3c7d9ecd...bf9a | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Target: win8.1_64 | exe
Classification: Trojan, Dropper

3c7d9ecd35b21a2a8fac7cce4fdb3e11c1950d5a02a0c0b369f4082acf00bf9a (SHA256)

3c7d9ecd35b21a2a8fac7cce4fdb3e11c1950d5a02a0c0b369f4082acf00bf9a.exe

Windows Exe (x86-32)

Created at 2018-05-16 15:35:00

Notifications (2/2)

Some extracted files may be missing in the report since the total file extraction size limit was reached during the analysis. You can increase the limit in the configuration settings.

The operating system was rebooted during the analysis because the sample installed a startup script or application for persistence.

Remarks

Some extracted files may be missing in the report since the total file extraction size limit was reached during the analysis. You can increase the limit in the configuration settings.

Master Boot Record Changes
»
Sector Number Sector Size Actions
2063 512 bytes
2063 512 bytes

Files Information

Number of sample files submitted for analysis 1
Number of files created and extracted during analysis 72
Number of files modified and extracted during analysis 140
c:\users\5jghkoaofdp\desktop\3c7d9ecd35b21a2a8fac7cce4fdb3e11c1950d5a02a0c0b369f4082acf00bf9a.exe, ...
Blacklisted
»
File Properties
Names c:\users\5jghkoaofdp\desktop\3c7d9ecd35b21a2a8fac7cce4fdb3e11c1950d5a02a0c0b369f4082acf00bf9a.exe (Sample File)
c:\windows\svchost.exe (Created File)
Size 16.50 KB
Hash Values MD5: 1221ac9d607af73c65fd6c62bec3d249
SHA1: 518d5a0a8025147b9e29821bccdaf3b42c0d01db
SHA256: 3c7d9ecd35b21a2a8fac7cce4fdb3e11c1950d5a02a0c0b369f4082acf00bf9a
Actions
File Reputation Information
»
Information Value
Severity
Blacklisted
Names Win32.Trojan.Reconyc
Families Reconyc
Classification Trojan
PE Information
»
Information Value
Image Base 0x400000
Entry Point 0x4020f0
Size Of Code 0x1800
Size Of Initialized Data 0x3600
Size Of Uninitialized Data 0x0
Format x86
Type Executable
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2018-05-09 15:29:35
Compiler/Packer Unknown
Sections (4)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0x16be 0x1800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.1
.rdata 0x403000 0x105c 0x1200 0x1c00 CNT_INITIALIZED_DATA, MEM_READ 5.22
.data 0x405000 0x1fd8 0x1000 0x2e00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.93
.reloc 0x407000 0x270 0x400 0x3e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.79
Imports (61)
»
CRYPT32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CryptImportPublicKeyInfo 0x0 0x403030 0x3b38 0x2738
CryptStringToBinaryA 0x0 0x403034 0x3b3c 0x273c
CryptDecodeObjectEx 0x0 0x403038 0x3b40 0x2740
SHLWAPI.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
PathCombineW 0x0 0x403100 0x3c08 0x2808
PathFindExtensionW 0x0 0x403104 0x3c0c 0x280c
MSVCRT.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
realloc 0x0 0x4030c0 0x3bc8 0x27c8
free 0x0 0x4030c4 0x3bcc 0x27cc
_wfopen 0x0 0x4030c8 0x3bd0 0x27d0
fwrite 0x0 0x4030cc 0x3bd4 0x27d4
rand 0x0 0x4030d0 0x3bd8 0x27d8
fseek 0x0 0x4030d4 0x3bdc 0x27dc
fclose 0x0 0x4030d8 0x3be0 0x27e0
srand 0x0 0x4030dc 0x3be4 0x27e4
malloc 0x0 0x4030e0 0x3be8 0x27e8
memset 0x0 0x4030e4 0x3bec 0x27ec
memcpy 0x0 0x4030e8 0x3bf0 0x27f0
KERNEL32.dll (31)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
lstrcmpW 0x0 0x403040 0x3b48 0x2748
GetFileSizeEx 0x0 0x403044 0x3b4c 0x274c
CreateFileW 0x0 0x403048 0x3b50 0x2750
UnmapViewOfFile 0x0 0x40304c 0x3b54 0x2754
CloseHandle 0x0 0x403050 0x3b58 0x2758
GetFileSize 0x0 0x403054 0x3b5c 0x275c
CreateFileMappingW 0x0 0x403058 0x3b60 0x2760
MapViewOfFile 0x0 0x40305c 0x3b64 0x2764
MoveFileW 0x0 0x403060 0x3b68 0x2768
LocalFree 0x0 0x403064 0x3b6c 0x276c
FindFirstFileW 0x0 0x403068 0x3b70 0x2770
FindNextFileW 0x0 0x40306c 0x3b74 0x2774
GetCurrentProcess 0x0 0x403070 0x3b78 0x2778
GetModuleFileNameW 0x0 0x403074 0x3b7c 0x277c
WaitForMultipleObjects 0x0 0x403078 0x3b80 0x2780
GetTempPathW 0x0 0x40307c 0x3b84 0x2784
CreateMutexW 0x0 0x403080 0x3b88 0x2788
FindClose 0x0 0x403084 0x3b8c 0x278c
ReleaseMutex 0x0 0x403088 0x3b90 0x2790
Wow64EnableWow64FsRedirection 0x0 0x40308c 0x3b94 0x2794
SetFileAttributesW 0x0 0x403090 0x3b98 0x2798
GetLogicalDriveStringsW 0x0 0x403094 0x3b9c 0x279c
Sleep 0x0 0x403098 0x3ba0 0x27a0
LoadLibraryA 0x0 0x40309c 0x3ba4 0x27a4
DeleteFileW 0x0 0x4030a0 0x3ba8 0x27a8
CreateThread 0x0 0x4030a4 0x3bac 0x27ac
GetWindowsDirectoryW 0x0 0x4030a8 0x3bb0 0x27b0
GetProcAddress 0x0 0x4030ac 0x3bb4 0x27b4
ExitProcess 0x0 0x4030b0 0x3bb8 0x27b8
CopyFileW 0x0 0x4030b4 0x3bbc 0x27bc
OpenMutexW 0x0 0x4030b8 0x3bc0 0x27c0
ADVAPI32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegSetValueExW 0x0 0x403000 0x3b08 0x2708
CryptAcquireContextW 0x0 0x403004 0x3b0c 0x270c
GetTokenInformation 0x0 0x403008 0x3b10 0x2710
RegOpenKeyW 0x0 0x40300c 0x3b14 0x2714
RegCreateKeyW 0x0 0x403010 0x3b18 0x2718
LookupPrivilegeValueW 0x0 0x403014 0x3b1c 0x271c
AdjustTokenPrivileges 0x0 0x403018 0x3b20 0x2720
RegCloseKey 0x0 0x40301c 0x3b24 0x2724
CryptEncrypt 0x0 0x403020 0x3b28 0x2728
OpenProcessToken 0x0 0x403024 0x3b2c 0x272c
RegOpenKeyExW 0x0 0x403028 0x3b30 0x2730
SHELL32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
ShellExecuteW 0x0 0x4030f0 0x3bf8 0x27f8
SHGetSpecialFolderLocation 0x0 0x4030f4 0x3bfc 0x27fc
SHGetPathFromIDListW 0x0 0x4030f8 0x3c00 0x2800
c:\windows\svchost.exe
»
File Properties
Names c:\windows\svchost.exe (Created File)
Size 0.00 KB
Hash Values MD5: d41d8cd98f00b204e9800998ecf8427e
SHA1: da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
c:\boot\bcd.log1, ...
»
File Properties
Names c:\boot\bcd.log1 (Modified File)
c:\boot\bcd.log1.[sepsis@protonmail.com].sepsis (Created File)
c:\boot\bcd.log2 (Modified File)
c:\boot\bcd.log2.[sepsis@protonmail.com].sepsis (Created File)
Size 0.18 KB
Hash Values MD5: 9d545a04b7368d29972e89376eeeb264
SHA1: 0e819aef207a012e2d068ca32360ac65b6bfcab9
SHA256: b4dd973aed2766bb439db73e91d88cc945fb283e68e437c2e330ce652e0123c5
Actions
c:\boot\bootstat.dat
»
File Properties
Names c:\boot\bootstat.dat (Modified File)
Size 64.00 KB
Hash Values MD5: f5f732c22575bee4bba87805f554b311
SHA1: 16d12675c2c07f4194b57307ec887a03de5d6299
SHA256: 0c86848f3f2c2512e66819c64ba67c85b02f7241df3d850edcdcf18063f2953d
Actions
c:\boot\bootstat.dat, ...
»
File Properties
Names c:\boot\bootstat.dat (Modified File)
c:\boot\bootstat.dat.[sepsis@protonmail.com].sepsis (Created File)
Size 64.18 KB
Hash Values MD5: 4ea95f48d0f2d0e5b75802d21c075970
SHA1: cc14d658ed5360f09019758eab9bcdbc17ef315b
SHA256: 0a468b854de09777e9c8cbee51bbab967207821070105daea6832e8d58b8bfa9
Actions
c:\bootnxt
»
File Properties
Names c:\bootnxt (Modified File)
Size 0.00 KB
Hash Values MD5: 93b885adfe0da089cdf634904fd59f71
SHA1: 5ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA256: 6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
Actions
c:\bootnxt, ...
»
File Properties
Names c:\bootnxt (Modified File)
c:\bootnxt.[sepsis@protonmail.com].sepsis (Created File)
Size 0.18 KB
Hash Values MD5: 75083afb5f033e0d63f25e50f64f1641
SHA1: 0390bc6aa882f0cda5a80f382a544087bbbfb2ba
SHA256: ba1194ff004e688f680e9426e8a2d8b55c250d103b97267361c4f2a0042dd8cb
Actions
c:\program files\common files\designer\msaddndr.olb
»
File Properties
Names c:\program files\common files\designer\msaddndr.olb (Modified File)
Size 15.61 KB
Hash Values MD5: 1108df7d19a17c500de8ac684950d742
SHA1: 3588c2cefafc75a8770efd61a29d9b49419c4bc2
SHA256: fbb1b8d5cf7b943ee9367e5da820ba3f10bdc40acdc0459ca4a27dc7ee5762e9
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x1a00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2015-08-14 22:15:32
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x1a4 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 2.24
.rsrc 0x180002000 0x1648 0x1800 0x600 CNT_INITIALIZED_DATA, MEM_READ 3.77
Digital Signatures (2)
»
Signature Properties
InternalName MsAddnDr
FileVersion 16.0.4266.1003
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2016
ProductVersion 16.0.4266.1003
FileDescription Microsoft Add-In Designer Object Library
MOSEVersion BETA
OriginalFilename MSAddnDr.olb
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2015-06-04 17:40
Valid to 2016-09-04 17:40
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 78 32 5D 60 FF A5 91 38 1D 00 00 00 00 00 78
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Issuer Certificate: Microsoft Root Certificate Authority
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2001-05-09 23:19
Valid to 2021-05-09 23:28
Algorithm SHA-1 with RSA Encryption
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2015-06-04 17:42
Valid to 2016-09-04 17:42
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 01 0A 2C 79 AE D7 79 7B A6 AC 00 01 00 00 01 0A
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Issuer Certificate: Microsoft Root Certificate Authority
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2001-05-09 23:19
Valid to 2021-05-09 23:28
Algorithm SHA-1 with RSA Encryption
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
c:\program files\common files\designer\msaddndr.olb, ...
»
File Properties
Names c:\program files\common files\designer\msaddndr.olb (Modified File)
c:\program files\common files\designer\msaddndr.olb.[sepsis@protonmail.com].sepsis (Created File)
Size 15.79 KB
Hash Values MD5: 228da1815eb645b81cb702ba4c93d3e8
SHA1: d683d6a5399d65be44ea7218a6c8134e187e6f48
SHA256: cfac4d55bfc01bdf961127632ac255478390794a760de3030776396c413b18af
Actions
c:\program files\common files\microsoft shared\dw\dbghelp.dll
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dbghelp.dll (Modified File)
Size 1.31 MB
Hash Values MD5: 312289e1292aff1d25bb6a7df4d2bbe2
SHA1: 9ad793bcb21e3e9b18d840c00c8ddab567bac5f5
SHA256: 90074968c979523b006746c21134550ccd7067466cfe24b78276c72fbf48be74
Actions
PE Information
»
Information Value
Image Base 0x3000000
Entry Point 0x30ac044
Size Of Code 0x136a00
Size Of Initialized Data 0x2e800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2009-01-31 01:17:46
Compiler/Packer Unknown
Sections (5)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x3001000 0x1369c5 0x136a00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.99
.data 0x3138000 0x1e1b0 0x5c00 0x136e00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 1.13
.pdata 0x3157000 0xa2fc 0xa400 0x13ca00 CNT_INITIALIZED_DATA, MEM_READ 5.98
.rsrc 0x3162000 0x3f0 0x400 0x146e00 CNT_INITIALIZED_DATA, MEM_READ 3.4
.reloc 0x3163000 0x5c16 0x5e00 0x147200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.2
Imports (184)
»
msvcrt.dll (85)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_isatty 0x0 0x3001320 0x1355d8 0x1349d8
_write 0x0 0x3001328 0x1355e0 0x1349e0
_lseeki64 0x0 0x3001330 0x1355e8 0x1349e8
_fileno 0x0 0x3001338 0x1355f0 0x1349f0
_read 0x0 0x3001340 0x1355f8 0x1349f8
__pioinfo 0x0 0x3001348 0x135600 0x134a00
__badioinfo 0x0 0x3001350 0x135608 0x134a08
??1type_info@@UEAA@XZ 0x0 0x3001358 0x135610 0x134a10
ferror 0x0 0x3001360 0x135618 0x134a18
wctomb 0x0 0x3001368 0x135620 0x134a20
_snprintf 0x0 0x3001370 0x135628 0x134a28
_iob 0x0 0x3001378 0x135630 0x134a30
isleadbyte 0x0 0x3001380 0x135638 0x134a38
__mb_cur_max 0x0 0x3001388 0x135640 0x134a40
mbtowc 0x0 0x3001390 0x135648 0x134a48
_onexit 0x0 0x3001398 0x135650 0x134a50
_lock 0x0 0x30013a0 0x135658 0x134a58
__dllonexit 0x0 0x30013a8 0x135660 0x134a60
_unlock 0x0 0x30013b0 0x135668 0x134a68
_CxxThrowException 0x0 0x30013b8 0x135670 0x134a70
memset 0x0 0x30013c0 0x135678 0x134a78
memcpy 0x0 0x30013c8 0x135680 0x134a80
_ismbblead 0x0 0x30013d0 0x135688 0x134a88
__C_specific_handler 0x0 0x30013d8 0x135690 0x134a90
_amsg_exit 0x0 0x30013e0 0x135698 0x134a98
_initterm 0x0 0x30013e8 0x1356a0 0x134aa0
_XcptFilter 0x0 0x30013f0 0x1356a8 0x134aa8
memmove 0x0 0x30013f8 0x1356b0 0x134ab0
_errno 0x0 0x3001400 0x1356b8 0x134ab8
__CxxFrameHandler 0x0 0x3001408 0x1356c0 0x134ac0
iswspace 0x0 0x3001410 0x1356c8 0x134ac8
calloc 0x0 0x3001418 0x1356d0 0x134ad0
_itoa 0x0 0x3001420 0x1356d8 0x134ad8
_wcsdup 0x0 0x3001428 0x1356e0 0x134ae0
towlower 0x0 0x3001430 0x1356e8 0x134ae8
tolower 0x0 0x3001438 0x1356f0 0x134af0
_wcslwr 0x0 0x3001440 0x1356f8 0x134af8
_wctime 0x0 0x3001448 0x135700 0x134b00
time 0x0 0x3001450 0x135708 0x134b08
??_V@YAXPEAX@Z 0x0 0x3001458 0x135710 0x134b10
_ltoa 0x0 0x3001460 0x135718 0x134b18
_wcsnicmp 0x0 0x3001468 0x135720 0x134b20
_purecall 0x0 0x3001470 0x135728 0x134b28
ctime 0x0 0x3001478 0x135730 0x134b30
malloc 0x0 0x3001480 0x135738 0x134b38
strncmp 0x0 0x3001488 0x135740 0x134b40
isspace 0x0 0x3001490 0x135748 0x134b48
_stricmp 0x0 0x3001498 0x135750 0x134b50
free 0x0 0x30014a0 0x135758 0x134b58
_strlwr 0x0 0x30014a8 0x135760 0x134b60
wcsrchr 0x0 0x30014b0 0x135768 0x134b68
strstr 0x0 0x30014b8 0x135770 0x134b70
_wcsicmp 0x0 0x30014c0 0x135778 0x134b78
qsort 0x0 0x30014c8 0x135780 0x134b80
