | 0x0 | 0x40f7b0 | 0xf53c | 0xd13c | 0x0 |
GetFocus | 0x0 | 0x40f7b4 | 0xf540 | 0xd140 | 0x0 |
GetClientRect | 0x0 | 0x40f7b8 | 0xf544 | 0xd144 | 0x0 |
FillRect | 0x0 | 0x40f7bc | 0xf548 | 0xd148 | 0x0 |
EnumChildWindows | 0x0 | 0x40f7c0 | 0xf54c | 0xd14c | 0x0 |
DefFrameProcA | 0x0 | 0x40f7c4 | 0xf550 | 0xd150 | 0x0 |
GetWindowRect | 0x0 | 0x40f7c8 | 0xf554 | 0xd154 | 0x0 |
IsChild | 0x0 | 0x40f7cc | 0xf558 | 0xd158 | 0x0 |
GetClassNameA | 0x0 | 0x40f7d0 | 0xf55c | 0xd15c | 0x0 |
GetKeyState | 0x0 | 0x40f7d4 | 0xf560 | 0xd160 | 0x0 |
DestroyIcon | 0x0 | 0x40f7d8 | 0xf564 | 0xd164 | 0x0 |
RegisterWindowMessageA | 0x0 | 0x40f7dc | 0xf568 | 0xd168 | 0x0 |
GDI32.DLL (16)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetStockObject | 0x0 | 0x40f7e4 | 0xf570 | 0xd170 | 0x0 |
SelectObject | 0x0 | 0x40f7e8 | 0xf574 | 0xd174 | 0x0 |
SetBkColor | 0x0 | 0x40f7ec | 0xf578 | 0xd178 | 0x0 |
SetTextColor | 0x0 | 0x40f7f0 | 0xf57c | 0xd17c | 0x0 |
GetTextExtentPoint32A | 0x0 | 0x40f7f4 | 0xf580 | 0xd180 | 0x0 |
CreateSolidBrush | 0x0 | 0x40f7f8 | 0xf584 | 0xd184 | 0x0 |
DeleteObject | 0x0 | 0x40f7fc | 0xf588 | 0xd188 | 0x0 |
GetObjectA | 0x0 | 0x40f800 | 0xf58c | 0xd18c | 0x0 |
CreateCompatibleDC | 0x0 | 0x40f804 | 0xf590 | 0xd190 | 0x0 |
GetDIBits | 0x0 | 0x40f808 | 0xf594 | 0xd194 | 0x0 |
DeleteDC | 0x0 | 0x40f80c | 0xf598 | 0xd198 | 0x0 |
GetObjectType | 0x0 | 0x40f810 | 0xf59c | 0xd19c | 0x0 |
CreateDIBSection | 0x0 | 0x40f814 | 0xf5a0 | 0xd1a0 | 0x0 |
BitBlt | 0x0 | 0x40f818 | 0xf5a4 | 0xd1a4 | 0x0 |
CreateBitmap | 0x0 | 0x40f81c | 0xf5a8 | 0xd1a8 | 0x0 |
SetPixel | 0x0 | 0x40f820 | 0xf5ac | 0xd1ac | 0x0 |
COMCTL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InitCommonControlsEx | 0x0 | 0x40f828 | 0xf5b4 | 0xd1b4 | 0x0 |
OLE32.DLL (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | 0x0 | 0x40f830 | 0xf5bc | 0xd1bc | 0x0 |
CoTaskMemFree | 0x0 | 0x40f834 | 0xf5c0 | 0xd1c0 | 0x0 |
RevokeDragDrop | 0x0 | 0x40f838 | 0xf5c4 | 0xd1c4 | 0x0 |
SHELL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteExA | 0x0 | 0x40f840 | 0xf5cc | 0xd1cc | 0x0 |
WINMM.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeBeginPeriod | 0x0 | 0x40f848 | 0xf5d4 | 0xd1d4 | 0x0 |
SHLWAPI.DLL (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PathQuoteSpacesA | 0x0 | 0x40f850 | 0xf5dc | 0xd1dc | 0x0 |
PathUnquoteSpacesA | 0x0 | 0x40f854 | 0xf5e0 | 0xd1e0 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tempexplorer.exe | 6 | 0x00400000 | 0x0042EFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorer.exe | 6 | 0x00400000 | 0x0042EFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Ramnit |
Malicious
|
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2011-07-17 12:57 (UTC+2) |
Last Seen | 2019-07-19 06:52 (UTC+2) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 1.3 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Memory Dumps (5)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tempexplorer.exe | 4 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 11 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 12 | 0x00400000 | 0x0041AFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 12 | 0x00400000 | 0x0041AFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
svchost.com | 11 | 0x00400000 | 0x0041AFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Temp\3582-490\TempexplorerSrv.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2014-08-28 00:58 (UTC+2) |
Last Seen | 2017-12-31 11:13 (UTC+1) |
Names | Win32.Virus.Ramnit |
Families | Ramnit |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x42e000 |
Size Of Code | 0xe000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x1e000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2008-02-12 11:02:20+00:00 |
Version Information (8)
»
CompanyName | SOFTWIN S |
FileDescription | BitDefen |
FileVersion | 106.42.73 |
InternalName | фжзрюкшэщ |
LegalCopyright | 2528-6 |
OriginalFilename | nedwp |
ProductName | люзанх |
ProductVersion | 106.4 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x1e000 | 0x0 | 0x400 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x41f000 | 0xe000 | 0xd200 | 0x400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.95 |
.rsrc | 0x42d000 | 0x1000 | 0x600 | 0xd600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.43 |
.rmnet | 0x42e000 | 0xf000 | 0xe200 | 0xdc00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.97 |
Imports (3)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x42d538 | 0x2d538 | 0xdb38 | 0x0 |
GetProcAddress | 0x0 | 0x42d53c | 0x2d53c | 0xdb3c | 0x0 |
VirtualProtect | 0x0 | 0x42d540 | 0x2d540 | 0xdb40 | 0x0 |
VirtualAlloc | 0x0 | 0x42d544 | 0x2d544 | 0xdb44 | 0x0 |
VirtualFree | 0x0 | 0x42d548 | 0x2d548 | 0xdb48 | 0x0 |
ExitProcess | 0x0 | 0x42d54c | 0x2d54c | 0xdb4c | 0x0 |
SHELL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DragFinish | 0x0 | 0x42d554 | 0x2d554 | 0xdb54 | 0x0 |
USER32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WinHelpW | 0x0 | 0x42d55c | 0x2d55c | 0xdb5c | 0x0 |
Memory Dumps (15)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tempexplorersrv.exe | 7 | 0x00400000 | 0x0043CFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 7 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 7 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrv.exe | 7 | 0x00400000 | 0x0043CFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrv.exe | 7 | 0x00400000 | 0x0043CFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 8 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
tempexplorersrv.exe | 7 | 0x00400000 | 0x0043CFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 8 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayer.exe | 9 | 0x00400000 | 0x0043CFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 9 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 9 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayer.exe | 9 | 0x00400000 | 0x0043CFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayer.exe | 9 | 0x00400000 | 0x0043CFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 10 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 10 | 0x002B0000 | 0x002B6FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Ramnit |
Malicious
|
C:\Users\5P5NRG~1\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2011-06-04 11:56 (UTC+2) |
Last Seen | 2019-10-29 09:19 (UTC+1) |
Names | Win32.Trojan.Ramnit |
Families | Ramnit |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x42c030 |
Size Of Code | 0xe000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x1e000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2008-02-12 11:02:20+00:00 |
Packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
Version Information (8)
»
CompanyName | SOFTWIN S |
FileDescription | BitDefen |
FileVersion | 106.42.73 |
InternalName | фжзрюкшэщ |
LegalCopyright | 2528-6 |
OriginalFilename | nedwp |
ProductName | люзанх |
ProductVersion | 106.4 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x1e000 | 0x0 | 0x400 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x41f000 | 0xe000 | 0xd200 | 0x400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.95 |
.rsrc | 0x42d000 | 0x1000 | 0x600 | 0xd600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.43 |
Imports (3)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x42d538 | 0x2d538 | 0xdb38 | 0x0 |
GetProcAddress | 0x0 | 0x42d53c | 0x2d53c | 0xdb3c | 0x0 |
VirtualProtect | 0x0 | 0x42d540 | 0x2d540 | 0xdb40 | 0x0 |
VirtualAlloc | 0x0 | 0x42d544 | 0x2d544 | 0xdb44 | 0x0 |
VirtualFree | 0x0 | 0x42d548 | 0x2d548 | 0xdb48 | 0x0 |
ExitProcess | 0x0 | 0x42d54c | 0x2d54c | 0xdb4c | 0x0 |
SHELL32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DragFinish | 0x0 | 0x42d554 | 0x2d554 | 0xdb54 | 0x0 |
USER32.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WinHelpW | 0x0 | 0x42d55c | 0x2d55c | 0xdb5c | 0x0 |
Memory Dumps (18)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