iswxdigit 0x0 0x30014d0 0x135788 0x134b88
wcsncmp 0x0 0x30014d8 0x135790 0x134b90
_vsnwprintf 0x0 0x30014e0 0x135798 0x134b98
iswprint 0x0 0x30014e8 0x1357a0 0x134ba0
atol 0x0 0x30014f0 0x1357a8 0x134ba8
fclose 0x0 0x30014f8 0x1357b0 0x134bb0
__unDName 0x0 0x3001500 0x1357b8 0x134bb8
iswdigit 0x0 0x3001508 0x1357c0 0x134bc0
memcmp 0x0 0x3001510 0x1357c8 0x134bc8
bsearch 0x0 0x3001518 0x1357d0 0x134bd0
_wfsopen 0x0 0x3001520 0x1357d8 0x134bd8
fread 0x0 0x3001528 0x1357e0 0x134be0
fseek 0x0 0x3001530 0x1357e8 0x134be8
wcstol 0x0 0x3001538 0x1357f0 0x134bf0
strchr 0x0 0x3001540 0x1357f8 0x134bf8
??_U@YAPEAX_K@Z 0x0 0x3001548 0x135800 0x134c00
_time64 0x0 0x3001550 0x135808 0x134c08
_wfullpath 0x0 0x3001558 0x135810 0x134c10
_get_osfhandle 0x0 0x3001560 0x135818 0x134c18
_chsize 0x0 0x3001568 0x135820 0x134c20
_close 0x0 0x3001570 0x135828 0x134c28
_open_osfhandle 0x0 0x3001578 0x135830 0x134c30
ftell 0x0 0x3001580 0x135838 0x134c38
_memicmp 0x0 0x3001588 0x135840 0x134c40
_mbscmp 0x0 0x3001590 0x135848 0x134c48
_wgetenv 0x0 0x3001598 0x135850 0x134c50
wcsstr 0x0 0x30015a0 0x135858 0x134c58
wcschr 0x0 0x30015a8 0x135860 0x134c60
??3@YAXPEAX@Z 0x0 0x30015b0 0x135868 0x134c68
??2@YAPEAX_K@Z 0x0 0x30015b8 0x135870 0x134c70
_wsopen 0x0 0x30015c0 0x135878 0x134c78
KERNEL32.dll (99)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
MoveFileW 0x0 0x3001000 0x1352b8 0x1346b8
CreateFileW 0x0 0x3001008 0x1352c0 0x1346c0
DeleteFileW 0x0 0x3001010 0x1352c8 0x1346c8
CreateDirectoryW 0x0 0x3001018 0x1352d0 0x1346d0
FlushViewOfFile 0x0 0x3001020 0x1352d8 0x1346d8
MapViewOfFileEx 0x0 0x3001028 0x1352e0 0x1346e0
GetCurrentDirectoryW 0x0 0x3001030 0x1352e8 0x1346e8
InitializeCriticalSectionAndSpinCount 0x0 0x3001038 0x1352f0 0x1346f0
GetFileType 0x0 0x3001040 0x1352f8 0x1346f8
DeviceIoControl 0x0 0x3001048 0x135300 0x134700
SetFileAttributesW 0x0 0x3001050 0x135308 0x134708
__chkstk 0x0 0x3001058 0x135310 0x134710
CreateFileMappingW 0x0 0x3001060 0x135318 0x134718
LCMapStringW 0x0 0x3001068 0x135320 0x134720
LocalFree 0x0 0x3001070 0x135328 0x134728
GetVersion 0x0 0x3001078 0x135330 0x134730
FormatMessageW 0x0 0x3001080 0x135338 0x134738
DelayLoadFailureHook 0x0 0x3001088 0x135340 0x134740
SetUnhandledExceptionFilter 0x0 0x3001090 0x135348 0x134748
UnhandledExceptionFilter 0x0 0x3001098 0x135350 0x134750
TerminateProcess 0x0 0x30010a0 0x135358 0x134758
GetTickCount 0x0 0x30010a8 0x135360 0x134760
QueryPerformanceCounter 0x0 0x30010b0 0x135368 0x134768
RtlCaptureContext 0x0 0x30010b8 0x135370 0x134770
RtlLookupFunctionEntry 0x0 0x30010c0 0x135378 0x134778
RtlVirtualUnwind 0x0 0x30010c8 0x135380 0x134780
VirtualQueryEx 0x0 0x30010d0 0x135388 0x134788
GetThreadTimes 0x0 0x30010d8 0x135390 0x134790
GetThreadPriority 0x0 0x30010e0 0x135398 0x134798
GetPriorityClass 0x0 0x30010e8 0x1353a0 0x1347a0
GetThreadContext 0x0 0x30010f0 0x1353a8 0x1347a8
ResumeThread 0x0 0x30010f8 0x1353b0 0x1347b0
SuspendThread 0x0 0x3001100 0x1353b8 0x1347b8
GetCurrentThreadId 0x0 0x3001108 0x1353c0 0x1347c0
IsProcessorFeaturePresent 0x0 0x3001110 0x1353c8 0x1347c8
GetSystemInfo 0x0 0x3001118 0x1353d0 0x1347d0
GetSystemTimeAsFileTime 0x0 0x3001120 0x1353d8 0x1347d8
lstrcmpiW 0x0 0x3001128 0x1353e0 0x1347e0
Sleep 0x0 0x3001130 0x1353e8 0x1347e8
LoadLibraryExA 0x0 0x3001138 0x1353f0 0x1347f0
ReadProcessMemory 0x0 0x3001140 0x1353f8 0x1347f8
GetProcessHeap 0x0 0x3001148 0x135400 0x134800
LoadLibraryW 0x0 0x3001150 0x135408 0x134808
GetSystemDirectoryW 0x0 0x3001158 0x135410 0x134810
GetFileAttributesA 0x0 0x3001160 0x135418 0x134818
SetErrorMode 0x0 0x3001168 0x135420 0x134820
GetVersionExW 0x0 0x3001170 0x135428 0x134828
OutputDebugStringW 0x0 0x3001178 0x135430 0x134830
OutputDebugStringA 0x0 0x3001180 0x135438 0x134838
WriteFile 0x0 0x3001188 0x135440 0x134840
VirtualFree 0x0 0x3001190 0x135448 0x134848
OpenProcess 0x0 0x3001198 0x135450 0x134850
GetCurrentProcessId 0x0 0x30011a0 0x135458 0x134858
GetModuleHandleA 0x0 0x30011a8 0x135460 0x134860
MapViewOfFile 0x0 0x30011b0 0x135468 0x134868
CreateFileMappingA 0x0 0x30011b8 0x135470 0x134870
UnmapViewOfFile 0x0 0x30011c0 0x135478 0x134878
GetCurrentProcess 0x0 0x30011c8 0x135480 0x134880
DuplicateHandle 0x0 0x30011d0 0x135488 0x134888
VirtualProtect 0x0 0x30011d8 0x135490 0x134890
VirtualAlloc 0x0 0x30011e0 0x135498 0x134898
CreateDirectoryA 0x0 0x30011e8 0x1354a0 0x1348a0
GetFileAttributesW 0x0 0x30011f0 0x1354a8 0x1348a8
GetFullPathNameW 0x0 0x30011f8 0x1354b0 0x1348b0
WideCharToMultiByte 0x0 0x3001200 0x1354b8 0x1348b8
MultiByteToWideChar 0x0 0x3001208 0x1354c0 0x1348c0
ExpandEnvironmentStringsW 0x0 0x3001210 0x1354c8 0x1348c8
GetModuleFileNameW 0x0 0x3001218 0x1354d0 0x1348d0
SetLastError 0x0 0x3001220 0x1354d8 0x1348d8
FindFirstFileW 0x0 0x3001228 0x1354e0 0x1348e0
FindClose 0x0 0x3001230 0x1354e8 0x1348e8
FindNextFileW 0x0 0x3001238 0x1354f0 0x1348f0
LocalAlloc 0x0 0x3001240 0x1354f8 0x1348f8
EnterCriticalSection 0x0 0x3001248 0x135500 0x134900
LeaveCriticalSection 0x0 0x3001250 0x135508 0x134908
CreateFileA 0x0 0x3001258 0x135510 0x134910
GetFileSize 0x0 0x3001260 0x135518 0x134918
ReadFile 0x0 0x3001268 0x135520 0x134920
CloseHandle 0x0 0x3001270 0x135528 0x134928
GetLastError 0x0 0x3001278 0x135530 0x134930
TlsGetValue 0x0 0x3001280 0x135538 0x134938
TlsSetValue 0x0 0x3001288 0x135540 0x134940
LoadLibraryA 0x0 0x3001290 0x135548 0x134948
GetProcAddress 0x0 0x3001298 0x135550 0x134950
FreeLibrary 0x0 0x30012a0 0x135558 0x134958
TlsAlloc 0x0 0x30012a8 0x135560 0x134960
TlsFree 0x0 0x30012b0 0x135568 0x134968
GetVersionExA 0x0 0x30012b8 0x135570 0x134970
InitializeCriticalSection 0x0 0x30012c0 0x135578 0x134978
HeapCreate 0x0 0x30012c8 0x135580 0x134980
HeapDestroy 0x0 0x30012d0 0x135588 0x134988
DeleteCriticalSection 0x0 0x30012d8 0x135590 0x134990
HeapReAlloc 0x0 0x30012e0 0x135598 0x134998
HeapAlloc 0x0 0x30012e8 0x1355a0 0x1349a0
HeapFree 0x0 0x30012f0 0x1355a8 0x1349a8
IsDBCSLeadByte 0x0 0x30012f8 0x1355b0 0x1349b0
GetEnvironmentVariableW 0x0 0x3001300 0x1355b8 0x1349b8
CopyFileW 0x0 0x3001308 0x1355c0 0x1349c0
SetFilePointer 0x0 0x3001310 0x1355c8 0x1349c8
Exports (203)
»
Api name EAT Address Ordinal
DbgHelpCreateUserDump 0x3060da0 0x2
DbgHelpCreateUserDumpW 0x3060ec0 0x3
EnumDirTree 0x304fb20 0x4
EnumDirTreeW 0x304fc60 0x5
EnumerateLoadedModules 0x3048df0 0x6
EnumerateLoadedModules64 0x3048df0 0x7
EnumerateLoadedModulesEx 0x3048f30 0x8
EnumerateLoadedModulesExW 0x3048fd0 0x9
EnumerateLoadedModulesW64 0x3048e90 0xa
ExtensionApiVersion 0x3031f30 0xb
FindDebugInfoFile 0x304e0a0 0xc
FindDebugInfoFileEx 0x304f260 0xd
FindDebugInfoFileExW 0x304f1f0 0xe
FindExecutableImage 0x304ce00 0xf
FindExecutableImageEx 0x304dcc0 0x10
FindExecutableImageExW 0x304de40 0x11
FindFileInPath 0x304cc60 0x12
FindFileInSearchPath 0x304cce0 0x13
GetTimestampForLoadedLibrary 0x303b100 0x14
ImageDirectoryEntryToData 0x303ab30 0x15
ImageDirectoryEntryToDataEx 0x303a970 0x16
ImageNtHeader 0x303a4f0 0x17
ImageRvaToSection 0x303ab80 0x18
ImageRvaToVa 0x303ac30 0x19
ImagehlpApiVersion 0x30500e0 0x1a
ImagehlpApiVersionEx 0x30500f0 0x1b
MakeSureDirectoryPathExists 0x304fe50 0x1c
MiniDumpReadDumpStream 0x3074000 0x1d
MiniDumpWriteDump 0x3073c40 0x1e
SearchTreeForFile 0x304fce0 0x1f
SearchTreeForFileW 0x304fd30 0x20
StackWalk 0x306b210 0x21
StackWalk64 0x306b210 0x22
SymAddSourceStream 0x30460c0 0x23
SymAddSourceStreamA 0x3046050 0x24
SymAddSourceStreamW 0x3045e20 0x25
SymAddSymbol 0x3049760 0x26
SymAddSymbolW 0x3049670 0x27
SymCleanup 0x3043d30 0x28
SymDeleteSymbol 0x30498d0 0x29
SymDeleteSymbolW 0x30497d0 0x2a
SymEnumLines 0x30466c0 0x2b
SymEnumLinesW 0x30467b0 0x2c
SymEnumProcesses 0x3044c60 0x2d
SymEnumSourceFileTokens 0x30463f0 0x2e
SymEnumSourceFiles 0x304b480 0x2f
SymEnumSourceFilesW 0x304b530 0x30
SymEnumSourceLines 0x3046850 0x31
SymEnumSourceLinesW 0x3046960 0x32
SymEnumSym 0x304a9d0 0x33
SymEnumSymbols 0x3049ed0 0x34
SymEnumSymbolsForAddr 0x304a770 0x35
SymEnumSymbolsForAddrW 0x304a8a0 0x36
SymEnumSymbolsW 0x3049f80 0x37
SymEnumTypes 0x304acc0 0x38
SymEnumTypesByName 0x304adc0 0x39
SymEnumTypesByNameW 0x304aec0 0x3a
SymEnumTypesW 0x304ad40 0x3b
SymEnumerateModules 0x3044ea0 0x3c
SymEnumerateModules64 0x3044ea0 0x3d
SymEnumerateModulesW64 0x3044f10 0x3e
SymEnumerateSymbols 0x3045120 0x3f
SymEnumerateSymbols64 0x3045120 0x40
SymEnumerateSymbolsW 0x30451a0 0x41
SymEnumerateSymbolsW64 0x30451a0 0x42
SymFindDebugInfoFile 0x304f370 0x43
SymFindDebugInfoFileW 0x304f4a0 0x44
SymFindExecutableImage 0x304deb0 0x45
SymFindExecutableImageW 0x304e000 0x46
SymFindFileInPath 0x304c9e0 0x47
SymFindFileInPathW 0x304cbb0 0x48
SymFromAddr 0x3049940 0x49
SymFromAddrW 0x30499c0 0x4a
SymFromIndex 0x304a520 0x4b
SymFromIndexW 0x304a5d0 0x4c
SymFromName 0x3049c00 0x4d
SymFromNameW 0x3049ca0 0x4e
SymFromToken 0x3049a40 0x4f
SymFromTokenW 0x3049b10 0x50
SymFunctionTableAccess 0x3047b20 0x51
SymFunctionTableAccess64 0x3047b20 0x52
SymGetFileLineOffsets64 0x303cc40 0x53
SymGetHomeDirectory 0x3044620 0x54
SymGetHomeDirectoryW 0x3044530 0x55
SymGetLineFromAddr 0x3046a10 0x56
SymGetLineFromAddr64 0x3046a10 0x57
SymGetLineFromAddrW64 0x3046af0 0x58
SymGetLineFromName 0x3047340 0x59
SymGetLineFromName64 0x3047340 0x5a
SymGetLineFromNameW64 0x3046c70 0x5b
SymGetLineNext 0x3047630 0x5c
SymGetLineNext64 0x3047630 0x5d
SymGetLineNextW64 0x30476a0 0x5e
SymGetLinePrev 0x30476d0 0x5f
SymGetLinePrev64 0x30476d0 0x60
SymGetLinePrevW64 0x3047740 0x61
SymGetModuleBase 0x3048450 0x62
SymGetModuleBase64 0x3048450 0x63
SymGetModuleInfo 0x3047f80 0x64
SymGetModuleInfo64 0x3047f80 0x65
SymGetModuleInfoW 0x3048020 0x66
SymGetModuleInfoW64 0x3048020 0x67
SymGetOmapBlockBase 0x3049e20 0x1
SymGetOmaps 0x3049d00 0x68
SymGetOptions 0x3044910 0x69
SymGetScope 0x304a330 0x6a
SymGetScopeW 0x304a3e0 0x6b
SymGetSearchPath 0x3048870 0x6c
SymGetSearchPathW 0x30488f0 0x6d
SymGetSourceFile 0x3045bb0 0x6e
SymGetSourceFileFromToken 0x3046110 0x6f
SymGetSourceFileFromTokenW 0x30461d0 0x70
SymGetSourceFileToken 0x3045cd0 0x71
SymGetSourceFileTokenW 0x3045d40 0x72
SymGetSourceFileW 0x3045c40 0x73
SymGetSourceVarFromToken 0x3046250 0x74
SymGetSourceVarFromTokenW 0x3046340 0x75
SymGetSymFromAddr 0x3045310 0x76
SymGetSymFromAddr64 0x3045310 0x77
SymGetSymFromName 0x30455f0 0x78
SymGetSymFromName64 0x30455f0 0x79
SymGetSymNext 0x30458f0 0x7a
SymGetSymNext64 0x30458f0 0x7b
SymGetSymPrev 0x3045920 0x7c
SymGetSymPrev64 0x3045920 0x7d
SymGetSymbolFile 0x30604c0 0x7e
SymGetSymbolFileW 0x305fe80 0x7f
SymGetTypeFromName 0x304af40 0x80
SymGetTypeFromNameW 0x304b020 0x81
SymGetTypeInfo 0x304baf0 0x82
SymGetTypeInfoEx 0x304bb70 0x83
SymGetUnwindInfo 0x3047d40 0x84
SymInitialize 0x3043b30 0x85
SymInitializeW 0x30437a0 0x86
SymLoadModule 0x3048780 0x87
SymLoadModule64 0x3048780 0x88
SymLoadModuleEx 0x3048630 0x89
SymLoadModuleExW 0x3048700 0x8a
SymMatchFileName 0x3047770 0x8b
SymMatchFileNameW 0x3047900 0x8c
SymMatchString 0x304b240 0x8d
SymMatchStringA 0x304b2b0 0x8e
SymMatchStringW 0x304b2f0 0x8f
SymNext 0x3045670 0x90
SymNextW 0x3045720 0x91
SymPrev 0x3045750 0x92
SymPrevW 0x3045800 0x93
SymRefreshModuleList 0x3043720 0x94
SymRegisterCallback 0x3049070 0x95
SymRegisterCallback64 0x3049070 0x96
SymRegisterCallbackW64 0x3049120 0x97
SymRegisterFunctionEntryCallback 0x3047a80 0x98
SymRegisterFunctionEntryCallback64 0x3047a80 0x99
SymSearch 0x304a1b0 0x9a
SymSearchW 0x304a280 0x9b
SymSetContext 0x3044920 0x9c
SymSetHomeDirectory 0x3044480 0x9d
SymSetHomeDirectoryW 0x30443b0 0x9e
SymSetOptions 0x30446c0 0x9f
SymSetParentWindow 0x3043d80 0xa0
SymSetScopeFromAddr 0x30449d0 0xa1
SymSetScopeFromIndex 0x3044aa0 0xa2
SymSetSearchPath 0x3048970 0xa3
SymSetSearchPathW 0x3048a90 0xa4
SymSrvDeltaName 0x305ede0 0xa5
SymSrvDeltaNameW 0x305eb40 0xa6
SymSrvGetFileIndexInfo 0x3060790 0xa7
SymSrvGetFileIndexInfoW 0x3060880 0xa8
SymSrvGetFileIndexString 0x305f670 0xa9
SymSrvGetFileIndexStringW 0x305f550 0xaa
SymSrvGetFileIndexes 0x305f4e0 0xab
SymSrvGetFileIndexesW 0x305f3f0 0xac
SymSrvGetSupplement 0x305f0a0 0xad
SymSrvGetSupplementW 0x305eed0 0xae
SymSrvIsStore 0x305eaf0 0xaf
SymSrvIsStoreW 0x305e9e0 0xb0
SymSrvStoreFile 0x305f890 0xb1
SymSrvStoreFileW 0x305f760 0xb2
SymSrvStoreSupplement 0x305f310 0xb3
SymSrvStoreSupplementW 0x305f170 0xb4
SymUnDName 0x30487e0 0xb5
SymUnDName64 0x30487e0 0xb6
SymUnloadModule 0x30484e0 0xb7
SymUnloadModule64 0x30484e0 0xb8
UnDecorateSymbolName 0x304bc10 0xb9
UnDecorateSymbolNameW 0x304bcd0 0xba
WinDbgExtensionDllInit 0x3031f40 0xbb
block 0x3034a10 0xbc
chksym 0x3034800 0xbd
dbghelp 0x3044be0 0xbe
dh 0x3036af0 0xbf
fptr 0x30321e0 0xc0
homedir 0x3034ec0 0xc1
itoldyouso 0x30345f0 0xc2
lmi 0x30331a0 0xc3
lminfo 0x3032d20 0xc4
omap 0x3034c00 0xc5
srcfiles 0x30350e0 0xc6
stack_force_ebp 0x3032830 0xc7
stackdbg 0x3032300 0xc8
sym 0x3032a10 0xc9
symsrv 0x3032ba0 0xca
vc7fpo 0x3032280 0xcb
Digital Signatures (2)
»
Signature Properties
LegalCopyright © Microsoft Corporation. All rights reserved.