buffer | 7 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 7 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrvsrv.exe | 8 | 0x00400000 | 0x0042DFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 8 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 8 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrvsrv.exe | 8 | 0x00400000 | 0x0042DFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrvsrv.exe | 8 | 0x00400000 | 0x0042DFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 8 | 0x00230000 | 0x00230FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
ntdll.dll | 8 | 0x77130000 | 0x772AFFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 9 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 9 | 0x00230000 | 0x00236FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayersrv.exe | 10 | 0x00400000 | 0x0042DFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 9 | 0x00230000 | 0x00230FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 10 | 0x00220000 | 0x0022EFFF | First Execution | - | 32-bit | 0x00222CA9 |
![]() |
![]() |
...
|
buffer | 10 | 0x002B0000 | 0x002B6FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayersrv.exe | 10 | 0x00400000 | 0x0042DFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
desktoplayersrv.exe | 10 | 0x00400000 | 0x0042DFFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
tempexplorersrvsrv.exe | 8 | 0x00400000 | 0x0042DFFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.Zbot.IVF |
Malicious
|
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2020-01-06 05:39 (UTC+1) |
Last Seen | 2020-01-06 05:58 (UTC+1) |
Names | Win32.Virus.Neshta |
Families | Neshta |
Classification | Virus |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4080e4 |
Size Of Code | 0x7400 |
Size Of Initialized Data | 0x2a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1992-06-19 22:22:17+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
CODE | 0x401000 | 0x722c | 0x7400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
DATA | 0x409000 | 0x218 | 0x400 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.15 |
BSS | 0x40a000 | 0xa899 | 0x0 | 0x7c00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x415000 | 0x864 | 0xa00 | 0x7c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.17 |
.tls | 0x416000 | 0x8 | 0x0 | 0x8600 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x417000 | 0x18 | 0x200 | 0x8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x418000 | 0x5cc | 0x600 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.44 |
.rsrc | 0x419000 | 0x1400 | 0x1400 | 0x8e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 5.1 |
Imports (10)
»
kernel32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteCriticalSection | 0x0 | 0x4150dc | 0x150dc | 0x7cdc | 0x0 |
LeaveCriticalSection | 0x0 | 0x4150e0 | 0x150e0 | 0x7ce0 | 0x0 |
EnterCriticalSection | 0x0 | 0x4150e4 | 0x150e4 | 0x7ce4 | 0x0 |
InitializeCriticalSection | 0x0 | 0x4150e8 | 0x150e8 | 0x7ce8 | 0x0 |
VirtualFree | 0x0 | 0x4150ec | 0x150ec | 0x7cec | 0x0 |
VirtualAlloc | 0x0 | 0x4150f0 | 0x150f0 | 0x7cf0 | 0x0 |
LocalFree | 0x0 | 0x4150f4 | 0x150f4 | 0x7cf4 | 0x0 |
LocalAlloc | 0x0 | 0x4150f8 | 0x150f8 | 0x7cf8 | 0x0 |
GetVersion | 0x0 | 0x4150fc | 0x150fc | 0x7cfc | 0x0 |
GetCurrentThreadId | 0x0 | 0x415100 | 0x15100 | 0x7d00 | 0x0 |
GetThreadLocale | 0x0 | 0x415104 | 0x15104 | 0x7d04 | 0x0 |
GetStartupInfoA | 0x0 | 0x415108 | 0x15108 | 0x7d08 | 0x0 |
GetLocaleInfoA | 0x0 | 0x41510c | 0x1510c | 0x7d0c | 0x0 |
GetCommandLineA | 0x0 | 0x415110 | 0x15110 | 0x7d10 | 0x0 |
FreeLibrary | 0x0 | 0x415114 | 0x15114 | 0x7d14 | 0x0 |
ExitProcess | 0x0 | 0x415118 | 0x15118 | 0x7d18 | 0x0 |
WriteFile | 0x0 | 0x41511c | 0x1511c | 0x7d1c | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x415120 | 0x15120 | 0x7d20 | 0x0 |
RtlUnwind | 0x0 | 0x415124 | 0x15124 | 0x7d24 | 0x0 |
RaiseException | 0x0 | 0x415128 | 0x15128 | 0x7d28 | 0x0 |
GetStdHandle | 0x0 | 0x41512c | 0x1512c | 0x7d2c | 0x0 |
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardType | 0x0 | 0x415134 | 0x15134 | 0x7d34 | 0x0 |
MessageBoxA | 0x0 | 0x415138 | 0x15138 | 0x7d38 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExA | 0x0 | 0x415140 | 0x15140 | 0x7d40 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415144 | 0x15144 | 0x7d44 | 0x0 |
RegCloseKey | 0x0 | 0x415148 | 0x15148 | 0x7d48 | 0x0 |
oleaut32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x415150 | 0x15150 | 0x7d50 | 0x0 |
SysReAllocStringLen | 0x0 | 0x415154 | 0x15154 | 0x7d54 | 0x0 |
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsSetValue | 0x0 | 0x41515c | 0x1515c | 0x7d5c | 0x0 |
TlsGetValue | 0x0 | 0x415160 | 0x15160 | 0x7d60 | 0x0 |
LocalAlloc | 0x0 | 0x415164 | 0x15164 | 0x7d64 | 0x0 |
GetModuleHandleA | 0x0 | 0x415168 | 0x15168 | 0x7d68 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegSetValueExA | 0x0 | 0x415170 | 0x15170 | 0x7d70 | 0x0 |
RegOpenKeyExA | 0x0 | 0x415174 | 0x15174 | 0x7d74 | 0x0 |
RegCloseKey | 0x0 | 0x415178 | 0x15178 | 0x7d78 | 0x0 |
kernel32.dll (28)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x415180 | 0x15180 | 0x7d80 | 0x0 |
WinExec | 0x0 | 0x415184 | 0x15184 | 0x7d84 | 0x0 |
SetFilePointer | 0x0 | 0x415188 | 0x15188 | 0x7d88 | 0x0 |
SetFileAttributesA | 0x0 | 0x41518c | 0x1518c | 0x7d8c | 0x0 |
SetEndOfFile | 0x0 | 0x415190 | 0x15190 | 0x7d90 | 0x0 |
SetCurrentDirectoryA | 0x0 | 0x415194 | 0x15194 | 0x7d94 | 0x0 |
ReleaseMutex | 0x0 | 0x415198 | 0x15198 | 0x7d98 | 0x0 |
ReadFile | 0x0 | 0x41519c | 0x1519c | 0x7d9c | 0x0 |
GetWindowsDirectoryA | 0x0 | 0x4151a0 | 0x151a0 | 0x7da0 | 0x0 |
GetTempPathA | 0x0 | 0x4151a4 | 0x151a4 | 0x7da4 | 0x0 |
GetShortPathNameA | 0x0 | 0x4151a8 | 0x151a8 | 0x7da8 | 0x0 |
GetModuleFileNameA | 0x0 | 0x4151ac | 0x151ac | 0x7dac | 0x0 |
GetLogicalDriveStringsA | 0x0 | 0x4151b0 | 0x151b0 | 0x7db0 | 0x0 |
GetLocalTime | 0x0 | 0x4151b4 | 0x151b4 | 0x7db4 | 0x0 |
GetLastError | 0x0 | 0x4151b8 | 0x151b8 | 0x7db8 | 0x0 |
GetFileSize | 0x0 | 0x4151bc | 0x151bc | 0x7dbc | 0x0 |
GetFileAttributesA | 0x0 | 0x4151c0 | 0x151c0 | 0x7dc0 | 0x0 |
GetDriveTypeA | 0x0 | 0x4151c4 | 0x151c4 | 0x7dc4 | 0x0 |
GetCommandLineA | 0x0 | 0x4151c8 | 0x151c8 | 0x7dc8 | 0x0 |
FreeLibrary | 0x0 | 0x4151cc | 0x151cc | 0x7dcc | 0x0 |
FindNextFileA | 0x0 | 0x4151d0 | 0x151d0 | 0x7dd0 | 0x0 |
FindFirstFileA | 0x0 | 0x4151d4 | 0x151d4 | 0x7dd4 | 0x0 |
FindClose | 0x0 | 0x4151d8 | 0x151d8 | 0x7dd8 | 0x0 |
DeleteFileA | 0x0 | 0x4151dc | 0x151dc | 0x7ddc | 0x0 |
CreateMutexA | 0x0 | 0x4151e0 | 0x151e0 | 0x7de0 | 0x0 |
CreateFileA | 0x0 | 0x4151e4 | 0x151e4 | 0x7de4 | 0x0 |
CreateDirectoryA | 0x0 | 0x4151e8 | 0x151e8 | 0x7de8 | 0x0 |
CloseHandle | 0x0 | 0x4151ec | 0x151ec | 0x7dec | 0x0 |
gdi32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StretchDIBits | 0x0 | 0x4151f4 | 0x151f4 | 0x7df4 | 0x0 |
SetDIBits | 0x0 | 0x4151f8 | 0x151f8 | 0x7df8 | 0x0 |
SelectObject | 0x0 | 0x4151fc | 0x151fc | 0x7dfc | 0x0 |
GetObjectA | 0x0 | 0x415200 | 0x15200 | 0x7e00 | 0x0 |
GetDIBits | 0x0 | 0x415204 | 0x15204 | 0x7e04 | 0x0 |
DeleteObject | 0x0 | 0x415208 | 0x15208 | 0x7e08 | 0x0 |
DeleteDC | 0x0 | 0x41520c | 0x1520c | 0x7e0c | 0x0 |
CreateSolidBrush | 0x0 | 0x415210 | 0x15210 | 0x7e10 | 0x0 |
CreateDIBSection | 0x0 | 0x415214 | 0x15214 | 0x7e14 | 0x0 |
CreateCompatibleDC | 0x0 | 0x415218 | 0x15218 | 0x7e18 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x41521c | 0x1521c | 0x7e1c | 0x0 |
BitBlt | 0x0 | 0x415220 | 0x15220 | 0x7e20 | 0x0 |
user32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReleaseDC | 0x0 | 0x415228 | 0x15228 | 0x7e28 | 0x0 |
GetSysColor | 0x0 | 0x41522c | 0x1522c | 0x7e2c | 0x0 |
GetIconInfo | 0x0 | 0x415230 | 0x15230 | 0x7e30 | 0x0 |
GetDC | 0x0 | 0x415234 | 0x15234 | 0x7e34 | 0x0 |
FillRect | 0x0 | 0x415238 | 0x15238 | 0x7e38 | 0x0 |
DestroyIcon | 0x0 | 0x41523c | 0x1523c | 0x7e3c | 0x0 |