InternalName DBGHELP.DLL
FileVersion 6.11.0001.402 (debuggers(dbg).090130-1606)
CompanyName Microsoft Corporation
ProductName Debugging Tools for Windows(R)
ProductVersion 6.11.0001.402
FileDescription Windows Image Helper
OriginalFilename DBGHELP.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2008-10-22 21:24
Valid to 2010-01-22 21:34
Algorithm SHA-1 with RSA Encryption
Serial number 61 06 27 81 00 00 00 00 00 08
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 2007-08-22 22:31
Valid to 2012-08-25 07:00
Algorithm 1, 3, 14, 3, 2, 29
Serial number 2E AB 11 DC 50 FF 5C 9D CB C0
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Timestamping PCA
Valid from 2008-07-25 19:02
Valid to 2013-07-25 19:12
Algorithm SHA-1 with RSA Encryption
Serial number 61 06 94 2D 00 00 00 00 00 09
Issuer Certificate: Microsoft Timestamping PCA
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 2006-09-16 01:04
Valid to 2019-09-15 07:00
Algorithm SHA-1 with RSA Encryption
Serial number 6A 0B 99 4F C0 00 25 AB 11 DB 45 1F 58 7A 67 A2
c:\program files\common files\microsoft shared\dw\dbghelp.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dbghelp.dll (Modified File)
c:\program files\common files\microsoft shared\dw\dbghelp.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 1.31 MB
Hash Values MD5: 4679ab1652b6ae68dc69edade0a027c0
SHA1: 759b229ea4cf5e82296605071de808829199c353
SHA256: d00503057698662823a786fc3699cd36679e905690bb2d19d424b2cb5eadc3fe
Actions
c:\program files\common files\microsoft shared\dw\dw20.exe
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dw20.exe (Modified File)
Size 974.20 KB
Hash Values MD5: 21587eaad3120394426b036fc5b7277f
SHA1: 5839ab008b6d865f76f1929963d25d1c47ee5524
SHA256: 9388cb208954158e0cc3c8647dcb2d476d9bff5b80006587ba0f3524c2f4429a
Actions
PE Information
»
Information Value
Image Base 0x140000000
Entry Point 0x140053f0c
Size Of Code 0x6de00
Size Of Initialized Data 0x84e00
Size Of Uninitialized Data 0x0
Format x64
Type Executable
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:31:12
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x140001000 0x6dc74 0x6de00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.42
.rdata 0x14006f000 0x2a564 0x2a600 0x6e200 CNT_INITIALIZED_DATA, MEM_READ 5.31
.data 0x14009a000 0x4f510 0x4e400 0x98800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 5.73
.pdata 0x1400ea000 0x5a9c 0x5c00 0xe6c00 CNT_INITIALIZED_DATA, MEM_READ 5.67
.rsrc 0x1400f0000 0x3a30 0x3c00 0xec800 CNT_INITIALIZED_DATA, MEM_READ 5.57
.reloc 0x1400f4000 0x1834 0x1a00 0xf0400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.36
Imports (279)
»
VERSION.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetFileVersionInfoSizeW 0x0 0x14006f000 0x92a40 0x91c40
VerQueryValueA 0x0 0x14006f008 0x92a48 0x91c48
VerQueryValueW 0x0 0x14006f010 0x92a50 0x91c50
GetFileVersionInfoW 0x0 0x14006f018 0x92a58 0x91c58
WINTRUST.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
WTHelperProvDataFromStateData 0x0 0x14006f028 0x92a68 0x91c68
WinVerifyTrust 0x0 0x14006f030 0x92a70 0x91c70
ADVAPI32.dll (47)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCreateKeyExW 0x0 0x14006f040 0x92a80 0x91c80
RegQueryInfoKeyW 0x0 0x14006f048 0x92a88 0x91c88
RegEnumValueW 0x0 0x14006f050 0x92a90 0x91c90
EventUnregister 0x0 0x14006f058 0x92a98 0x91c98
GetSecurityDescriptorDacl 0x0 0x14006f060 0x92aa0 0x91ca0
RegCloseKey 0x0 0x14006f068 0x92aa8 0x91ca8
RegCreateKeyExA 0x0 0x14006f070 0x92ab0 0x91cb0
RegDeleteValueA 0x0 0x14006f078 0x92ab8 0x91cb8
RegDeleteValueW 0x0 0x14006f080 0x92ac0 0x91cc0
RegOpenKeyExA 0x0 0x14006f088 0x92ac8 0x91cc8
RegQueryValueExA 0x0 0x14006f090 0x92ad0 0x91cd0
RegQueryValueExW 0x0 0x14006f098 0x92ad8 0x91cd8
RegSetValueExA 0x0 0x14006f0a0 0x92ae0 0x91ce0
RegSetValueExW 0x0 0x14006f0a8 0x92ae8 0x91ce8
SetNamedSecurityInfoW 0x0 0x14006f0b0 0x92af0 0x91cf0
ConvertSidToStringSidA 0x0 0x14006f0b8 0x92af8 0x91cf8
ConvertStringSecurityDescriptorToSecurityDescriptorA 0x0 0x14006f0c0 0x92b00 0x91d00
GetUserNameA 0x0 0x14006f0c8 0x92b08 0x91d08
RegEnumKeyExA 0x0 0x14006f0d0 0x92b10 0x91d10
RegEnumValueA 0x0 0x14006f0d8 0x92b18 0x91d18
RegQueryInfoKeyA 0x0 0x14006f0e0 0x92b20 0x91d20
DeregisterEventSource 0x0 0x14006f0e8 0x92b28 0x91d28
RegisterEventSourceW 0x0 0x14006f0f0 0x92b30 0x91d30
ReportEventA 0x0 0x14006f0f8 0x92b38 0x91d38
ReportEventW 0x0 0x14006f100 0x92b40 0x91d40
OpenProcessToken 0x0 0x14006f108 0x92b48 0x91d48
AddAccessAllowedAce 0x0 0x14006f110 0x92b50 0x91d50
AddAccessDeniedAce 0x0 0x14006f118 0x92b58 0x91d58
AllocateAndInitializeSid 0x0 0x14006f120 0x92b60 0x91d60
CheckTokenMembership 0x0 0x14006f128 0x92b68 0x91d68
CopySid 0x0 0x14006f130 0x92b70 0x91d70
CreateWellKnownSid 0x0 0x14006f138 0x92b78 0x91d78
EqualSid 0x0 0x14006f140 0x92b80 0x91d80
FreeSid 0x0 0x14006f148 0x92b88 0x91d88
GetLengthSid 0x0 0x14006f150 0x92b90 0x91d90
GetTokenInformation 0x0 0x14006f158 0x92b98 0x91d98
InitializeAcl 0x0 0x14006f160 0x92ba0 0x91da0
InitializeSecurityDescriptor 0x0 0x14006f168 0x92ba8 0x91da8
IsValidSid 0x0 0x14006f170 0x92bb0 0x91db0
SetSecurityDescriptorDacl 0x0 0x14006f178 0x92bb8 0x91db8
ConvertStringSecurityDescriptorToSecurityDescriptorW 0x0 0x14006f180 0x92bc0 0x91dc0
OpenThreadToken 0x0 0x14006f188 0x92bc8 0x91dc8
RegOpenKeyExW 0x0 0x14006f190 0x92bd0 0x91dd0
EventWrite 0x0 0x14006f198 0x92bd8 0x91dd8
RegEnumKeyW 0x0 0x14006f1a0 0x92be0 0x91de0
RegGetValueW 0x0 0x14006f1a8 0x92be8 0x91de8
EventRegister 0x0 0x14006f1b0 0x92bf0 0x91df0
COMCTL32.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x14006f1c0 0x92c00 0x91e00
ImageList_ReplaceIcon 0x0 0x14006f1c8 0x92c08 0x91e08
ImageList_Destroy 0x0 0x14006f1d0 0x92c10 0x91e10
ImageList_Create 0x0 0x14006f1d8 0x92c18 0x91e18
Cabinet.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x16 0x14006f1e8 0x92c28 0x91e28
(by ordinal) 0x17 0x14006f1f0 0x92c30 0x91e30
(by ordinal) 0xa 0x14006f1f8 0x92c38 0x91e38
(by ordinal) 0x15 0x14006f200 0x92c40 0x91e40
(by ordinal) 0xb 0x14006f208 0x92c48 0x91e48
(by ordinal) 0xd 0x14006f210 0x92c50 0x91e50
(by ordinal) 0xc 0x14006f218 0x92c58 0x91e58
(by ordinal) 0xe 0x14006f220 0x92c60 0x91e60
(by ordinal) 0x14 0x14006f228 0x92c68 0x91e68
GDI32.dll (19)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateFontIndirectW 0x0 0x14006f238 0x92c78 0x91e78
GetTextFaceA 0x0 0x14006f240 0x92c80 0x91e80
CreateFontIndirectA 0x0 0x14006f248 0x92c88 0x91e88
CreateFontA 0x0 0x14006f250 0x92c90 0x91e90
DeleteDC 0x0 0x14006f258 0x92c98 0x91e98
DeleteObject 0x0 0x14006f260 0x92ca0 0x91ea0
GetDeviceCaps 0x0 0x14006f268 0x92ca8 0x91ea8
GetTextExtentPoint32W 0x0 0x14006f270 0x92cb0 0x91eb0
RestoreDC 0x0 0x14006f278 0x92cb8 0x91eb8
SaveDC 0x0 0x14006f280 0x92cc0 0x91ec0
SelectObject 0x0 0x14006f288 0x92cc8 0x91ec8
SetBkMode 0x0 0x14006f290 0x92cd0 0x91ed0
SetMapMode 0x0 0x14006f298 0x92cd8 0x91ed8
SetTextColor 0x0 0x14006f2a0 0x92ce0 0x91ee0
SetTextAlign 0x0 0x14006f2a8 0x92ce8 0x91ee8
GetTextMetricsA 0x0 0x14006f2b0 0x92cf0 0x91ef0
GetObjectA 0x0 0x14006f2b8 0x92cf8 0x91ef8
GetObjectW 0x0 0x14006f2c0 0x92d00 0x91f00
ExtTextOutW 0x0 0x14006f2c8 0x92d08 0x91f08
KERNEL32.dll (181)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RtlCaptureStackBackTrace 0x0 0x14006f2d8 0x92d18 0x91f18
GetLastError 0x0 0x14006f2e0 0x92d20 0x91f20
EnterCriticalSection 0x0 0x14006f2e8 0x92d28 0x91f28
LeaveCriticalSection 0x0 0x14006f2f0 0x92d30 0x91f30
GetLocalTime 0x0 0x14006f2f8 0x92d38 0x91f38
GetCommandLineW 0x0 0x14006f300 0x92d40 0x91f40
DeleteFileW 0x0 0x14006f308 0x92d48 0x91f48
CloseHandle 0x0 0x14006f310 0x92d50 0x91f50
SetUnhandledExceptionFilter 0x0 0x14006f318 0x92d58 0x91f58
SetErrorMode 0x0 0x14006f320 0x92d60 0x91f60
ReleaseMutex 0x0 0x14006f328 0x92d68 0x91f68
WaitForSingleObject 0x0 0x14006f330 0x92d70 0x91f70
Sleep 0x0 0x14006f338 0x92d78 0x91f78
GetCurrentProcess 0x0 0x14006f340 0x92d80 0x91f80
GetCurrentProcessId 0x0 0x14006f348 0x92d88 0x91f88
TerminateProcess 0x0 0x14006f350 0x92d90 0x91f90
CreateThread 0x0 0x14006f358 0x92d98 0x91f98
GetModuleHandleA 0x0 0x14006f360 0x92da0 0x91fa0
GetProcAddress 0x0 0x14006f368 0x92da8 0x91fa8
SetProcessWorkingSetSize 0x0 0x14006f370 0x92db0 0x91fb0
WaitForMultipleObjects 0x0 0x14006f378 0x92db8 0x91fb8
MapViewOfFile 0x0 0x14006f380 0x92dc0 0x91fc0
GetProcessHeap 0x0 0x14006f388 0x92dc8 0x91fc8
InitializeCriticalSection 0x0 0x14006f390 0x92dd0 0x91fd0
DeleteCriticalSection 0x0 0x14006f398 0x92dd8 0x91fd8
GetVersionExA 0x0 0x14006f3a0 0x92de0 0x91fe0
GetVersionExW 0x0 0x14006f3a8 0x92de8 0x91fe8
FreeLibrary 0x0 0x14006f3b0 0x92df0 0x91ff0
GetModuleFileNameW 0x0 0x14006f3b8 0x92df8 0x91ff8
MultiByteToWideChar 0x0 0x14006f3c0 0x92e00 0x92000
FindClose 0x0 0x14006f3c8 0x92e08 0x92008
FindFirstFileW 0x0 0x14006f3d0 0x92e10 0x92010
FindNextFileW 0x0 0x14006f3d8 0x92e18 0x92018
WriteFile 0x0 0x14006f3e0 0x92e20 0x92020
SetLastError 0x0 0x14006f3e8 0x92e28 0x92028
GetSystemTimeAsFileTime 0x0 0x14006f3f0 0x92e30 0x92030
GetTickCount 0x0 0x14006f3f8 0x92e38 0x92038
GetSystemWindowsDirectoryW 0x0 0x14006f400 0x92e40 0x92040
LocalFree 0x0 0x14006f408 0x92e48 0x92048
MoveFileW 0x0 0x14006f410 0x92e50 0x92050
GetDateFormatW 0x0 0x14006f418 0x92e58 0x92058
GetTimeFormatW 0x0 0x14006f420 0x92e60 0x92060
GetFileSize 0x0 0x14006f428 0x92e68 0x92068
ReadFile 0x0 0x14006f430 0x92e70 0x92070
SetFilePointer 0x0 0x14006f438 0x92e78 0x92078
RaiseException 0x0 0x14006f440 0x92e80 0x92080
ExitThread 0x0 0x14006f448 0x92e88 0x92088
SuspendThread 0x0 0x14006f450 0x92e90 0x92090
SetPriorityClass 0x0 0x14006f458 0x92e98 0x92098
GetTickCount64 0x0 0x14006f460 0x92ea0 0x920a0
UnmapViewOfFile 0x0 0x14006f468 0x92ea8 0x920a8
CreateFileMappingA 0x0 0x14006f470 0x92eb0 0x920b0
GetComputerNameA 0x0 0x14006f478 0x92eb8 0x920b8
GetModuleFileNameA 0x0 0x14006f480 0x92ec0 0x920c0
GetModuleHandleW 0x0 0x14006f488 0x92ec8 0x920c8
LoadLibraryExA 0x0 0x14006f490 0x92ed0 0x920d0
MulDiv 0x0 0x14006f498 0x92ed8 0x920d8
GetACP 0x0 0x14006f4a0 0x92ee0 0x920e0
GetSystemDefaultUILanguage 0x0 0x14006f4a8 0x92ee8 0x920e8
GetSystemDefaultLangID 0x0 0x14006f4b0 0x92ef0 0x920f0
GetUserDefaultLangID 0x0 0x14006f4b8 0x92ef8 0x920f8
GetSystemDefaultLCID 0x0 0x14006f4c0 0x92f00 0x92100
SetEnvironmentVariableA 0x0 0x14006f4c8 0x92f08 0x92108
ExpandEnvironmentStringsW 0x0 0x14006f4d0 0x92f10 0x92110
CreateDirectoryW 0x0 0x14006f4d8 0x92f18 0x92118
TlsGetValue 0x0 0x14006f4e0 0x92f20 0x92120
GetFileAttributesW 0x0 0x14006f4e8 0x92f28 0x92128
SetEndOfFile 0x0 0x14006f4f0 0x92f30 0x92130
GetTempPathW 0x0 0x14006f4f8 0x92f38 0x92138
SetEvent 0x0 0x14006f500 0x92f40 0x92140
CreateRemoteThread 0x0 0x14006f508 0x92f48 0x92148
SetThreadPriority 0x0 0x14006f510 0x92f50 0x92150
CreateProcessW 0x0 0x14006f518 0x92f58 0x92158
OpenProcess 0x0 0x14006f520 0x92f60 0x92160
GetSystemInfo 0x0 0x14006f528 0x92f68 0x92168
GetSystemDirectoryA 0x0 0x14006f530 0x92f70 0x92170
VirtualQueryEx 0x0 0x14006f538 0x92f78 0x92178
ReadProcessMemory 0x0 0x14006f540 0x92f80 0x92180
WideCharToMultiByte 0x0 0x14006f548 0x92f88 0x92188
IsDBCSLeadByte 0x0 0x14006f550 0x92f90 0x92190
IsValidCodePage 0x0 0x14006f558 0x92f98 0x92198
CreateFileA 0x0 0x14006f560 0x92fa0 0x921a0
CreateFileW 0x0 0x14006f568 0x92fa8 0x921a8
GetFileType 0x0 0x14006f570 0x92fb0 0x921b0
CreateMutexA 0x0 0x14006f578 0x92fb8 0x921b8
CreateEventA 0x0 0x14006f580 0x92fc0 0x921c0
OpenEventA 0x0 0x14006f588 0x92fc8 0x921c8
OpenMutexA 0x0 0x14006f590 0x92fd0 0x921d0
CreateSemaphoreA 0x0 0x14006f598 0x92fd8 0x921d8
OpenSemaphoreA 0x0 0x14006f5a0 0x92fe0 0x921e0
HeapAlloc 0x0 0x14006f5a8 0x92fe8 0x921e8
HeapFree 0x0 0x14006f5b0 0x92ff0 0x921f0
GlobalFree 0x0 0x14006f5b8 0x92ff8 0x921f8
LocalAlloc 0x0 0x14006f5c0 0x93000 0x92200
GetCurrentThread 0x0 0x14006f5c8 0x93008 0x92208
GlobalAlloc 0x0 0x14006f5d0 0x93010 0x92210
GetLocaleInfoEx 0x0 0x14006f5d8 0x93018 0x92218
InitializeCriticalSectionEx 0x0 0x14006f5e0 0x93020 0x92220
GetCurrentThreadId 0x0 0x14006f5e8 0x93028 0x92228
LocaleNameToLCID 0x0 0x14006f5f0 0x93030 0x92230
GetUserDefaultLocaleName 0x0 0x14006f5f8 0x93038 0x92238
IsValidLocale 0x0 0x14006f600 0x93040 0x92240
CompareStringW 0x0 0x14006f608 0x93048 0x92248
GetUserDefaultLCID 0x0 0x14006f610 0x93050 0x92250
CompareStringEx 0x0 0x14006f618 0x93058 0x92258
LCIDToLocaleName 0x0 0x14006f620 0x93060 0x92260
GetSystemDefaultLocaleName 0x0 0x14006f628 0x93068 0x92268
EnumCalendarInfoExEx 0x0 0x14006f630 0x93070 0x92270
EnumSystemLocalesEx 0x0 0x14006f638 0x93078 0x92278
GetDateFormatEx 0x0 0x14006f640 0x93080 0x92280
GetCalendarInfoEx 0x0 0x14006f648 0x93088 0x92288
EnumDateFormatsExEx 0x0 0x14006f650 0x93090 0x92290
EnumTimeFormatsEx 0x0 0x14006f658 0x93098 0x92298
GetThreadUILanguage 0x0 0x14006f660 0x930a0 0x922a0
LoadResource 0x0 0x14006f668 0x930a8 0x922a8
LockResource 0x0 0x14006f670 0x930b0 0x922b0
SetFileAttributesW 0x0 0x14006f678 0x930b8 0x922b8
RaiseFailFastException 0x0 0x14006f680 0x930c0 0x922c0
OutputDebugStringA 0x0 0x14006f688 0x930c8 0x922c8
GetModuleHandleExW 0x0 0x14006f690 0x930d0 0x922d0
LoadLibraryW 0x0 0x14006f698 0x930d8 0x922d8
CreateActCtxW 0x0 0x14006f6a0 0x930e0 0x922e0
ActivateActCtx 0x0 0x14006f6a8 0x930e8 0x922e8
DeactivateActCtx 0x0 0x14006f6b0 0x930f0 0x922f0
FindActCtxSectionStringW 0x0 0x14006f6b8 0x930f8 0x922f8
QueryActCtxW 0x0 0x14006f6c0 0x93100 0x92300
WaitForSingleObjectEx 0x0 0x14006f6c8 0x93108 0x92308
GetDiskFreeSpaceExW 0x0 0x14006f6d0 0x93110 0x92310
GetFileAttributesExW 0x0 0x14006f6d8 0x93118 0x92318
GlobalMemoryStatusEx 0x0 0x14006f6e0 0x93120 0x92320
GetSystemDirectoryW 0x0 0x14006f6e8 0x93128 0x92328
GetNativeSystemInfo 0x0 0x14006f6f0 0x93130 0x92330
GetProductInfo 0x0 0x14006f6f8 0x93138 0x92338
GetTimeZoneInformation 0x0 0x14006f700 0x93140 0x92340
GetUserGeoID 0x0 0x14006f708 0x93148 0x92348
GetUserDefaultUILanguage 0x0 0x14006f710 0x93150 0x92350
GetVersion 0x0 0x14006f718 0x93158 0x92358
GetCommandLineA 0x0 0x14006f720 0x93160 0x92360
GetStartupInfoW 0x0 0x14006f728 0x93168 0x92368
UnhandledExceptionFilter 0x0 0x14006f730 0x93170 0x92370
IsDebuggerPresent 0x0 0x14006f738 0x93178 0x92378
RtlVirtualUnwind 0x0 0x14006f740 0x93180 0x92380
RtlLookupFunctionEntry 0x0 0x14006f748 0x93188 0x92388
RtlCaptureContext 0x0 0x14006f750 0x93190 0x92390
EncodePointer 0x0 0x14006f758 0x93198 0x92398
DecodePointer 0x0 0x14006f760 0x931a0 0x923a0
RtlUnwindEx 0x0 0x14006f768 0x931a8 0x923a8
RtlPcToFileHeader 0x0 0x14006f770 0x931b0 0x923b0
HeapReAlloc 0x0 0x14006f778 0x931b8 0x923b8
HeapSize 0x0 0x14006f780 0x931c0 0x923c0
ExitProcess 0x0 0x14006f788 0x931c8 0x923c8
GetStdHandle 0x0 0x14006f790 0x931d0 0x923d0
FreeEnvironmentStringsW 0x0 0x14006f798 0x931d8 0x923d8
GetEnvironmentStringsW 0x0 0x14006f7a0 0x931e0 0x923e0
SetHandleCount 0x0 0x14006f7a8 0x931e8 0x923e8
InitializeCriticalSectionAndSpinCount 0x0 0x14006f7b0 0x931f0 0x923f0
FlsGetValue 0x0 0x14006f7b8 0x931f8 0x923f8
FlsSetValue 0x0 0x14006f7c0 0x93200 0x92400
FlsFree 0x0 0x14006f7c8 0x93208 0x92408
FlsAlloc 0x0 0x14006f7d0 0x93210 0x92410
HeapSetInformation 0x0 0x14006f7d8 0x93218 0x92418
HeapCreate 0x0 0x14006f7e0 0x93220 0x92420
QueryPerformanceCounter 0x0 0x14006f7e8 0x93228 0x92428
GetCPInfo 0x0 0x14006f7f0 0x93230 0x92430
GetOEMCP 0x0 0x14006f7f8 0x93238 0x92438
LCMapStringW 0x0 0x14006f800 0x93240 0x92440
GetStringTypeW 0x0 0x14006f808 0x93248 0x92448
GetConsoleCP 0x0 0x14006f810 0x93250 0x92450
GetConsoleMode 0x0 0x14006f818 0x93258 0x92458
SetStdHandle 0x0 0x14006f820 0x93260 0x92460
WriteConsoleW 0x0 0x14006f828 0x93268 0x92468
FlushFileBuffers 0x0 0x14006f830 0x93270 0x92470
GetLongPathNameW 0x0 0x14006f838 0x93278 0x92478
GetShortPathNameW 0x0 0x14006f840 0x93280 0x92480
lstrcmpiW 0x0 0x14006f848 0x93288 0x92488
GetShortPathNameA 0x0 0x14006f850 0x93290 0x92490
FindResourceW 0x0 0x14006f858 0x93298 0x92498
SizeofResource 0x0 0x14006f860 0x932a0 0x924a0
LoadLibraryExW 0x0 0x14006f868 0x932a8 0x924a8
LoadLibraryA 0x0 0x14006f870 0x932b0 0x924b0
GetStringTypeExW 0x0 0x14006f878 0x932b8 0x924b8
ole32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoCreateGuid 0x0 0x14006f888 0x932c8 0x924c8
CoUninitialize 0x0 0x14006f890 0x932d0 0x924d0
CoInitializeEx 0x0 0x14006f898 0x932d8 0x924d8
CoCreateInstance 0x0 0x14006f8a0 0x932e0 0x924e0
StringFromIID 0x0 0x14006f8a8 0x932e8 0x924e8
CoTaskMemFree 0x0 0x14006f8b0 0x932f0 0x924f0
OLEACC.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateStdAccessibleObject 0x0 0x14006f8c0 0x93300 0x92500
LresultFromObject 0x0 0x14006f8c8 0x93308 0x92508
OLEAUT32.dll (5)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysStringLen 0x7 0x14006f8d8 0x93318 0x92518
SystemTimeToVariantTime 0xb8 0x14006f8e0 0x93320 0x92520
VariantTimeToDosDateTime 0xd 0x14006f8e8 0x93328 0x92528
SysAllocString 0x2 0x14006f8f0 0x93330 0x92530
SysFreeString 0x6 0x14006f8f8 0x93338 0x92538
Icons (6)
»
Digital Signatures (2)
»
Signature Properties
InternalName DW20
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Application Error Reporting
ProductVersion 15.0.4569.1503
FileDescription Microsoft Application Error Reporting
OriginalFilename DW20.Exe
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 33 E5 27 86 A3 0E 4A 2A 80 00 00 00 00 00 33
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\dw\dw20.exe, ...