CopyImage | 0x0 | 0x415240 | 0x15240 | 0x7e40 | 0x0 |
CharLowerBuffA | 0x0 | 0x415244 | 0x15244 | 0x7e44 | 0x0 |
shell32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x41524c | 0x1524c | 0x7e4c | 0x0 |
ExtractIconA | 0x0 | 0x415250 | 0x15250 | 0x7e50 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Win32.Neshta.A |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\A581.tmp\spwak.vbs | Dropped File | Text |
Blacklisted
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2016-02-28 16:42 (UTC+1) |
Last Seen | 2019-03-27 00:19 (UTC+1) |
Names | Script-VBS.Trojan.Cerber |
Families | Cerber |
Classification | Trojan |
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\A7C3.tmp\splitterrypted.vbs | Dropped File | Text |
Blacklisted
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-11-04 06:02 (UTC+1) |
Last Seen | 2019-11-20 08:14 (UTC+1) |
Names | Script-VBS.Trojan.Frs |
Families | Frs |
Classification | Trojan |
c:\users\5p5nrgjn0js halpmcxz\appdata\local\gdipfontcachev1.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\0-XbmjhApBpbl9PNZz.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\n1ZSF-StyB.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\p_4JK8RE.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\MOuCPXz89mi-vjY\cKeWXjPU.doc.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\RDb44Dd9rK\gkez7qCe4pvt8.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\4aD-jo8V7HaiJ.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\9gRW7p18DfY1_.xlsx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\jqQp77PTEWZWi6QlFx2.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\uprg1XzZ2H dZcVu1J.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\bxaXZKffq6pRKB.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\jR 3X0d Iy.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1Xt-r0-zf1.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\SEXlC.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\YMH h4jMK7XgG.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\iO0-ro.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\vu1zqnld.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\Yo1 8KB.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\galiI az94_3nkr.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\SpLiTTer.Exe | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\dYHh zf.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5P5NRG~1\AppData\Local\Temp\tmp5023.tmp | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5P5NRG~1\AppData\Local\Temp\tmp5023.tmp | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2sYawNg.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\6D3Z8r.rtf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\7JqPkViX5AmGvE.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\86nbXhZ3BPsIxKo.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\9fuafFe.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\B3KVc4wEZKU3_uVhqP.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\dW76dBEuG.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\E wK4x.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\K5Jl6.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\LpSSsO6 KQDuPU-OODxj.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\MaTx3MZoB6P.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NVmgnI9iS2OKP.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\OShF.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Pj1kXYFH.xls.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\U6zVHGT_YCPkcYiydgUz.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\wX7ijA1LIcA8SI-zu5x.csv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\XFPDhJhOFakiokNXM5.odp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\yqGAtXON8HFRZp8.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\z9mz26T9HzE2Hdei-J.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zC x.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZkLGN.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\hOopDrGt007m.rtf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\IMY1_GWojiyk9TkjYV7.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\qpz4Ot.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\MOuCPXz89mi-vjY\56gr9Psys.csv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\MOuCPXz89mi-vjY\iffjejid4k.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\MOuCPXz89mi-vjY\otVMM3rmnhf5jzPexrI.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\MOuCPXz89mi-vjY\QvxqVGcIJV.pdf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\RDb44Dd9rK\2CM4YhYz l8AerLh6q.rtf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\RDb44Dd9rK\elmXEFHKb.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jsxpoY1YKzvJvBL9qPe\RDb44Dd9rK\nvikuZLJDbqJcb4LF.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\11VM.xlsx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\1FuN-q.xlsx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\2hUq mTbT9wuunMBwo.docx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\4wHkSiS6JmJIYysZ.docx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\5jLZ.docx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\bIvxgPPgfqR2ger9 7m4.ppt.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\bR4vb.xlsx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\eto VRLSpMhjc2un5j9.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\mSuyuu_TRVaEomc Gm.docx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\myHjkxt4wJfuPmPcCJ.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\oAR-plei1tF.xlsx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\UUH1LJsblXjm-cEvB.ods.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\xDNq1Fc.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\xmtEMMSRPM3ElQFCzdG7.docx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\9WPuenuZqIM4vN-A\9m8wd1cFisnHp.odt.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\9WPuenuZqIM4vN-A\p9f8E6RZEt5wp7DlD5.doc.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\D8ehXLpV\7fWOePa.odt.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\D8ehXLpV\G C44My7TVRoZ.xls.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\D8ehXLpV\tQtVs4Y01Ust.ods.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\DWiApHi4r.ppt.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\uWvs\Z_PB2v0trtHk16xg.ods.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\VSLfJ7ClI4LjH\eNPEV.odp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\VSLfJ7ClI4LjH\qNjd.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\VSLfJ7ClI4LjH\7pK fJX\PeI25iKPVw0 S0r.pptx.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\VSLfJ7ClI4LjH\vukelW3L\FZh5.pdf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\VSLfJ7ClI4LjH\vukelW3L\YtY919F.rtf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\zC2rqa\0s6T.csv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\zC2rqa\C0h0BsrtIYBYB.pdf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\k2Sa4D_\lsTyms5GaURCmkb\zC2rqa\wKuI7MxNILUH Jm.pdf.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Outlook Files\voeimd@djhreuu.uhd.pst.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\-fET-rY4ggjPUOM.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\4Q4SWeY9qo.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\3fmZlqnydz--rFSZ0e.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\943P.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\aIkdHeaXAgm.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\DBSwpnw8L9KL48WE.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\g8lGYKa79U4I.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\wJar93GJbtl7rx-pdsU.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\z9oodS7dFC_qwglO.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\zN19yN93ajhb.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\GQ-DG2UB\8-Lq8dvj.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\GQ-DG2UB\9VXxLKj.