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dw20.exe (Modified File)
c:\program files\common files\microsoft shared\dw\dw20.exe.[sepsis@protonmail.com].sepsis (Created File)
Size 974.38 KB
Hash Values MD5: 58435dd3eed646e1eb9e69d039a8fa91
SHA1: a8cc9afd1509c53b8b3e60011b9b7e621e7f10fb
SHA256: c0ee6d2f1c8bf01c38eb9d6380adcec6cf4a8520ca82e756a92172aa776c86a1
Actions
c:\program files\common files\microsoft shared\dw\dwtrig20.exe
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dwtrig20.exe (Modified File)
Size 574.23 KB
Hash Values MD5: f0ea9218b3c1f961873efae9ac82a20d
SHA1: 816e816ddd31adb7e90ef84d69d7fc793679bc21
SHA256: 0b9173716de68122af51e8f955926f062e296619a9dbc043d2d4bc93e9078b2f
Actions
PE Information
»
Information Value
Image Base 0x140000000
Entry Point 0x14000779c
Size Of Code 0x32a00
Size Of Initialized Data 0x5ce00
Size Of Uninitialized Data 0x0
Format x64
Type Executable
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:34:23
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x140001000 0x3299c 0x32a00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.49
.rdata 0x140034000 0x1f4cc 0x1f600 0x32e00 CNT_INITIALIZED_DATA, MEM_READ 5.12
.data 0x140054000 0x38af0 0x36e00 0x52400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 7.29
.pdata 0x14008d000 0x2ed4 0x3000 0x89200 CNT_INITIALIZED_DATA, MEM_READ 5.32
.rsrc 0x140090000 0x878 0xa00 0x8c200 CNT_INITIALIZED_DATA, MEM_READ 4.04
.reloc 0x140091000 0x10d0 0x1200 0x8cc00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.36
Imports (184)
»
VERSION.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VerQueryValueW 0x0 0x140034000 0x4f020 0x4de20
GetFileVersionInfoW 0x0 0x140034008 0x4f028 0x4de28
GetFileVersionInfoSizeW 0x0 0x140034010 0x4f030 0x4de30
ADVAPI32.dll (35)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
OpenThreadToken 0x0 0x140034020 0x4f040 0x4de40
ConvertStringSecurityDescriptorToSecurityDescriptorW 0x0 0x140034028 0x4f048 0x4de48
ConvertSidToStringSidA 0x0 0x140034030 0x4f050 0x4de50
RegCloseKey 0x0 0x140034038 0x4f058 0x4de58
RegCreateKeyExW 0x0 0x140034040 0x4f060 0x4de60
RegDeleteKeyW 0x0 0x140034048 0x4f068 0x4de68
RegEnumKeyExW 0x0 0x140034050 0x4f070 0x4de70
RegOpenKeyExW 0x0 0x140034058 0x4f078 0x4de78
RegSetValueExW 0x0 0x140034060 0x4f080 0x4de80
EventWrite 0x0 0x140034068 0x4f088 0x4de88
RegEnumKeyW 0x0 0x140034070 0x4f090 0x4de90
RegOpenKeyExA 0x0 0x140034078 0x4f098 0x4de98
RegQueryValueExA 0x0 0x140034080 0x4f0a0 0x4dea0
RegGetValueW 0x0 0x140034088 0x4f0a8 0x4dea8
EventRegister 0x0 0x140034090 0x4f0b0 0x4deb0
EventUnregister 0x0 0x140034098 0x4f0b8 0x4deb8
RegEnumValueW 0x0 0x1400340a0 0x4f0c0 0x4dec0
RegQueryValueExW 0x0 0x1400340a8 0x4f0c8 0x4dec8
AllocateAndInitializeSid 0x0 0x1400340b0 0x4f0d0 0x4ded0
CheckTokenMembership 0x0 0x1400340b8 0x4f0d8 0x4ded8
FreeSid 0x0 0x1400340c0 0x4f0e0 0x4dee0
RegQueryInfoKeyW 0x0 0x1400340c8 0x4f0e8 0x4dee8
SetSecurityDescriptorDacl 0x0 0x1400340d0 0x4f0f0 0x4def0
IsValidSid 0x0 0x1400340d8 0x4f0f8 0x4def8
InitializeSecurityDescriptor 0x0 0x1400340e0 0x4f100 0x4df00
InitializeAcl 0x0 0x1400340e8 0x4f108 0x4df08
GetSecurityDescriptorDacl 0x0 0x1400340f0 0x4f110 0x4df10
GetLengthSid 0x0 0x1400340f8 0x4f118 0x4df18
EqualSid 0x0 0x140034100 0x4f120 0x4df20
CreateWellKnownSid 0x0 0x140034108 0x4f128 0x4df28
CopySid 0x0 0x140034110 0x4f130 0x4df30
AddAccessDeniedAce 0x0 0x140034118 0x4f138 0x4df38
AddAccessAllowedAce 0x0 0x140034120 0x4f140 0x4df40
GetTokenInformation 0x0 0x140034128 0x4f148 0x4df48
OpenProcessToken 0x0 0x140034130 0x4f150 0x4df50
KERNEL32.dll (133)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
ReleaseMutex 0x0 0x140034140 0x4f160 0x4df60
GetSystemTimeAsFileTime 0x0 0x140034148 0x4f168 0x4df68
GetLocalTime 0x0 0x140034150 0x4f170 0x4df70
GetTickCount64 0x0 0x140034158 0x4f178 0x4df78
RaiseFailFastException 0x0 0x140034160 0x4f180 0x4df80
GetDiskFreeSpaceExW 0x0 0x140034168 0x4f188 0x4df88
GetFileAttributesExW 0x0 0x140034170 0x4f190 0x4df90
GetFileSize 0x0 0x140034178 0x4f198 0x4df98
ReadFile 0x0 0x140034180 0x4f1a0 0x4dfa0
GlobalMemoryStatusEx 0x0 0x140034188 0x4f1a8 0x4dfa8
GetSystemDirectoryW 0x0 0x140034190 0x4f1b0 0x4dfb0
GetNativeSystemInfo 0x0 0x140034198 0x4f1b8 0x4dfb8
GetProductInfo 0x0 0x1400341a0 0x4f1c0 0x4dfc0
GetModuleHandleW 0x0 0x1400341a8 0x4f1c8 0x4dfc8
GetProcAddress 0x0 0x1400341b0 0x4f1d0 0x4dfd0
GetTimeZoneInformation 0x0 0x1400341b8 0x4f1d8 0x4dfd8
GetUserGeoID 0x0 0x1400341c0 0x4f1e0 0x4dfe0
GetUserDefaultUILanguage 0x0 0x1400341c8 0x4f1e8 0x4dfe8
GetSystemDefaultLCID 0x0 0x1400341d0 0x4f1f0 0x4dff0
GetUserDefaultLCID 0x0 0x1400341d8 0x4f1f8 0x4dff8
CreateDirectoryW 0x0 0x1400341e0 0x4f200 0x4e000
WaitForSingleObjectEx 0x0 0x1400341e8 0x4f208 0x4e008
GetCurrentProcess 0x0 0x1400341f0 0x4f210 0x4e010
GetCurrentProcessId 0x0 0x1400341f8 0x4f218 0x4e018
TerminateProcess 0x0 0x140034200 0x4f220 0x4e020
GetCurrentThreadId 0x0 0x140034208 0x4f228 0x4e028
CreateProcessW 0x0 0x140034210 0x4f230 0x4e030
GetTickCount 0x0 0x140034218 0x4f238 0x4e038
GlobalFree 0x0 0x140034220 0x4f240 0x4e040
LCIDToLocaleName 0x0 0x140034228 0x4f248 0x4e048
CreateMutexA 0x0 0x140034230 0x4f250 0x4e050
OpenMutexA 0x0 0x140034238 0x4f258 0x4e058
GlobalAlloc 0x0 0x140034240 0x4f260 0x4e060
GetACP 0x0 0x140034248 0x4f268 0x4e068
IsValidLocale 0x0 0x140034250 0x4f270 0x4e070
RaiseException 0x0 0x140034258 0x4f278 0x4e078
LeaveCriticalSection 0x0 0x140034260 0x4f280 0x4e080
EnumCalendarInfoExEx 0x0 0x140034268 0x4f288 0x4e088
HeapAlloc 0x0 0x140034270 0x4f290 0x4e090
HeapFree 0x0 0x140034278 0x4f298 0x4e098
GetProcessHeap 0x0 0x140034280 0x4f2a0 0x4e0a0
GetCommandLineW 0x0 0x140034288 0x4f2a8 0x4e0a8
HeapReAlloc 0x0 0x140034290 0x4f2b0 0x4e0b0
HeapSize 0x0 0x140034298 0x4f2b8 0x4e0b8
EncodePointer 0x0 0x1400342a0 0x4f2c0 0x4e0c0
DecodePointer 0x0 0x1400342a8 0x4f2c8 0x4e0c8
UnhandledExceptionFilter 0x0 0x1400342b0 0x4f2d0 0x4e0d0
SetUnhandledExceptionFilter 0x0 0x1400342b8 0x4f2d8 0x4e0d8
IsDebuggerPresent 0x0 0x1400342c0 0x4f2e0 0x4e0e0
RtlVirtualUnwind 0x0 0x1400342c8 0x4f2e8 0x4e0e8
RtlLookupFunctionEntry 0x0 0x1400342d0 0x4f2f0 0x4e0f0
RtlCaptureContext 0x0 0x1400342d8 0x4f2f8 0x4e0f8
RtlUnwindEx 0x0 0x1400342e0 0x4f300 0x4e100
ExitProcess 0x0 0x1400342e8 0x4f308 0x4e108
GetStdHandle 0x0 0x1400342f0 0x4f310 0x4e110
FreeEnvironmentStringsW 0x0 0x1400342f8 0x4f318 0x4e118
GetEnvironmentStringsW 0x0 0x140034300 0x4f320 0x4e120
SetHandleCount 0x0 0x140034308 0x4f328 0x4e128
InitializeCriticalSectionAndSpinCount 0x0 0x140034310 0x4f330 0x4e130
GetFileType 0x0 0x140034318 0x4f338 0x4e138
GetStartupInfoW 0x0 0x140034320 0x4f340 0x4e140
FlsGetValue 0x0 0x140034328 0x4f348 0x4e148
FlsSetValue 0x0 0x140034330 0x4f350 0x4e150
FlsFree 0x0 0x140034338 0x4f358 0x4e158
SetLastError 0x0 0x140034340 0x4f360 0x4e160
GetCurrentThread 0x0 0x140034348 0x4f368 0x4e168
HeapSetInformation 0x0 0x140034350 0x4f370 0x4e170
GetVersion 0x0 0x140034358 0x4f378 0x4e178
HeapCreate 0x0 0x140034360 0x4f380 0x4e180
QueryPerformanceCounter 0x0 0x140034368 0x4f388 0x4e188
Sleep 0x0 0x140034370 0x4f390 0x4e190
RtlPcToFileHeader 0x0 0x140034378 0x4f398 0x4e198
GetCPInfo 0x0 0x140034380 0x4f3a0 0x4e1a0
GetOEMCP 0x0 0x140034388 0x4f3a8 0x4e1a8
IsValidCodePage 0x0 0x140034390 0x4f3b0 0x4e1b0
FreeLibrary 0x0 0x140034398 0x4f3b8 0x4e1b8
LoadLibraryW 0x0 0x1400343a0 0x4f3c0 0x4e1c0
GetStringTypeW 0x0 0x1400343a8 0x4f3c8 0x4e1c8
SetFilePointer 0x0 0x1400343b0 0x4f3d0 0x4e1d0
WideCharToMultiByte 0x0 0x1400343b8 0x4f3d8 0x4e1d8
GetConsoleCP 0x0 0x1400343c0 0x4f3e0 0x4e1e0
GetConsoleMode 0x0 0x1400343c8 0x4f3e8 0x4e1e8
MultiByteToWideChar 0x0 0x1400343d0 0x4f3f0 0x4e1f0
LCMapStringW 0x0 0x1400343d8 0x4f3f8 0x4e1f8
SetStdHandle 0x0 0x1400343e0 0x4f400 0x4e200
WriteConsoleW 0x0 0x1400343e8 0x4f408 0x4e208
CreateFileW 0x0 0x1400343f0 0x4f410 0x4e210
FlushFileBuffers 0x0 0x1400343f8 0x4f418 0x4e218
GetFileAttributesW 0x0 0x140034400 0x4f420 0x4e220
GetLongPathNameW 0x0 0x140034408 0x4f428 0x4e228
GetShortPathNameW 0x0 0x140034410 0x4f430 0x4e230
GetSystemWindowsDirectoryW 0x0 0x140034418 0x4f438 0x4e238
lstrcmpiW 0x0 0x140034420 0x4f440 0x4e240
TlsGetValue 0x0 0x140034428 0x4f448 0x4e248
RtlCaptureStackBackTrace 0x0 0x140034430 0x4f450 0x4e250
LockResource 0x0 0x140034438 0x4f458 0x4e258
GetThreadUILanguage 0x0 0x140034440 0x4f460 0x4e260
EnumTimeFormatsEx 0x0 0x140034448 0x4f468 0x4e268
EnumDateFormatsExEx 0x0 0x140034450 0x4f470 0x4e270
GetCalendarInfoEx 0x0 0x140034458 0x4f478 0x4e278
GetLocaleInfoEx 0x0 0x140034460 0x4f480 0x4e280
CompareStringEx 0x0 0x140034468 0x4f488 0x4e288
GetVersionExW 0x0 0x140034470 0x4f490 0x4e290
EnterCriticalSection 0x0 0x140034478 0x4f498 0x4e298
GetLastError 0x0 0x140034480 0x4f4a0 0x4e2a0
CloseHandle 0x0 0x140034488 0x4f4a8 0x4e2a8
WriteFile 0x0 0x140034490 0x4f4b0 0x4e2b0
SetFileAttributesW 0x0 0x140034498 0x4f4b8 0x4e2b8
DeleteFileW 0x0 0x1400344a0 0x4f4c0 0x4e2c0
DeleteCriticalSection 0x0 0x1400344a8 0x4f4c8 0x4e2c8
InitializeCriticalSectionEx 0x0 0x1400344b0 0x4f4d0 0x4e2d0
lstrlenW 0x0 0x1400344b8 0x4f4d8 0x4e2d8
GetModuleFileNameW 0x0 0x1400344c0 0x4f4e0 0x4e2e0
CreateEventW 0x0 0x1400344c8 0x4f4e8 0x4e2e8
WaitForSingleObject 0x0 0x1400344d0 0x4f4f0 0x4e2f0
SetEvent 0x0 0x1400344d8 0x4f4f8 0x4e2f8
CompareStringW 0x0 0x1400344e0 0x4f500 0x4e300
EnumSystemLocalesEx 0x0 0x1400344e8 0x4f508 0x4e308
FlsAlloc 0x0 0x1400344f0 0x4f510 0x4e310
LocalAlloc 0x0 0x1400344f8 0x4f518 0x4e318
LocalFree 0x0 0x140034500 0x4f520 0x4e320
LoadLibraryA 0x0 0x140034508 0x4f528 0x4e328
GetTempPathW 0x0 0x140034510 0x4f530 0x4e330
LoadLibraryExW 0x0 0x140034518 0x4f538 0x4e338
LoadResource 0x0 0x140034520 0x4f540 0x4e340
SizeofResource 0x0 0x140034528 0x4f548 0x4e348
FindResourceW 0x0 0x140034530 0x4f550 0x4e350
GetModuleFileNameA 0x0 0x140034538 0x4f558 0x4e358
GetShortPathNameA 0x0 0x140034540 0x4f560 0x4e360
LocaleNameToLCID 0x0 0x140034548 0x4f568 0x4e368
GetUserDefaultLocaleName 0x0 0x140034550 0x4f570 0x4e370
GetSystemDefaultLocaleName 0x0 0x140034558 0x4f578 0x4e378
GetDateFormatEx 0x0 0x140034560 0x4f580 0x4e380
ole32.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoTaskMemFree 0x0 0x140034570 0x4f590 0x4e390
StringFromCLSID 0x0 0x140034578 0x4f598 0x4e398
CoCreateGuid 0x0 0x140034580 0x4f5a0 0x4e3a0
CoRegisterClassObject 0x0 0x140034588 0x4f5a8 0x4e3a8
CoInitializeEx 0x0 0x140034590 0x4f5b0 0x4e3b0
CoUninitialize 0x0 0x140034598 0x4f5b8 0x4e3b8
CoCreateInstance 0x0 0x1400345a0 0x4f5c0 0x4e3c0
StringFromIID 0x0 0x1400345a8 0x4f5c8 0x4e3c8
CoRevokeClassObject 0x0 0x1400345b0 0x4f5d0 0x4e3d0
OLEAUT32.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysAllocString 0x2 0x1400345c0 0x4f5e0 0x4e3e0
SysFreeString 0x6 0x1400345c8 0x4f5e8 0x4e3e8
LoadRegTypeLib 0xa2 0x1400345d0 0x4f5f0 0x4e3f0
LoadTypeLib 0xa1 0x1400345d8 0x4f5f8 0x4e3f8
Digital Signatures (2)
»
Signature Properties
InternalName dwtrig20.exe
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Watson Subscriber for SENS Network Notifications
ProductVersion 15.0.4569.1503
FileDescription Watson Subscriber for SENS Network Notifications
OriginalFilename dwtrig20.exe
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 34 24 31 40 C9 A0 C1 79 8D 00 00 00 00 00 34
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\dw\dwtrig20.exe, ...