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\GQ-DG2UB\a4ZkuGrqBUSM1yp5mGz4.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\2vEDHmg JrjukwnrRv.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\9HJlgSnWWLm8.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\f6ul_-DwAWZ4xtW.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\IrFgwa87-saCXEw8ZyTY.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\rjSY.png.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\Yblqwcj.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\9q2Fxl2L_TE.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\aA4iOylMeVt0.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\OEnylF4d8B.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\pMtrFrtAxQlwILBg.bmp.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\QsaGcNHc5VTknNh7EF.jpg.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\s0zYn6qMR6.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\tlUfGk_lG0njJIs.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\q1e0Lh\unzJ2n5 wtQ ylSNmAh\1EtVbY\WVlAX.gif.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\2RY1qwGO1PYvSd.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\48 7F_dBVzHr0WGmP.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\eGSf4ILH6.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vEvu1fITYJ5zVSxKX.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\xfHxRhxRdLTmQ7Y1m.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lqQ_HO1N\-XTDJ.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lqQ_HO1N\5rDko.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lqQ_HO1N\B6m1kz2cbqIC.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lqQ_HO1N\PVcQ69C.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lqQ_HO1N\PxXAZzP6tEkONnOc.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\DJdkPZB.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\rwv6vbsHRQdcrZ.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\KhtZaxHCrnpuo7nVrgy\tM5Rl2tEazTiLZqhQaZ.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\KhtZaxHCrnpuo7nVrgy\RVLZ_ktC_rtPghy2\mvih5mPrg\GNEgO8pyioj6mUNB.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\KhtZaxHCrnpuo7nVrgy\RVLZ_ktC_rtPghy2\mvih5mPrg\yWpMNHroUpRQWS\ABUqhhHvw.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\KhtZaxHCrnpuo7nVrgy\RVLZ_ktC_rtPghy2\mvih5mPrg\yWpMNHroUpRQWS\kHc7H0_q9H7OX.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\KhtZaxHCrnpuo7nVrgy\UyyK7Inl\B2SEe 0cOn7 hcYlcx.mp3.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\qIRkL Nox9AYY\LK5KOMk2PPtKnFuJ.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vOQGGk\qIRkL Nox9AYY\q-LZE Xbdvkx36a.m4a.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\5cqxE.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\5V4sbrsoWF.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\EdyPQBzYVYnznC39F.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\iEzVa8J8-XQ38AYL.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\TlTzXqB.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\mt-Ftb\Sai3B_atvLFs8Vtvk.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\mt-Ftb\W3IRTUX\pPobDu_KJ8EsuPVh e9.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\mt-Ftb\W3IRTUX\QBf_rZxKztUr\bnf9n.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\mt-Ftb\W3IRTUX\QBf_rZxKztUr\rVgkpfo8CvKG qKwv.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\tjVXRkpNIB1r9J7\a-u1yC1dotK.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\tjVXRkpNIB1r9J7\t98PQxhnRg.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\tjVXRkpNIB1r9J7\UoyPXYhV3.mp4.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\tjVXRkpNIB1r9J7\zZ ypcOIoNPE.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\H2LEvTvsbLu8 pd-f\XFjyvCfRZ\Bb1CtsRNOtOl8uFwW0XB.flv.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\r FGkipfOa7wa\TCPlIWSrj 6lmez8.avi.Indonesia | Dropped File | Stream |
Unknown
|
...
|
»