»
File Properties
Names c:\program files\common files\microsoft shared\dw\dwtrig20.exe (Modified File)
c:\program files\common files\microsoft shared\dw\dwtrig20.exe.[sepsis@protonmail.com].sepsis (Created File)
Size 574.40 KB
Hash Values MD5: 0600feb1e31732b89988e3aafb444016
SHA1: 88d595150a145510984b09d0ccbf860fc9d63682
SHA256: 168d0ce4baa65d6f36d6d974469c3007b8dde7998fe3904d027bd8b9e971490f
Actions
c:\program files\common files\microsoft shared\equation\1033\eeintl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\equation\1033\eeintl.dll (Modified File)
Size 62.59 KB
Hash Values MD5: f3e1265f2f72f0f30464c19fc0d9263d
SHA1: a63a10d4b34916cfc0d1b9d990244710b25b4b0f
SHA256: 092167fb8180160d65ab2f79cc9fba22ef91580af15be7bcddb27ac5613f34dd
Actions
PE Information
»
Information Value
Image Base 0x3de20000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0xc200
Size Of Uninitialized Data 0x0
Format x86
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2000-09-28 00:06:36
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rsrc 0x3de21000 0xbf50 0xc000 0x1000 CNT_INITIALIZED_DATA, MEM_READ 3.58
.reloc 0x3de2d000 0xc 0x1000 0xd000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.0
Digital Signatures (2)
»
Signature Properties
LegalCopyright Copyright © Design Science, Inc. 1990-2000
InternalName EEINTL.DLL
FileVersion 00091400
CompanyName Design Science, Inc.
ProductName Microsoft Equation Editor
ProductVersion 3.1
FileDescription Microsoft Equation Editor Int'l DLL
OriginalFilename EEINTL.DLL
Signature verification True
Certificate: VeriSign Time Stamping Service
»
Certificate Properties
Issued by VeriSign, Inc.
Valid from 2001-02-28 00:00
Valid to 2004-01-06 23:59
Algorithm MD5 with RSA Encryption
Serial number 87 A6 D5 C6 F6 29 34 FB AC 4F D4 3E 11 41 89 D
Issuer Certificate: VeriSign, Inc.
»
Certificate Properties
Issued by VeriSign, Inc.
Valid from 1997-05-12 00:00
Valid to 2004-01-07 23:59
Algorithm MD5 with RSA Encryption
Serial number 4A 19 D2 38 8C 82 59 1C A5 5D 73 5F 15 5D DC A3
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2002-05-25 00:55
Valid to 2003-11-25 01:05
Algorithm SHA-1 with RSA Encryption
Serial number 61 07 11 43 00 00 00 00 00 34
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 2000-12-10 08:00
Valid to 2005-11-12 08:00
Algorithm MD5 with RSA Encryption
Serial number 6A 0B 99 4F C0 00 DE AA 11 D4 D8 40 9A A8 BE E6
Issuer Certificate: Microsoft Root Authority
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 1997-01-10 07:00
Valid to 2020-12-31 07:00
Algorithm MD5 with RSA Encryption
Serial number C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
c:\program files\common files\microsoft shared\equation\1033\eeintl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\1033\eeintl.dll (Modified File)
c:\program files\common files\microsoft shared\equation\1033\eeintl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 62.77 KB
Hash Values MD5: 51eb3a059480b7576659efb1bad7f521
SHA1: 52934a488d2e7496332dac9fda1a1ee7c50da281
SHA256: 6e24e0590625060c7516290e4b35267a2edb452828da9c4de3304fe424ab7e49
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.cnt
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.cnt (Modified File)
Size 2.50 KB
Hash Values MD5: 46ce3a6fe2aac3523a07e8f1c8a29660
SHA1: 2cbe46d709c3229fb789a28bbd3dcb75bdf891c0
SHA256: 113948f5486837f5b352cdc34558a02ac95ede605dc271205ec702280aa1ef11
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.cnt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.cnt (Modified File)
c:\program files\common files\microsoft shared\equation\eqnedt32.cnt.[sepsis@protonmail.com].sepsis (Created File)
Size 2.67 KB
Hash Values MD5: 854d72551d4d99dbb6cc756ffd9e8738
SHA1: 68f9f153c4ef0fc748d75dfa8e791cd0d1544f39
SHA256: fccf5a199f776e44ceddfbbc2b7c566e0ef5e961eca803fda6484ff9091b23f6
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.exe
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.exe (Modified File)
Size 530.57 KB
Hash Values MD5: a87236e214f6d42a65f5dedac816aec8
SHA1: 601f4e8cd6b1c5fcd8f0be4acf01a08261a07b94
SHA256: 3c4a68070f3d7f14e488ae4f7ede8e7add0f8029995dc800833126ca062a2c6c
Actions
PE Information
»
Information Value
Image Base 0x400000
Entry Point 0x44cd40
Size Of Code 0x51400
Size Of Initialized Data 0x38200
Size Of Uninitialized Data 0x0
Format x86
Type Executable
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2000-11-09 17:20:15
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0x513a3 0x52000 0x1000 CNT_CODE, MEM_EXECUTE, MEM_READ 5.92
.rdata 0x453000 0xbf2 0x1000 0x53000 CNT_INITIALIZED_DATA, MEM_READ 3.6
.data 0x454000 0x116c8 0x7000 0x54000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.26
.idata 0x466000 0x21be 0x3000 0x5b000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.38
.rsrc 0x469000 0x1f2d8 0x20000 0x5e000 CNT_INITIALIZED_DATA, MEM_READ 4.05
.reloc 0x489000 0x4704 0x5000 0x7e000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 6.14
Imports (340)
»
KERNEL32.dll (93)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetStringTypeA 0x0 0x466758 0x661ec 0x5b1ec
GetFileType 0x0 0x46675c 0x661f0 0x5b1f0
FlushFileBuffers 0x0 0x466760 0x661f4 0x5b1f4
WriteFile 0x0 0x466764 0x661f8 0x5b1f8
GetStdHandle 0x0 0x466768 0x661fc 0x5b1fc
GetOEMCP 0x0 0x46676c 0x66200 0x5b200
SetHandleCount 0x0 0x466770 0x66204 0x5b204
CompareStringW 0x0 0x466774 0x66208 0x5b208
GetStringTypeW 0x0 0x466778 0x6620c 0x5b20c
SetStdHandle 0x0 0x46677c 0x66210 0x5b210
GetEnvironmentStrings 0x0 0x466780 0x66214 0x5b214
RaiseException 0x0 0x466784 0x66218 0x5b218
IsBadReadPtr 0x0 0x466788 0x6621c 0x5b21c
lstrlenA 0x0 0x46678c 0x66220 0x5b220
lstrcpyA 0x0 0x466790 0x66224 0x5b224
MulDiv 0x0 0x466794 0x66228 0x5b228
LocalAlloc 0x0 0x466798 0x6622c 0x5b22c
OutputDebugStringA 0x0 0x46679c 0x66230 0x5b230
lstrcmpiA 0x0 0x4667a0 0x66234 0x5b234
GlobalSize 0x0 0x4667a4 0x66238 0x5b238
GlobalReAlloc 0x0 0x4667a8 0x6623c 0x5b23c
GlobalAlloc 0x0 0x4667ac 0x66240 0x5b240
GlobalLock 0x0 0x4667b0 0x66244 0x5b244
GetEnvironmentStringsW 0x0 0x4667b4 0x66248 0x5b248
FreeEnvironmentStringsW 0x0 0x4667b8 0x6624c 0x5b24c
GetCurrentProcess 0x0 0x4667bc 0x66250 0x5b250
FreeEnvironmentStringsA 0x0 0x4667c0 0x66254 0x5b254
UnhandledExceptionFilter 0x0 0x4667c4 0x66258 0x5b258
CloseHandle 0x0 0x4667c8 0x6625c 0x5b25c
TerminateProcess 0x0 0x4667cc 0x66260 0x5b260
ExitProcess 0x0 0x4667d0 0x66264 0x5b264
HeapCreate 0x0 0x4667d4 0x66268 0x5b268
VirtualAlloc 0x0 0x4667d8 0x6626c 0x5b26c
VirtualFree 0x0 0x4667dc 0x66270 0x5b270
LCMapStringA 0x0 0x4667e0 0x66274 0x5b274
HeapDestroy 0x0 0x4667e4 0x66278 0x5b278
LCMapStringW 0x0 0x4667e8 0x6627c 0x5b27c
GetStartupInfoA 0x0 0x4667ec 0x66280 0x5b280
RtlUnwind 0x0 0x4667f0 0x66284 0x5b284
GetCommandLineA 0x0 0x4667f4 0x66288 0x5b288
HeapFree 0x0 0x4667f8 0x6628c 0x5b28c
GetModuleHandleA 0x0 0x4667fc 0x66290 0x5b290
HeapAlloc 0x0 0x466800 0x66294 0x5b294
GetLocalTime 0x0 0x466804 0x66298 0x5b298
MoveFileA 0x0 0x466808 0x6629c 0x5b29c
GetLastError 0x0 0x46680c 0x662a0 0x5b2a0
SetErrorMode 0x0 0x466810 0x662a4 0x5b2a4
GetSystemTime 0x0 0x466814 0x662a8 0x5b2a8
GetTimeZoneInformation 0x0 0x466818 0x662ac 0x5b2ac
WinExec 0x0 0x46681c 0x662b0 0x5b2b0
GetSystemDefaultLangID 0x0 0x466820 0x662b4 0x5b2b4
GetCPInfo 0x0 0x466824 0x662b8 0x5b2b8
GetLocaleInfoA 0x0 0x466828 0x662bc 0x5b2bc
WideCharToMultiByte 0x0 0x46682c 0x662c0 0x5b2c0
GetSystemDirectoryA 0x0 0x466830 0x662c4 0x5b2c4
LockResource 0x0 0x466834 0x662c8 0x5b2c8
MultiByteToWideChar 0x0 0x466838 0x662cc 0x5b2cc
SizeofResource 0x0 0x46683c 0x662d0 0x5b2d0
LoadResource 0x0 0x466840 0x662d4 0x5b2d4
FreeResource 0x0 0x466844 0x662d8 0x5b2d8
FindResourceA 0x0 0x466848 0x662dc 0x5b2dc
_lread 0x0 0x46684c 0x662e0 0x5b2e0
SetEndOfFile 0x0 0x466850 0x662e4 0x5b2e4
SetFilePointer 0x0 0x466854 0x662e8 0x5b2e8
_lclose 0x0 0x466858 0x662ec 0x5b2ec
_lwrite 0x0 0x46685c 0x662f0 0x5b2f0
OpenFile 0x0 0x466860 0x662f4 0x5b2f4
GetModuleFileNameA 0x0 0x466864 0x662f8 0x5b2f8
_llseek 0x0 0x466868 0x662fc 0x5b2fc
GetWindowsDirectoryA 0x0 0x46686c 0x66300 0x5b300
GlobalFlags 0x0 0x466870 0x66304 0x5b304
GetTickCount 0x0 0x466874 0x66308 0x5b308
FatalAppExitA 0x0 0x466878 0x6630c 0x5b30c
SetEnvironmentVariableA 0x0 0x46687c 0x66310 0x5b310
LocalLock 0x0 0x466880 0x66314 0x5b314
LocalReAlloc 0x0 0x466884 0x66318 0x5b318
GlobalUnlock 0x0 0x466888 0x6631c 0x5b31c
LocalUnlock 0x0 0x46688c 0x66320 0x5b320
GetProcAddress 0x0 0x466890 0x66324 0x5b324
LocalFree 0x0 0x466894 0x66328 0x5b328
GetACP 0x0 0x466898 0x6632c 0x5b32c
GetVersion 0x0 0x46689c 0x66330 0x5b330
FreeLibrary 0x0 0x4668a0 0x66334 0x5b334
LoadLibraryA 0x0 0x4668a4 0x66338 0x5b338
GlobalHandle 0x0 0x4668a8 0x6633c 0x5b33c
GetProfileStringA 0x0 0x4668ac 0x66340 0x5b340
lstrcmpA 0x0 0x4668b0 0x66344 0x5b344
HeapReAlloc 0x0 0x4668b4 0x66348 0x5b348
IsDBCSLeadByte 0x0 0x4668b8 0x6634c 0x5b34c
GlobalFree 0x0 0x4668bc 0x66350 0x5b350
ReadFile 0x0 0x4668c0 0x66354 0x5b354
CreateFileA 0x0 0x4668c4 0x66358 0x5b358
CompareStringA 0x0 0x4668c8 0x6635c 0x5b35c
USER32.dll (141)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
InvalidateRect 0x0 0x4668d8 0x6636c 0x5b36c
SendDlgItemMessageA 0x0 0x4668dc 0x66370 0x5b370
GetDialogBaseUnits 0x0 0x4668e0 0x66374 0x5b374
IsDlgButtonChecked 0x0 0x4668e4 0x66378 0x5b378
CheckDlgButton 0x0 0x4668e8 0x6637c 0x5b37c
GetNextDlgTabItem 0x0 0x4668ec 0x66380 0x5b380
SetScrollRange 0x0 0x4668f0 0x66384 0x5b384
SetDlgItemTextA 0x0 0x4668f4 0x66388 0x5b388
GetDlgItemTextA 0x0 0x4668f8 0x6638c 0x5b38c
MapWindowPoints 0x0 0x4668fc 0x66390 0x5b390
CheckRadioButton 0x0 0x466900 0x66394 0x5b394
GetDoubleClickTime 0x0 0x466904 0x66398 0x5b398
ReleaseCapture 0x0 0x466908 0x6639c 0x5b39c
SetCapture 0x0 0x46690c 0x663a0 0x5b3a0
RegisterClassW 0x0 0x466910 0x663a4 0x5b3a4
SetMenu 0x0 0x466914 0x663a8 0x5b3a8
SetWindowTextA 0x0 0x466918 0x663ac 0x5b3ac
GetWindowTextA 0x0 0x46691c 0x663b0 0x5b3b0
InvalidateRgn 0x0 0x466920 0x663b4 0x5b3b4
ScrollDC 0x0 0x466924 0x663b8 0x5b3b8
IsZoomed 0x0 0x466928 0x663bc 0x5b3bc
AppendMenuA 0x0 0x46692c 0x663c0 0x5b3c0
GetSystemMenu 0x0 0x466930 0x663c4 0x5b3c4
GetClassLongA 0x0 0x466934 0x663c8 0x5b3c8
GetClassLongW 0x0 0x466938 0x663cc 0x5b3cc
DispatchMessageA 0x0 0x46693c 0x663d0 0x5b3d0
DispatchMessageW 0x0 0x466940 0x663d4 0x5b3d4
GetMessageW 0x0 0x466944 0x663d8 0x5b3d8
GetMessageA 0x0 0x466948 0x663dc 0x5b3dc
DefWindowProcW 0x0 0x46694c 0x663e0 0x5b3e0
VkKeyScanA 0x0 0x466950 0x663e4 0x5b3e4
GetKeyboardLayout 0x0 0x466954 0x663e8 0x5b3e8
LoadKeyboardLayoutA 0x0 0x466958 0x663ec 0x5b3ec
ActivateKeyboardLayout 0x0 0x46695c 0x663f0 0x5b3f0
GetKeyboardLayoutList 0x0 0x466960 0x663f4 0x5b3f4
InvertRect 0x0 0x466964 0x663f8 0x5b3f8
GetMenuCheckMarkDimensions 0x0 0x466968 0x663fc 0x5b3fc
RegisterClipboardFormatA 0x0 0x46696c 0x66400 0x5b400
CloseClipboard 0x0 0x466970 0x66404 0x5b404
EmptyClipboard 0x0 0x466974 0x66408 0x5b408
OpenClipboard 0x0 0x466978 0x6640c 0x5b40c
IsClipboardFormatAvailable 0x0 0x46697c 0x66410 0x5b410
GetClipboardData 0x0 0x466980 0x66414 0x5b414
SetClipboardData 0x0 0x466984 0x66418 0x5b418
HiliteMenuItem 0x0 0x466988 0x6641c 0x5b41c
GetMenuState 0x0 0x46698c 0x66420 0x5b420
GetMenuItemID 0x0 0x466990 0x66424 0x5b424
DeleteMenu 0x0 0x466994 0x66428 0x5b428
DrawMenuBar 0x0 0x466998 0x6642c 0x5b42c
EqualRect 0x0 0x46699c 0x66430 0x5b430
UnionRect 0x0 0x4669a0 0x66434 0x5b434
GetDesktopWindow 0x0 0x4669a4 0x66438 0x5b438
GetMessagePos 0x0 0x4669a8 0x6643c 0x5b43c
GetMessageTime 0x0 0x4669ac 0x66440 0x5b440
SetParent 0x0 0x4669b0 0x66444 0x5b444
GetClassInfoA 0x0 0x4669b4 0x66448 0x5b448
SetWindowPos 0x0 0x4669b8 0x6644c 0x5b44c
MessageBoxA 0x0 0x4669bc 0x66450 0x5b450
DialogBoxParamA 0x0 0x4669c0 0x66454 0x5b454
BringWindowToTop 0x0 0x4669c4 0x66458 0x5b458
OffsetRect 0x0 0x4669c8 0x6645c 0x5b45c
GetCaretBlinkTime 0x0 0x4669cc 0x66460 0x5b460
SetTimer 0x0 0x4669d0 0x66464 0x5b464
MessageBeep 0x0 0x4669d4 0x66468 0x5b468
WinHelpA 0x0 0x4669d8 0x6646c 0x5b46c
CreateDialogParamA 0x0 0x4669dc 0x66470 0x5b470
SendMessageA 0x0 0x4669e0 0x66474 0x5b474
GetAsyncKeyState 0x0 0x4669e4 0x66478 0x5b478
EnableWindow 0x0 0x4669e8 0x6647c 0x5b47c
GetScrollPos 0x0 0x4669ec 0x66480 0x5b480
GetScrollRange 0x0 0x4669f0 0x66484 0x5b484
SetScrollPos 0x0 0x4669f4 0x66488 0x5b488
SetCursor 0x0 0x4669f8 0x6648c 0x5b48c
PtInRect 0x0 0x4669fc 0x66490 0x5b490
ShowCursor 0x0 0x466a00 0x66494 0x5b494
IsWindowVisible 0x0 0x466a04 0x66498 0x5b498
GetMenuItemCount 0x0 0x466a08 0x6649c 0x5b49c
LoadStringA 0x0 0x466a0c 0x664a0 0x5b4a0
IsWindowUnicode 0x0 0x466a10 0x664a4 0x5b4a4
UpdateWindow 0x0 0x466a14 0x664a8 0x5b4a8
GetMenu 0x0 0x466a18 0x664ac 0x5b4ac
FindWindowA 0x0 0x466a1c 0x664b0 0x5b4b0
GetKeyState 0x0 0x466a20 0x664b4 0x5b4b4
PeekMessageA 0x0 0x466a24 0x664b8 0x5b4b8
KillTimer 0x0 0x466a28 0x664bc 0x5b4bc
DefWindowProcA 0x0 0x466a2c 0x664c0 0x5b4c0
LoadIconA 0x0 0x466a30 0x664c4 0x5b4c4
LoadCursorA 0x0 0x466a34 0x664c8 0x5b4c8
IsDialogMessageA 0x0 0x466a38 0x664cc 0x5b4cc
GetFocus 0x0 0x466a3c 0x664d0 0x5b4d0
BeginPaint 0x0 0x466a40 0x664d4 0x5b4d4
EndPaint 0x0 0x466a44 0x664d8 0x5b4d8
ScreenToClient 0x0 0x466a48 0x664dc 0x5b4dc
SetRect 0x0 0x466a4c 0x664e0 0x5b4e0
FillRect 0x0 0x466a50 0x664e4 0x5b4e4
IntersectRect 0x0 0x466a54 0x664e8 0x5b4e8
CopyRect 0x0 0x466a58 0x664ec 0x5b4ec
SetWindowLongA 0x0 0x466a5c 0x664f0 0x5b4f0
MoveWindow 0x0 0x466a60 0x664f4 0x5b4f4
DestroyWindow 0x0 0x466a64 0x664f8 0x5b4f8
CheckMenuItem 0x0 0x466a68 0x664fc 0x5b4fc
SetRectEmpty 0x0 0x466a6c 0x66500 0x5b500
RemoveMenu 0x0 0x466a70 0x66504 0x5b504
GetSubMenu 0x0 0x466a74 0x66508 0x5b508
CreateMenu 0x0 0x466a78 0x6650c 0x5b50c
EnableMenuItem 0x0 0x466a7c 0x66510 0x5b510
GetMenuStringA 0x0 0x466a80 0x66514 0x5b514
ModifyMenuA 0x0 0x466a84 0x66518 0x5b518
InsertMenuA 0x0 0x466a88 0x6651c 0x5b51c
GetParent 0x0 0x466a8c 0x66520 0x5b520
TranslateMessage 0x0 0x466a90 0x66524 0x5b524
SetForegroundWindow 0x0 0x466a94 0x66528 0x5b528
SetFocus 0x0 0x466a98 0x6652c 0x5b52c
PostQuitMessage 0x0 0x466a9c 0x66530 0x5b530
PostMessageA 0x0 0x466aa0 0x66534 0x5b534
CreateWindowExA 0x0 0x466aa4 0x66538 0x5b538
RegisterClassA 0x0 0x466aa8 0x6653c 0x5b53c
GetDC 0x0 0x466aac 0x66540 0x5b540
LoadMenuA 0x0 0x466ab0 0x66544 0x5b544
IsIconic 0x0 0x466ab4 0x66548 0x5b548
GetWindowLongA 0x0 0x466ab8 0x6654c 0x5b54c
ClientToScreen 0x0 0x466abc 0x66550 0x5b550
GetWindowRect 0x0 0x466ac0 0x66554 0x5b554
GetClassNameA 0x0 0x466ac4 0x66558 0x5b558
DestroyMenu 0x0 0x466ac8 0x6655c 0x5b55c
IsRectEmpty 0x0 0x466acc 0x66560 0x5b560
IsWindow 0x0 0x466ad0 0x66564 0x5b564
ShowWindow 0x0 0x466ad4 0x66568 0x5b568
LoadBitmapA 0x0 0x466ad8 0x6656c 0x5b56c
GetSysColor 0x0 0x466adc 0x66570 0x5b570
GetDlgItem 0x0 0x466ae0 0x66574 0x5b574
GetClientRect 0x0 0x466ae4 0x66578 0x5b578
DrawTextA 0x0 0x466ae8 0x6657c 0x5b57c
wsprintfA 0x0 0x466aec 0x66580 0x5b580
GetSystemMetrics 0x0 0x466af0 0x66584 0x5b584
GetWindowDC 0x0 0x466af4 0x66588 0x5b588
ReleaseDC 0x0 0x466af8 0x6658c 0x5b58c
EndDialog 0x0 0x466afc 0x66590 0x5b590
InflateRect 0x0 0x466b00 0x66594 0x5b594
GetCursorPos 0x0 0x466b04 0x66598 0x5b598
GetActiveWindow 0x0 0x466b08 0x6659c 0x5b59c
GDI32.dll (69)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateCompatibleBitmap 0x0 0x466640 0x660d4 0x5b0d4
CreateFontIndirectA 0x0 0x466644 0x660d8 0x5b0d8
LineTo 0x0 0x466648 0x660dc 0x5b0dc
SetBkMode 0x0 0x46664c 0x660e0 0x5b0e0
GetStockObject 0x0 0x466650 0x660e4 0x5b0e4
CreatePen 0x0 0x466654 0x660e8 0x5b0e8
MoveToEx 0x0 0x466658 0x660ec 0x5b0ec
BitBlt 0x0 0x46665c 0x660f0 0x5b0f0
DeleteMetaFile 0x0 0x466660 0x660f4 0x5b0f4
GetObjectA 0x0 0x466664 0x660f8 0x5b0f8
GetDeviceCaps 0x0 0x466668 0x660fc 0x5b0fc
SetBkColor 0x0 0x46666c 0x66100 0x5b100
CopyMetaFileA 0x0 0x466670 0x66104 0x5b104
PatBlt 0x0 0x466674 0x66108 0x5b108
CreatePatternBrush 0x0 0x466678 0x6610c 0x5b10c
SetTextColor 0x0 0x46667c 0x66110 0x5b110
PtVisible 0x0 0x466680 0x66114 0x5b114
GetTextFaceA 0x0 0x466684 0x66118 0x5b118
CreateBitmap 0x0 0x466688 0x6611c 0x5b11c
ExtTextOutA 0x0 0x46668c 0x66120 0x5b120
SetMapMode 0x0 0x466690 0x66124 0x5b124
CreateFontA 0x0 0x466694 0x66128 0x5b128
GetCharWidthA 0x0 0x466698 0x6612c 0x5b12c
GetCharWidth32A 0x0 0x46669c 0x66130 0x5b130
GetMapMode 0x0 0x4666a0 0x66134 0x5b134
GetCharWidth32W 0x0 0x4666a4 0x66138 0x5b138
GetBitmapBits 0x0 0x4666a8 0x6613c 0x5b13c
GetCharWidthW 0x0 0x4666ac 0x66140 0x5b140
TextOutW 0x0 0x4666b0 0x66144 0x5b144
SetTextAlign 0x0 0x4666b4 0x66148 0x5b148
TextOutA 0x0 0x4666b8 0x6614c 0x5b14c
Escape 0x0 0x4666bc 0x66150 0x5b150
CreateICA 0x0 0x4666c0 0x66154 0x5b154
GetTextMetricsA 0x0 0x4666c4 0x66158 0x5b158
EnumFontFamiliesExA 0x0 0x4666c8 0x6615c 0x5b15c
CreateSolidBrush 0x0 0x4666cc 0x66160 0x5b160
EnumFontsA 0x0 0x4666d0 0x66164 0x5b164
SelectClipRgn 0x0 0x4666d4 0x66168 0x5b168
SetRectRgn 0x0 0x4666d8 0x6616c 0x5b16c
CreateRectRgn 0x0 0x4666dc 0x66170 0x5b170
GetClipBox 0x0 0x4666e0 0x66174 0x5b174
RectVisible 0x0 0x4666e4 0x66178 0x5b178
CreateRectRgnIndirect 0x0 0x4666e8 0x6617c 0x5b17c
Ellipse 0x0 0x4666ec 0x66180 0x5b180
Polygon 0x0 0x4666f0 0x66184 0x5b184
SetROP2 0x0 0x4666f4 0x66188 0x5b188
SetMapperFlags 0x0 0x4666f8 0x6618c 0x5b18c
ExtTextOutW 0x0 0x4666fc 0x66190 0x5b190
Arc 0x0 0x466700 0x66194 0x5b194
SetWindowExtEx 0x0 0x466704 0x66198 0x5b198
SetWindowOrgEx 0x0 0x466708 0x6619c 0x5b19c
GetTextExtentPoint32A 0x0 0x46670c 0x661a0 0x5b1a0
CloseMetaFile 0x0 0x466710 0x661a4 0x5b1a4
RestoreDC 0x0 0x466714 0x661a8 0x5b1a8
CreateMetaFileA 0x0 0x466718 0x661ac 0x5b1ac
SaveDC 0x0 0x46671c 0x661b0 0x5b1b0
StretchBlt 0x0 0x466720 0x661b4 0x5b1b4
EnumMetaFile 0x0 0x466724 0x661b8 0x5b1b8
PlayMetaFile 0x0 0x466728 0x661bc 0x5b1bc
SetViewportExtEx 0x0 0x46672c 0x661c0 0x5b1c0
SetStretchBltMode 0x0 0x466730 0x661c4 0x5b1c4
FillRgn 0x0 0x466734 0x661c8 0x5b1c8
CombineRgn 0x0 0x466738 0x661cc 0x5b1cc
GetMetaFileBitsEx 0x0 0x46673c 0x661d0 0x5b1d0
Rectangle 0x0 0x466740 0x661d4 0x5b1d4
DeleteDC 0x0 0x466744 0x661d8 0x5b1d8
CreateCompatibleDC 0x0 0x466748 0x661dc 0x5b1dc
DeleteObject 0x0 0x46674c 0x661e0 0x5b1e0
SelectObject 0x0 0x466750 0x661e4 0x5b1e4
ADVAPI32.dll (10)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegEnumKeyExA 0x0 0x46660c 0x660a0 0x5b0a0
RegEnumValueA 0x0 0x466610 0x660a4 0x5b0a4
RegCloseKey 0x0 0x466614 0x660a8 0x5b0a8
RegQueryValueExA 0x0 0x466618 0x660ac 0x5b0ac
RegOpenKeyExA 0x0 0x46661c 0x660b0 0x5b0b0
RegCreateKeyExA 0x0 0x466620 0x660b4 0x5b0b4
RegQueryInfoKeyA 0x0 0x466624 0x660b8 0x5b0b8
RegSetValueExA 0x0 0x466628 0x660bc 0x5b0bc
RegDeleteKeyA 0x0 0x46662c 0x660c0 0x5b0c0
RegOpenKeyA 0x0 0x466630 0x660c4 0x5b0c4
ole32.dll (25)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateDataAdviseHolder 0x0 0x466b10 0x665a4 0x5b5a4
StgCreateDocfileOnILockBytes 0x0 0x466b14 0x665a8 0x5b5a8
CreateILockBytesOnHGlobal 0x0 0x466b18 0x665ac 0x5b5ac
GetHGlobalFromILockBytes 0x0 0x466b1c 0x665b0 0x5b5b0
CoDisconnectObject 0x0 0x466b20 0x665b4 0x5b5b4
CoLockObjectExternal 0x0 0x466b24 0x665b8 0x5b5b8
OleUninitialize 0x0 0x466b28 0x665bc 0x5b5bc
CoRegisterMessageFilter 0x0 0x466b2c 0x665c0 0x5b5c0
CoRevokeClassObject 0x0 0x466b30 0x665c4 0x5b5c4
CoRegisterClassObject 0x0 0x466b34 0x665c8 0x5b5c8
OleInitialize 0x0 0x466b38 0x665cc 0x5b5cc
CreateOleAdviseHolder 0x0 0x466b3c 0x665d0 0x5b5d0
OleRegEnumFormatEtc 0x0 0x466b40 0x665d4 0x5b5d4
ReleaseStgMedium 0x0 0x466b44 0x665d8 0x5b5d8
WriteFmtUserTypeStg 0x0 0x466b48 0x665dc 0x5b5dc
OleTranslateAccelerator 0x0 0x466b4c 0x665e0 0x5b5e0
OleCreateMenuDescriptor 0x0 0x466b50 0x665e4 0x5b5e4
OleDestroyMenuDescriptor 0x0 0x466b54 0x665e8 0x5b5e8
GetRunningObjectTable 0x0 0x466b58 0x665ec 0x5b5ec
CoGetMalloc 0x0 0x466b5c 0x665f0 0x5b5f0
OleDuplicateData 0x0 0x466b60 0x665f4 0x5b5f4
OleGetClipboard 0x0 0x466b64 0x665f8 0x5b5f8
WriteClassStg 0x0 0x466b68 0x665fc 0x5b5fc
OleFlushClipboard 0x0 0x466b6c 0x66600 0x5b600
OleSetClipboard 0x0 0x466b70 0x66604 0x5b604
SHELL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DragAcceptFiles 0x0 0x4668d0 0x66364 0x5b364
COMCTL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x466638 0x660cc 0x5b0cc
Exports (14)
»
Api name EAT Address Ordinal
AboutMathType 0x401000 0x1
EqnFrameWinProc 0x40eae0 0x2
FMDFontListEnum 0x421294 0x3
FMDFontProtoEnum 0x421f18 0x4
FltToolbarWinProc 0x44a167 0x5
MFEnumFunc 0x42e7fd 0x6
MainWinProc 0x40e703 0x7
MtInsituWndProc 0x408d6e 0x8
ParamDlgProc 0x41aaa3 0x9
PopupMenuWinProc 0x449119 0xa
SizeDlgProc 0x41e194 0xb
StyleDefDlogProc 0x419e60 0xc
StyleOtherDlgProc 0x41dd2a 0xd
ZoomDlgProc 0x41e5c7 0xe
Icons (1)
»
Digital Signatures (2)
»
Signature Properties
LegalCopyright Copyright © Design Science, Inc. 1990-2000
InternalName Equation Editor
FileVersion 00110900
CompanyName Design Science, Inc.
ProductName Microsoft Equation Editor
ProductVersion 3.1
FileDescription Microsoft Equation Editor
OriginalFilename EQNEDT32.EXE
Signature verification True
Certificate: VeriSign Time Stamping Service
»
Certificate Properties
Issued by VeriSign, Inc.
Valid from 2001-02-28 00:00
Valid to 2004-01-06 23:59
Algorithm MD5 with RSA Encryption
Serial number 87 A6 D5 C6 F6 29 34 FB AC 4F D4 3E 11 41 89 D
Issuer Certificate: VeriSign, Inc.
»
Certificate Properties
Issued by VeriSign, Inc.
Valid from 1997-05-12 00:00
Valid to 2004-01-07 23:59
Algorithm MD5 with RSA Encryption
Serial number 4A 19 D2 38 8C 82 59 1C A5 5D 73 5F 15 5D DC A3
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2002-05-25 00:55
Valid to 2003-11-25 01:05
Algorithm SHA-1 with RSA Encryption
Serial number 61 07 11 43 00 00 00 00 00 34
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 2000-12-10 08:00
Valid to 2005-11-12 08:00
Algorithm MD5 with RSA Encryption
Serial number 6A 0B 99 4F C0 00 DE AA 11 D4 D8 40 9A A8 BE E6
Issuer Certificate: Microsoft Root Authority
»
Certificate Properties
Issued by Microsoft Root Authority
Valid from 1997-01-10 07:00
Valid to 2020-12-31 07:00
Algorithm MD5 with RSA Encryption
Serial number C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
c:\program files\common files\microsoft shared\equation\eqnedt32.exe, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.exe (Modified File)
c:\program files\common files\microsoft shared\equation\eqnedt32.exe.[sepsis@protonmail.com].sepsis (Created File)
Size 530.75 KB
Hash Values MD5: 5b61ee119abfba50caf9100f8b687924
SHA1: 7001057ce7fd9edf64caf1ffc09345fdb43e7205
SHA256: 436f592ba523b6fbd9a355d227e1888f9fdcc27692f3874c3dfd8720470843c2
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.exe.manifest
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.exe.manifest (Modified File)
Size 0.55 KB
Hash Values MD5: 0b62cc4ea7d04f52dce02f386bf96712
SHA1: e1062f7bfb53a6be9949c6b51384068c07251369
SHA256: 7b06b9fa9c8063bf62a3851ba8b89b30e157dd98f14c1c6ecdc430c84f834df3
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.exe.manifest, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.exe.manifest (Modified File)
c:\program files\common files\microsoft shared\equation\eqnedt32.exe.manifest.[sepsis@protonmail.com].sepsis (Created File)
Size 0.73 KB
Hash Values MD5: 0194439975cb83f3c5216d7ad3f7babe
SHA1: 277bc16091bd3db68b0c9a858f9c3e5b1234511c
SHA256: 35c13133831490c8f803447c90b44094a659416186f898448e6130e4a5f8962a
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.hlp
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.hlp (Modified File)
Size 172.18 KB
Hash Values MD5: e59fbd1656036dfbd76c4392a56d3b8a
SHA1: 54d3c638053bf5a6584430881aad67cf3ae78aac
SHA256: 52454f03fc9f71121a5d0a1c87a4d492f2c5819acc5c32448cc5c7e5ee801fe0
Actions
c:\program files\common files\microsoft shared\equation\eqnedt32.hlp, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\eqnedt32.hlp (Modified File)
c:\program files\common files\microsoft shared\equation\eqnedt32.hlp.[sepsis@protonmail.com].sepsis (Created File)
Size 172.35 KB
Hash Values MD5: 9dc9a598750e702b78db22642270e816
SHA1: 50898393625d36d392fdc60fc69d3196d8db9635
SHA256: 8f39dccb819276c7b8671ebcf15bb236f6630bc80a3c5ea2196876f96a21d259
Actions
c:\program files\common files\microsoft shared\equation\mtextra.ttf
»
File Properties
Names c:\program files\common files\microsoft shared\equation\mtextra.ttf (Modified File)
Size 7.48 KB
Hash Values MD5: e269de5f63fcdedca11755947615f1fb
SHA1: f36d544ffaf7cb5112b502dab224087e9b323e38
SHA256: 6c469962f33b7222f07b8d1ae8025f177f4a5f5db3eb62fa1523f261a270991f
Actions
c:\program files\common files\microsoft shared\equation\mtextra.ttf, ...
»
File Properties
Names c:\program files\common files\microsoft shared\equation\mtextra.ttf (Modified File)
c:\program files\common files\microsoft shared\equation\mtextra.ttf.[sepsis@protonmail.com].sepsis (Created File)
Size 7.65 KB
Hash Values MD5: bcae409c119f08f9fbcba36fb1f3996d
SHA1: f16eb9b6dfc87c6f1488572f79a27b60c8dd87f4
SHA256: 1c6a5aed2a55cc4ecf1e123c9ddc5a15ff6e70e1093a50d0c2716a453555a4b8
Actions
c:\program files\common files\microsoft shared\euro\msoeuro.dll
»
File Properties
Names c:\program files\common files\microsoft shared\euro\msoeuro.dll (Modified File)
Size 31.61 KB
Hash Values MD5: 9c8947698f2569829b573b1f1c4f34d0
SHA1: 3ac471cda1cd626ebd6fe007b33b761f355eac3c
SHA256: 02a0429f14bad6963cf48ac29bac2693e073c29f34d8d13e09e772cdac46af87
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180003320
Size Of Code 0x2c00
Size Of Initialized Data 0x3a00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-11-07 13:06:14
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x2b58 0x2c00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.26
.rdata 0x180004000 0x1af0 0x1c00 0x3000 CNT_INITIALIZED_DATA, MEM_READ 4.54
.data 0x180006000 0x6e8 0x200 0x4c00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 2.54
.pdata 0x180007000 0x408 0x600 0x4e00 CNT_INITIALIZED_DATA, MEM_READ 3.01
.rsrc 0x180008000 0xc10 0xe00 0x5400 CNT_INITIALIZED_DATA, MEM_READ 3.36
.reloc 0x180009000 0x80 0x200 0x6200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 1.69
Imports (62)
»
MSVCR100.dll (22)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_wcsupr_s 0x0 0x180004000 0x50c8 0x40c8
?terminate@@YAXXZ 0x0 0x180004008 0x50d0 0x40d0
_onexit 0x0 0x180004010 0x50d8 0x40d8
_lock 0x0 0x180004018 0x50e0 0x40e0
__dllonexit 0x0 0x180004020 0x50e8 0x40e8
_unlock 0x0 0x180004028 0x50f0 0x40f0
__clean_type_info_names_internal 0x0 0x180004030 0x50f8 0x40f8
__crt_debugger_hook 0x0 0x180004038 0x5100 0x4100
__CppXcptFilter 0x0 0x180004040 0x5108 0x4108
__C_specific_handler 0x0 0x180004048 0x5110 0x4110
_amsg_exit 0x0 0x180004050 0x5118 0x4118
_encoded_null 0x0 0x180004058 0x5120 0x4120
free 0x0 0x180004060 0x5128 0x4128
_initterm_e 0x0 0x180004068 0x5130 0x4130
_initterm 0x0 0x180004070 0x5138 0x4138
_malloc_crt 0x0 0x180004078 0x5140 0x4140
memmove 0x0 0x180004080 0x5148 0x4148
??2@YAPEAX_K@Z 0x0 0x180004088 0x5150 0x4150
vswprintf_s 0x0 0x180004090 0x5158 0x4158
??3@YAXPEAX@Z 0x0 0x180004098 0x5160 0x4160
_finite 0x0 0x1800040a0 0x5168 0x4168
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1800040a8 0x5170 0x4170
KERNEL32.dll (23)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RtlCaptureContext 0x0 0x1800040b8 0x5180 0x4180
RtlLookupFunctionEntry 0x0 0x1800040c0 0x5188 0x4188
RtlVirtualUnwind 0x0 0x1800040c8 0x5190 0x4190
IsDebuggerPresent 0x0 0x1800040d0 0x5198 0x4198
SetUnhandledExceptionFilter 0x0 0x1800040d8 0x51a0 0x41a0
UnhandledExceptionFilter 0x0 0x1800040e0 0x51a8 0x41a8
GetCurrentProcess 0x0 0x1800040e8 0x51b0 0x41b0
TerminateProcess 0x0 0x1800040f0 0x51b8 0x41b8
Sleep 0x0 0x1800040f8 0x51c0 0x41c0
DecodePointer 0x0 0x180004100 0x51c8 0x41c8
EncodePointer 0x0 0x180004108 0x51d0 0x41d0
WerRegisterMemoryBlock 0x0 0x180004110 0x51d8 0x41d8
VirtualProtect 0x0 0x180004118 0x51e0 0x41e0
GetSystemTimeAsFileTime 0x0 0x180004120 0x51e8 0x41e8
GetModuleFileNameW 0x0 0x180004128 0x51f0 0x41f0
GetVersionExA 0x0 0x180004130 0x51f8 0x41f8
GetModuleFileNameA 0x0 0x180004138 0x5200 0x4200
QueryPerformanceCounter 0x0 0x180004140 0x5208 0x4208
GetProcessHeap 0x0 0x180004148 0x5210 0x4210
HeapSetInformation 0x0 0x180004150 0x5218 0x4218
GetCurrentProcessId 0x0 0x180004158 0x5220 0x4220
GetCurrentThreadId 0x0 0x180004160 0x5228 0x4228
GetTickCount 0x0 0x180004168 0x5230 0x4230
ADVAPI32.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegSetValueA 0x0 0x180004178 0x5240 0x4240
RegOpenKeyExA 0x0 0x180004180 0x5248 0x4248
RegEnumKeyA 0x0 0x180004188 0x5250 0x4250
RegDeleteKeyA 0x0 0x180004190 0x5258 0x4258
RegSetValueW 0x0 0x180004198 0x5260 0x4260
RegOpenKeyExW 0x0 0x1800041a0 0x5268 0x4268
RegEnumKeyW 0x0 0x1800041a8 0x5270 0x4270
RegDeleteKeyW 0x0 0x1800041b0 0x5278 0x4278
RegCloseKey 0x0 0x1800041b8 0x5280 0x4280
OLEAUT32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysAllocString 0x2 0x1800041c8 0x5290 0x4290
LoadRegTypeLib 0xa2 0x1800041d0 0x5298 0x4298
LoadTypeLib 0xa1 0x1800041d8 0x52a0 0x42a0
RegisterTypeLib 0xa3 0x1800041e0 0x52a8 0x42a8
UnRegisterTypeLib 0xba 0x1800041e8 0x52b0 0x42b0
VarR8FromStr 0x54 0x1800041f0 0x52b8 0x42b8
VariantInit 0x8 0x1800041f8 0x52c0 0x42c0
VariantChangeType 0xc 0x180004200 0x52c8 0x42c8
Exports (5)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x1800026d0 0x1
DllGetClassObject 0x18000263c 0x2
DllMain 0x180002710 0x3
DllRegisterServer 0x1800026e4 0x4
DllUnregisterServer 0x1800026f8 0x5
Digital Signatures (2)
»
Signature Properties
InternalName MsoEuro
FileVersion 15.0.4454.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4454.1000
FileDescription Microsoft Office Euro Converter
OriginalFilename MsoEuro.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-09-04 21:42
Valid to 2013-03-04 21:42
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 9D 1E 8D 27 AE B8 F3 D8 38 00 01 00 00 00 9D
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\euro\msoeuro.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\euro\msoeuro.dll (Modified File)
c:\program files\common files\microsoft shared\euro\msoeuro.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 31.79 KB
Hash Values MD5: b9f03b53f35e476502bd2aa3a7e2e0e7
SHA1: e9060b4c87dc940c889a04615dd023d123bea84c
SHA256: edeaff47c6510fcc1a1ac4365332bcc93254972475b617b0379ba89acf14a9ff
Actions
c:\program files\common files\microsoft shared\filters\msgfilt.dll
»
File Properties
Names c:\program files\common files\microsoft shared\filters\msgfilt.dll (Modified File)
Size 39.12 KB
Hash Values MD5: c93e3219fe53ed2d5313c78581cbda28
SHA1: 157f92c567a59463dbba28af4b48375851640c8d
SHA256: e1c1d2a6478f9b34c00be31e7b36257917553bc1669ad0402b653eff928d3316
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180004f24
Size Of Code 0x4800
Size Of Initialized Data 0x3c00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:35:37
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x47ac 0x4800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.16
.rdata 0x180006000 0x21e4 0x2200 0x4c00 CNT_INITIALIZED_DATA, MEM_READ 4.01
.data 0x180009000 0x908 0x400 0x6e00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.26
.pdata 0x18000a000 0x60c 0x800 0x7200 CNT_INITIALIZED_DATA, MEM_READ 3.4
.rsrc 0x18000b000 0x498 0x600 0x7a00 CNT_INITIALIZED_DATA, MEM_READ 2.68
.reloc 0x18000c000 0xec 0x200 0x8000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 3.03
Imports (73)
»
MSVCR100.dll (26)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x180006000 0x75d0 0x61d0
?terminate@@YAXXZ 0x0 0x180006008 0x75d8 0x61d8
_onexit 0x0 0x180006010 0x75e0 0x61e0
_lock 0x0 0x180006018 0x75e8 0x61e8
__dllonexit 0x0 0x180006020 0x75f0 0x61f0
_unlock 0x0 0x180006028 0x75f8 0x61f8
__clean_type_info_names_internal 0x0 0x180006030 0x7600 0x6200
__crt_debugger_hook 0x0 0x180006038 0x7608 0x6208
__CppXcptFilter 0x0 0x180006040 0x7610 0x6210
__C_specific_handler 0x0 0x180006048 0x7618 0x6218
_amsg_exit 0x0 0x180006050 0x7620 0x6220
_encoded_null 0x0 0x180006058 0x7628 0x6228
free 0x0 0x180006060 0x7630 0x6230
_initterm_e 0x0 0x180006068 0x7638 0x6238
_initterm 0x0 0x180006070 0x7640 0x6240
_malloc_crt 0x0 0x180006078 0x7648 0x6248
vswprintf_s 0x0 0x180006080 0x7650 0x6250
memset 0x0 0x180006088 0x7658 0x6258
memcpy 0x0 0x180006090 0x7660 0x6260
??_V@YAXPEAX@Z 0x0 0x180006098 0x7668 0x6268
??_U@YAPEAX_K@Z 0x0 0x1800060a0 0x7670 0x6270
wcsstr 0x0 0x1800060a8 0x7678 0x6278
wcsncmp 0x0 0x1800060b0 0x7680 0x6280
_CxxThrowException 0x0 0x1800060b8 0x7688 0x6288
??3@YAXPEAX@Z 0x0 0x1800060c0 0x7690 0x6290
??2@YAPEAX_K@Z 0x0 0x1800060c8 0x7698 0x6298
KERNEL32.dll (35)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DisableThreadLibraryCalls 0x0 0x1800060d8 0x76a8 0x62a8
RtlCaptureContext 0x0 0x1800060e0 0x76b0 0x62b0
RtlLookupFunctionEntry 0x0 0x1800060e8 0x76b8 0x62b8
RtlVirtualUnwind 0x0 0x1800060f0 0x76c0 0x62c0
IsDebuggerPresent 0x0 0x1800060f8 0x76c8 0x62c8
SetUnhandledExceptionFilter 0x0 0x180006100 0x76d0 0x62d0
UnhandledExceptionFilter 0x0 0x180006108 0x76d8 0x62d8
DecodePointer 0x0 0x180006110 0x76e0 0x62e0
EncodePointer 0x0 0x180006118 0x76e8 0x62e8
LoadLibraryExW 0x0 0x180006120 0x76f0 0x62f0
GetProcAddress 0x0 0x180006128 0x76f8 0x62f8
GetModuleHandleW 0x0 0x180006130 0x7700 0x6300
GetModuleFileNameW 0x0 0x180006138 0x7708 0x6308
HeapFree 0x0 0x180006140 0x7710 0x6310
HeapAlloc 0x0 0x180006148 0x7718 0x6318
WerRegisterMemoryBlock 0x0 0x180006150 0x7720 0x6320
VirtualProtect 0x0 0x180006158 0x7728 0x6328
GetTickCount 0x0 0x180006160 0x7730 0x6330
GetSystemTimeAsFileTime 0x0 0x180006168 0x7738 0x6338
Sleep 0x0 0x180006170 0x7740 0x6340
CreateFileW 0x0 0x180006178 0x7748 0x6348
DeleteFileW 0x0 0x180006180 0x7750 0x6350
GetTempFileNameW 0x0 0x180006188 0x7758 0x6358
WriteFile 0x0 0x180006190 0x7760 0x6360
GetTempPathW 0x0 0x180006198 0x7768 0x6368
CloseHandle 0x0 0x1800061a0 0x7770 0x6370
GetLastError 0x0 0x1800061a8 0x7778 0x6378
GetCurrentProcess 0x0 0x1800061b0 0x7780 0x6380
TerminateProcess 0x0 0x1800061b8 0x7788 0x6388
MultiByteToWideChar 0x0 0x1800061c0 0x7790 0x6390
QueryPerformanceCounter 0x0 0x1800061c8 0x7798 0x6398
GetCurrentThreadId 0x0 0x1800061d0 0x77a0 0x63a0
HeapSetInformation 0x0 0x1800061d8 0x77a8 0x63a8
GetCurrentProcessId 0x0 0x1800061e0 0x77b0 0x63b0
GetProcessHeap 0x0 0x1800061e8 0x77b8 0x63b8
ADVAPI32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
ReportEventW 0x0 0x1800061f8 0x77c8 0x63c8
RegisterEventSourceW 0x0 0x180006200 0x77d0 0x63d0
DeregisterEventSource 0x0 0x180006208 0x77d8 0x63d8
RegQueryValueExW 0x0 0x180006210 0x77e0 0x63e0
RegOpenKeyExW 0x0 0x180006218 0x77e8 0x63e8
RegCloseKey 0x0 0x180006220 0x77f0 0x63f0
ole32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoTaskMemFree 0x0 0x180006230 0x7800 0x6400
StgOpenStorageOnILockBytes 0x0 0x180006238 0x7808 0x6408
StgOpenStorage 0x0 0x180006240 0x7810 0x6410
CLSIDFromString 0x0 0x180006248 0x7818 0x6418
CoCreateInstance 0x0 0x180006250 0x7820 0x6420
CoTaskMemAlloc 0x0 0x180006258 0x7828 0x6428
Exports (4)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180001e5c 0x1
DllGetClassObject 0x180001d8c 0x2
DllRegisterServer 0x180001e80 0x3
DllUnregisterServer 0x180001e80 0x4
Digital Signatures (2)
»
Signature Properties
InternalName Microsoft Message IFilter
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Message IFilter
OriginalFilename msgfilt.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\filters\msgfilt.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\filters\msgfilt.dll (Modified File)
c:\program files\common files\microsoft shared\filters\msgfilt.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 39.30 KB
Hash Values MD5: 2afb39ab896ddcb4c51fe2e75c6cecbd
SHA1: b3511398b7395c490924589ee255b04f1a50e205
SHA256: 163996e0c5a32e04f2ecbbdd474f53eca8ea0596ad77dffef41b9db4aa8605d4
Actions
c:\program files\common files\microsoft shared\filters\odffilt.dll
»
File Properties
Names c:\program files\common files\microsoft shared\filters\odffilt.dll (Modified File)
Size 940.66 KB
Hash Values MD5: 6c945b72dd789c42b63d57a2865ccaeb
SHA1: 7e176b93cfdd9eed36a7849139dac85520e9ba3e
SHA256: c3d94190de397ecaa4000431b3a2a4fb38adba1b2bb13eb540604b8e42ec4343
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18001a464
Size Of Code 0x94600
Size Of Initialized Data 0x54e00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:34:53
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x945e4 0x94600 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.45
.rdata 0x180096000 0x408a8 0x40a00 0x94a00 CNT_INITIALIZED_DATA, MEM_READ 4.62
.data 0x1800d7000 0xa708 0xa800 0xd5400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.35
.pdata 0x1800e2000 0x7248 0x7400 0xdfc00 CNT_INITIALIZED_DATA, MEM_READ 5.75
.rsrc 0x1800ea000 0x4d8 0x600 0xe7000 CNT_INITIALIZED_DATA, MEM_READ 2.8
.reloc 0x1800eb000 0x20fc 0x2200 0xe7600 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.44
Imports (179)
»
MSVCR100.dll (60)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_wcsnicmp 0x0 0x180096000 0xc44b0 0xc2eb0
wcsncmp 0x0 0x180096008 0xc44b8 0xc2eb8
iswspace 0x0 0x180096010 0xc44c0 0xc2ec0
wcsstr 0x0 0x180096018 0xc44c8 0xc2ec8
strncpy_s 0x0 0x180096020 0xc44d0 0xc2ed0
malloc 0x0 0x180096028 0xc44d8 0xc2ed8
??0exception@std@@QEAA@AEBQEBDH@Z 0x0 0x180096030 0xc44e0 0xc2ee0
wcstol 0x0 0x180096038 0xc44e8 0xc2ee8
_snprintf_s 0x0 0x180096040 0xc44f0 0xc2ef0
srand 0x0 0x180096048 0xc44f8 0xc2ef8
rand 0x0 0x180096050 0xc4500 0xc2f00
_vsnprintf_s 0x0 0x180096058 0xc4508 0xc2f08
memcpy_s 0x0 0x180096060 0xc4510 0xc2f10
_snwprintf_s 0x0 0x180096068 0xc4518 0xc2f18
_mbschr 0x0 0x180096070 0xc4520 0xc2f20
wcsncat_s 0x0 0x180096078 0xc4528 0xc2f28
wcschr 0x0 0x180096080 0xc4530 0xc2f30
wcscmp 0x0 0x180096088 0xc4538 0xc2f38
realloc 0x0 0x180096090 0xc4540 0xc2f40
__lconv_init 0x0 0x180096098 0xc4548 0xc2f48
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1800960a0 0xc4550 0xc2f50
__clean_type_info_names_internal 0x0 0x1800960a8 0xc4558 0xc2f58
__crt_debugger_hook 0x0 0x1800960b0 0xc4560 0xc2f60
_onexit 0x0 0x1800960b8 0xc4568 0xc2f68
_lock 0x0 0x1800960c0 0xc4570 0xc2f70
__dllonexit 0x0 0x1800960c8 0xc4578 0xc2f78
_unlock 0x0 0x1800960d0 0xc4580 0xc2f80
?terminate@@YAXXZ 0x0 0x1800960d8 0xc4588 0xc2f88
__CppXcptFilter 0x0 0x1800960e0 0xc4590 0xc2f90
__C_specific_handler 0x0 0x1800960e8 0xc4598 0xc2f98
_amsg_exit 0x0 0x1800960f0 0xc45a0 0xc2fa0
_encoded_null 0x0 0x1800960f8 0xc45a8 0xc2fa8
free 0x0 0x180096100 0xc45b0 0xc2fb0
_initterm_e 0x0 0x180096108 0xc45b8 0xc2fb8
_initterm 0x0 0x180096110 0xc45c0 0xc2fc0
_malloc_crt 0x0 0x180096118 0xc45c8 0xc2fc8
vswprintf_s 0x0 0x180096120 0xc45d0 0xc2fd0
strstr 0x0 0x180096128 0xc45d8 0xc2fd8
wcsrchr 0x0 0x180096130 0xc45e0 0xc2fe0
_wtoi 0x0 0x180096138 0xc45e8 0xc2fe8
wcscpy_s 0x0 0x180096140 0xc45f0 0xc2ff0
memset 0x0 0x180096148 0xc45f8 0xc2ff8
memcpy 0x0 0x180096150 0xc4600 0xc3000
__RTDynamicCast 0x0 0x180096158 0xc4608 0xc3008
?what@exception@std@@UEBAPEBDXZ 0x0 0x180096160 0xc4610 0xc3010
??1exception@std@@UEAA@XZ 0x0 0x180096168 0xc4618 0xc3018
??0exception@std@@QEAA@AEBV01@@Z 0x0 0x180096170 0xc4620 0xc3020
??0exception@std@@QEAA@AEBQEBD@Z 0x0 0x180096178 0xc4628 0xc3028
??_U@YAPEAX_K@Z 0x0 0x180096180 0xc4630 0xc3030
?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z 0x0 0x180096188 0xc4638 0xc3038
wcsncpy_s 0x0 0x180096190 0xc4640 0xc3040
memmove 0x0 0x180096198 0xc4648 0xc3048
_invalid_parameter_noinfo_noreturn 0x0 0x1800961a0 0xc4650 0xc3050
_CxxThrowException 0x0 0x1800961a8 0xc4658 0xc3058
??2@YAPEAX_K@Z 0x0 0x1800961b0 0xc4660 0xc3060
__CxxFrameHandler3 0x0 0x1800961b8 0xc4668 0xc3068
??_V@YAXPEAX@Z 0x0 0x1800961c0 0xc4670 0xc3070
memcmp 0x0 0x1800961c8 0xc4678 0xc3078
_vscwprintf 0x0 0x1800961d0 0xc4680 0xc3080
??3@YAXPEAX@Z 0x0 0x1800961d8 0xc4688 0xc3088
MSVCP100.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x1800961e8 0xc4698 0xc3098
?_Xout_of_range@std@@YAXPEBD@Z 0x0 0x1800961f0 0xc46a0 0xc30a0
ADVAPI32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegQueryValueExW 0x0 0x180096200 0xc46b0 0xc30b0
RegOpenKeyExW 0x0 0x180096208 0xc46b8 0xc30b8
RegCloseKey 0x0 0x180096210 0xc46c0 0xc30c0
ReportEventW 0x0 0x180096218 0xc46c8 0xc30c8
RegisterEventSourceW 0x0 0x180096220 0xc46d0 0xc30d0
DeregisterEventSource 0x0 0x180096228 0xc46d8 0xc30d8
KERNEL32.dll (92)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetShortPathNameW 0x0 0x180096238 0xc46e8 0xc30e8
GetLongPathNameW 0x0 0x180096240 0xc46f0 0xc30f0
GetTempPathW 0x0 0x180096248 0xc46f8 0xc30f8
GetTempFileNameW 0x0 0x180096250 0xc4700 0xc3100
DeleteFileW 0x0 0x180096258 0xc4708 0xc3108
GetFileType 0x0 0x180096260 0xc4710 0xc3110
GetFileSizeEx 0x0 0x180096268 0xc4718 0xc3118
CreateFileW 0x0 0x180096270 0xc4720 0xc3120
RaiseException 0x0 0x180096278 0xc4728 0xc3128
SwitchToThread 0x0 0x180096280 0xc4730 0xc3130
CompareStringW 0x0 0x180096288 0xc4738 0xc3138
lstrlenA 0x0 0x180096290 0xc4740 0xc3140
lstrlenW 0x0 0x180096298 0xc4748 0xc3148
LocalAlloc 0x0 0x1800962a0 0xc4750 0xc3150
FreeLibrary 0x0 0x1800962a8 0xc4758 0xc3158
InitializeCriticalSection 0x0 0x1800962b0 0xc4760 0xc3160
EnterCriticalSection 0x0 0x1800962b8 0xc4768 0xc3168
LeaveCriticalSection 0x0 0x1800962c0 0xc4770 0xc3170
DeleteCriticalSection 0x0 0x1800962c8 0xc4778 0xc3178
GetFileAttributesW 0x0 0x1800962d0 0xc4780 0xc3180
SetLastError 0x0 0x1800962d8 0xc4788 0xc3188
WideCharToMultiByte 0x0 0x1800962e0 0xc4790 0xc3190
SystemTimeToFileTime 0x0 0x1800962e8 0xc4798 0xc3198
GetLastError 0x0 0x1800962f0 0xc47a0 0xc31a0
GlobalAlloc 0x0 0x1800962f8 0xc47a8 0xc31a8
GlobalLock 0x0 0x180096300 0xc47b0 0xc31b0
GlobalUnlock 0x0 0x180096308 0xc47b8 0xc31b8
GlobalFree 0x0 0x180096310 0xc47c0 0xc31c0
lstrcmpiW 0x0 0x180096318 0xc47c8 0xc31c8
lstrcmpW 0x0 0x180096320 0xc47d0 0xc31d0
QueryPerformanceCounter 0x0 0x180096328 0xc47d8 0xc31d8
GetProcessHeap 0x0 0x180096330 0xc47e0 0xc31e0
LoadLibraryA 0x0 0x180096338 0xc47e8 0xc31e8
GetCurrentProcessId 0x0 0x180096340 0xc47f0 0xc31f0
GetCurrentThreadId 0x0 0x180096348 0xc47f8 0xc31f8
GetSystemTimeAsFileTime 0x0 0x180096350 0xc4800 0xc3200
GetTickCount 0x0 0x180096358 0xc4808 0xc3208
VirtualProtect 0x0 0x180096360 0xc4810 0xc3210
WerRegisterMemoryBlock 0x0 0x180096368 0xc4818 0xc3218
HeapAlloc 0x0 0x180096370 0xc4820 0xc3220
HeapFree 0x0 0x180096378 0xc4828 0xc3228
GetModuleFileNameW 0x0 0x180096380 0xc4830 0xc3230
GetModuleHandleW 0x0 0x180096388 0xc4838 0xc3238
GetProcAddress 0x0 0x180096390 0xc4840 0xc3240
LoadLibraryExW 0x0 0x180096398 0xc4848 0xc3248
EncodePointer 0x0 0x1800963a0 0xc4850 0xc3250
DecodePointer 0x0 0x1800963a8 0xc4858 0xc3258
Sleep 0x0 0x1800963b0 0xc4860 0xc3260
TerminateProcess 0x0 0x1800963b8 0xc4868 0xc3268
GetCurrentProcess 0x0 0x1800963c0 0xc4870 0xc3270
UnhandledExceptionFilter 0x0 0x1800963c8 0xc4878 0xc3278
SetUnhandledExceptionFilter 0x0 0x1800963d0 0xc4880 0xc3280
IsDebuggerPresent 0x0 0x1800963d8 0xc4888 0xc3288
RtlVirtualUnwind 0x0 0x1800963e0 0xc4890 0xc3290
RtlLookupFunctionEntry 0x0 0x1800963e8 0xc4898 0xc3298
RtlCaptureContext 0x0 0x1800963f0 0xc48a0 0xc32a0
TlsFree 0x0 0x1800963f8 0xc48a8 0xc32a8
TlsSetValue 0x0 0x180096400 0xc48b0 0xc32b0
TlsGetValue 0x0 0x180096408 0xc48b8 0xc32b8
TlsAlloc 0x0 0x180096410 0xc48c0 0xc32c0
FileTimeToLocalFileTime 0x0 0x180096418 0xc48c8 0xc32c8
GetNativeSystemInfo 0x0 0x180096420 0xc48d0 0xc32d0
CancelIoEx 0x0 0x180096428 0xc48d8 0xc32d8
SetFileTime 0x0 0x180096430 0xc48e0 0xc32e0
GetFileTime 0x0 0x180096438 0xc48e8 0xc32e8
FlushFileBuffers 0x0 0x180096440 0xc48f0 0xc32f0
CreateEventExW 0x0 0x180096448 0xc48f8 0xc32f8
WaitForMultipleObjectsEx 0x0 0x180096450 0xc4900 0xc3300
ResetEvent 0x0 0x180096458 0xc4908 0xc3308
WriteFile 0x0 0x180096460 0xc4910 0xc3310
SetFilePointerEx 0x0 0x180096468 0xc4918 0xc3318
SetEndOfFile 0x0 0x180096470 0xc4920 0xc3320
CreateEventW 0x0 0x180096478 0xc4928 0xc3328
DeviceIoControl 0x0 0x180096480 0xc4930 0xc3330
GetOverlappedResult 0x0 0x180096488 0xc4938 0xc3338
GetStringTypeExW 0x0 0x180096490 0xc4940 0xc3340
IsValidCodePage 0x0 0x180096498 0xc4948 0xc3348
MultiByteToWideChar 0x0 0x1800964a0 0xc4950 0xc3350
FileTimeToSystemTime 0x0 0x1800964a8 0xc4958 0xc3358
GetSystemTime 0x0 0x1800964b0 0xc4960 0xc3360
CreateSemaphoreExW 0x0 0x1800964b8 0xc4968 0xc3368
WaitForSingleObjectEx 0x0 0x1800964c0 0xc4970 0xc3370
ReleaseSemaphore 0x0 0x1800964c8 0xc4978 0xc3378
TryEnterCriticalSection 0x0 0x1800964d0 0xc4980 0xc3380
RemoveDirectoryW 0x0 0x1800964d8 0xc4988 0xc3388
ReadFile 0x0 0x1800964e0 0xc4990 0xc3390
HeapSetInformation 0x0 0x1800964e8 0xc4998 0xc3398
InitializeCriticalSectionEx 0x0 0x1800964f0 0xc49a0 0xc33a0
CloseHandle 0x0 0x1800964f8 0xc49a8 0xc33a8
GetTickCount64 0x0 0x180096500 0xc49b0 0xc33b0
CreateDirectoryW 0x0 0x180096508 0xc49b8 0xc33b8
GetFileAttributesExW 0x0 0x180096510 0xc49c0 0xc33c0
query.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
BindIFilterFromStorage 0x0 0x180096520 0xc49d0 0xc33d0
BindIFilterFromStream 0x0 0x180096528 0xc49d8 0xc33d8
ole32.dll (12)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
WriteFmtUserTypeStg 0x0 0x180096538 0xc49e8 0xc33e8
StgOpenStorageOnILockBytes 0x0 0x180096540 0xc49f0 0xc33f0
StgCreateDocfileOnILockBytes 0x0 0x180096548 0xc49f8 0xc33f8
GetConvertStg 0x0 0x180096550 0xc4a00 0xc3400
ReadClassStg 0x0 0x180096558 0xc4a08 0xc3408
StringFromGUID2 0x0 0x180096560 0xc4a10 0xc3410
CLSIDFromString 0x0 0x180096568 0xc4a18 0xc3418
CoCreateGuid 0x0 0x180096570 0xc4a20 0xc3420
CoCreateInstance 0x0 0x180096578 0xc4a28 0xc3428
CreateStreamOnHGlobal 0x0 0x180096580 0xc4a30 0xc3430
CoTaskMemFree 0x0 0x180096588 0xc4a38 0xc3438
CoTaskMemAlloc 0x0 0x180096590 0xc4a40 0xc3440
OLEAUT32.dll (5)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysStringLen 0x7 0x1800965a0 0xc4a50 0xc3450
VariantInit 0x8 0x1800965a8 0xc4a58 0xc3458
SysAllocString 0x2 0x1800965b0 0xc4a60 0xc3460
SysFreeString 0x6 0x1800965b8 0xc4a68 0xc3468
VariantClear 0x9 0x1800965c0 0xc4a70 0xc3470
Exports (2)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x1800012ac 0x1
DllGetClassObject 0x180001020 0x2
Digital Signatures (2)
»
Signature Properties
InternalName Microsoft Filter for Open Document Format
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Filter for Open Document Format
OriginalFilename odffilt.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\filters\odffilt.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\filters\odffilt.dll (Modified File)
c:\program files\common files\microsoft shared\filters\odffilt.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 940.83 KB
Hash Values MD5: ef0d4357983d69bd33bf1419ee975f1d
SHA1: bf661ac03f4b37ed94420bb4bbdf7ac837eeb03d
SHA256: e9cadc9c3a3ffb7dec58c32e0f433e90fa3c7df57e40276af79875de2f8ca2cd
Actions
c:\program files\common files\microsoft shared\filters\offfiltx.dll
»
File Properties
Names c:\program files\common files\microsoft shared\filters\offfiltx.dll (Modified File)
Size 1.12 MB
Hash Values MD5: ddb9ea671acd9c931d308c71b2643bfe
SHA1: d98492990a6c2001d1f118073d338aa13d77333c
SHA256: a4caf9011f5821070762dad99393106235b7403e9708b0a96af8ebfd31e5dfcb
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800293e0
Size Of Code 0xbb800
Size Of Initialized Data 0x62400
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:34:08
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xbb7c0 0xbb800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.48
.rdata 0x1800bd000 0x4ba20 0x4bc00 0xbbc00 CNT_INITIALIZED_DATA, MEM_READ 4.66
.data 0x180109000 0xaf68 0xb000 0x107800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.42
.pdata 0x180114000 0x88d4 0x8a00 0x112800 CNT_INITIALIZED_DATA, MEM_READ 5.8
.rsrc 0x18011d000 0x4d0 0x600 0x11b200 CNT_INITIALIZED_DATA, MEM_READ 2.82
.reloc 0x18011e000 0x2620 0x2800 0x11b800 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.42
Imports (200)
»
MSVCR100.dll (64)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
??0exception@std@@QEAA@AEBQEBD@Z 0x0 0x1800bd000 0xef5b0 0xee1b0
strncpy_s 0x0 0x1800bd008 0xef5b8 0xee1b8
wcscpy_s 0x0 0x1800bd010 0xef5c0 0xee1c0
?what@exception@std@@UEBAPEBDXZ 0x0 0x1800bd018 0xef5c8 0xee1c8
??1exception@std@@UEAA@XZ 0x0 0x1800bd020 0xef5d0 0xee1d0
??0exception@std@@QEAA@AEBV01@@Z 0x0 0x1800bd028 0xef5d8 0xee1d8
??0exception@std@@QEAA@AEBQEBDH@Z 0x0 0x1800bd030 0xef5e0 0xee1e0
strnlen 0x0 0x1800bd038 0xef5e8 0xee1e8
_vsnwprintf_s 0x0 0x1800bd040 0xef5f0 0xee1f0
_snprintf_s 0x0 0x1800bd048 0xef5f8 0xee1f8
_mbschr 0x0 0x1800bd050 0xef600 0xee200
memmove 0x0 0x1800bd058 0xef608 0xee208
wcsncat_s 0x0 0x1800bd060 0xef610 0xee210
srand 0x0 0x1800bd068 0xef618 0xee218
rand 0x0 0x1800bd070 0xef620 0xee220
_vsnprintf_s 0x0 0x1800bd078 0xef628 0xee228
_snwprintf_s 0x0 0x1800bd080 0xef630 0xee230
wcscmp 0x0 0x1800bd088 0xef638 0xee238
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1800bd090 0xef640 0xee240
__clean_type_info_names_internal 0x0 0x1800bd098 0xef648 0xee248
__crt_debugger_hook 0x0 0x1800bd0a0 0xef650 0xee250
_onexit 0x0 0x1800bd0a8 0xef658 0xee258
_lock 0x0 0x1800bd0b0 0xef660 0xee260
__dllonexit 0x0 0x1800bd0b8 0xef668 0xee268
_unlock 0x0 0x1800bd0c0 0xef670 0xee270
?terminate@@YAXXZ 0x0 0x1800bd0c8 0xef678 0xee278
__lconv_init 0x0 0x1800bd0d0 0xef680 0xee280
__C_specific_handler 0x0 0x1800bd0d8 0xef688 0xee288
_amsg_exit 0x0 0x1800bd0e0 0xef690 0xee290
_encoded_null 0x0 0x1800bd0e8 0xef698 0xee298
_initterm_e 0x0 0x1800bd0f0 0xef6a0 0xee2a0
_initterm 0x0 0x1800bd0f8 0xef6a8 0xee2a8
_malloc_crt 0x0 0x1800bd100 0xef6b0 0xee2b0
vswprintf_s 0x0 0x1800bd108 0xef6b8 0xee2b8
swprintf_s 0x0 0x1800bd110 0xef6c0 0xee2c0
wcsncpy_s 0x0 0x1800bd118 0xef6c8 0xee2c8
floor 0x0 0x1800bd120 0xef6d0 0xee2d0
_vsnwprintf 0x0 0x1800bd128 0xef6d8 0xee2d8
_wtof 0x0 0x1800bd130 0xef6e0 0xee2e0
wcstoul 0x0 0x1800bd138 0xef6e8 0xee2e8
_itow_s 0x0 0x1800bd140 0xef6f0 0xee2f0
_wcsicmp 0x0 0x1800bd148 0xef6f8 0xee2f8
wcsrchr 0x0 0x1800bd150 0xef700 0xee300
realloc 0x0 0x1800bd158 0xef708 0xee308
malloc 0x0 0x1800bd160 0xef710 0xee310
free 0x0 0x1800bd168 0xef718 0xee318
wcstol 0x0 0x1800bd170 0xef720 0xee320
__RTDynamicCast 0x0 0x1800bd178 0xef728 0xee328
memcpy_s 0x0 0x1800bd180 0xef730 0xee330
_wtoi 0x0 0x1800bd188 0xef738 0xee338
_wcsnicmp 0x0 0x1800bd190 0xef740 0xee340
wcsstr 0x0 0x1800bd198 0xef748 0xee348
wcsncmp 0x0 0x1800bd1a0 0xef750 0xee350
wcschr 0x0 0x1800bd1a8 0xef758 0xee358
_invalid_parameter_noinfo_noreturn 0x0 0x1800bd1b0 0xef760 0xee360
memset 0x0 0x1800bd1b8 0xef768 0xee368
memcmp 0x0 0x1800bd1c0 0xef770 0xee370
?_set_se_translator@@YAP6AXIPEAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z 0x0 0x1800bd1c8 0xef778 0xee378
iswspace 0x0 0x1800bd1d0 0xef780 0xee380
memcpy 0x0 0x1800bd1d8 0xef788 0xee388
__CxxFrameHandler3 0x0 0x1800bd1e0 0xef790 0xee390
__CppXcptFilter 0x0 0x1800bd1e8 0xef798 0xee398
_vscwprintf 0x0 0x1800bd1f0 0xef7a0 0xee3a0
_CxxThrowException 0x0 0x1800bd1f8 0xef7a8 0xee3a8
ADVAPI32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
ReportEventW 0x0 0x1800bd208 0xef7b8 0xee3b8
RegisterEventSourceW 0x0 0x1800bd210 0xef7c0 0xee3c0
DeregisterEventSource 0x0 0x1800bd218 0xef7c8 0xee3c8
RegSetValueExW 0x0 0x1800bd220 0xef7d0 0xee3d0
RegEnumKeyExW 0x0 0x1800bd228 0xef7d8 0xee3d8
RegDeleteValueW 0x0 0x1800bd230 0xef7e0 0xee3e0
RegDeleteKeyW 0x0 0x1800bd238 0xef7e8 0xee3e8
RegCreateKeyExW 0x0 0x1800bd240 0xef7f0 0xee3f0
RegQueryValueExW 0x0 0x1800bd248 0xef7f8 0xee3f8
RegOpenKeyExW 0x0 0x1800bd250 0xef800 0xee400
RegCloseKey 0x0 0x1800bd258 0xef808 0xee408
KERNEL32.dll (91)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetFileSizeEx 0x0 0x1800bd268 0xef818 0xee418
SwitchToThread 0x0 0x1800bd270 0xef820 0xee420
GetNativeSystemInfo 0x0 0x1800bd278 0xef828 0xee428
CancelIoEx 0x0 0x1800bd280 0xef830 0xee430
SetFileTime 0x0 0x1800bd288 0xef838 0xee438
GetFileTime 0x0 0x1800bd290 0xef840 0xee440
FlushFileBuffers 0x0 0x1800bd298 0xef848 0xee448
CreateEventExW 0x0 0x1800bd2a0 0xef850 0xee450
WaitForMultipleObjectsEx 0x0 0x1800bd2a8 0xef858 0xee458
ResetEvent 0x0 0x1800bd2b0 0xef860 0xee460
SetFilePointerEx 0x0 0x1800bd2b8 0xef868 0xee468
SetEndOfFile 0x0 0x1800bd2c0 0xef870 0xee470
CreateEventW 0x0 0x1800bd2c8 0xef878 0xee478
DeviceIoControl 0x0 0x1800bd2d0 0xef880 0xee480
GetFileType 0x0 0x1800bd2d8 0xef888 0xee488
GetLongPathNameW 0x0 0x1800bd2e0 0xef890 0xee490
GetShortPathNameW 0x0 0x1800bd2e8 0xef898 0xee498
GlobalAlloc 0x0 0x1800bd2f0 0xef8a0 0xee4a0
GlobalFree 0x0 0x1800bd2f8 0xef8a8 0xee4a8
CreateFileW 0x0 0x1800bd300 0xef8b0 0xee4b0
DeleteFileW 0x0 0x1800bd308 0xef8b8 0xee4b8
GetTempFileNameW 0x0 0x1800bd310 0xef8c0 0xee4c0
WriteFile 0x0 0x1800bd318 0xef8c8 0xee4c8
GetTempPathW 0x0 0x1800bd320 0xef8d0 0xee4d0
CloseHandle 0x0 0x1800bd328 0xef8d8 0xee4d8
GetLastError 0x0 0x1800bd330 0xef8e0 0xee4e0
GetCurrentProcess 0x0 0x1800bd338 0xef8e8 0xee4e8
TerminateProcess 0x0 0x1800bd340 0xef8f0 0xee4f0
CompareStringW 0x0 0x1800bd348 0xef8f8 0xee4f8
InitializeCriticalSection 0x0 0x1800bd350 0xef900 0xee500
EnterCriticalSection 0x0 0x1800bd358 0xef908 0xee508
LeaveCriticalSection 0x0 0x1800bd360 0xef910 0xee510
DeleteCriticalSection 0x0 0x1800bd368 0xef918 0xee518
lstrcmpiW 0x0 0x1800bd370 0xef920 0xee520
WideCharToMultiByte 0x0 0x1800bd378 0xef928 0xee528
lstrlenW 0x0 0x1800bd380 0xef930 0xee530
lstrlenA 0x0 0x1800bd388 0xef938 0xee538
MultiByteToWideChar 0x0 0x1800bd390 0xef940 0xee540
GetFileAttributesW 0x0 0x1800bd398 0xef948 0xee548
RaiseException 0x0 0x1800bd3a0 0xef950 0xee550
GetVersionExW 0x0 0x1800bd3a8 0xef958 0xee558
QueryPerformanceCounter 0x0 0x1800bd3b0 0xef960 0xee560
GetProcessHeap 0x0 0x1800bd3b8 0xef968 0xee568
HeapSetInformation 0x0 0x1800bd3c0 0xef970 0xee570
GetCurrentProcessId 0x0 0x1800bd3c8 0xef978 0xee578
GetCurrentThreadId 0x0 0x1800bd3d0 0xef980 0xee580
GetSystemTimeAsFileTime 0x0 0x1800bd3d8 0xef988 0xee588
GetTickCount 0x0 0x1800bd3e0 0xef990 0xee590
VirtualProtect 0x0 0x1800bd3e8 0xef998 0xee598
WerRegisterMemoryBlock 0x0 0x1800bd3f0 0xef9a0 0xee5a0
HeapAlloc 0x0 0x1800bd3f8 0xef9a8 0xee5a8
HeapFree 0x0 0x1800bd400 0xef9b0 0xee5b0
GetModuleFileNameW 0x0 0x1800bd408 0xef9b8 0xee5b8
GetModuleHandleW 0x0 0x1800bd410 0xef9c0 0xee5c0
GetProcAddress 0x0 0x1800bd418 0xef9c8 0xee5c8
LoadLibraryExW 0x0 0x1800bd420 0xef9d0 0xee5d0
EncodePointer 0x0 0x1800bd428 0xef9d8 0xee5d8
DecodePointer 0x0 0x1800bd430 0xef9e0 0xee5e0
Sleep 0x0 0x1800bd438 0xef9e8 0xee5e8
UnhandledExceptionFilter 0x0 0x1800bd440 0xef9f0 0xee5f0
SetUnhandledExceptionFilter 0x0 0x1800bd448 0xef9f8 0xee5f8
IsDebuggerPresent 0x0 0x1800bd450 0xefa00 0xee600
RtlVirtualUnwind 0x0 0x1800bd458 0xefa08 0xee608
RtlLookupFunctionEntry 0x0 0x1800bd460 0xefa10 0xee610
RtlCaptureContext 0x0 0x1800bd468 0xefa18 0xee618
TlsFree 0x0 0x1800bd470 0xefa20 0xee620
TlsSetValue 0x0 0x1800bd478 0xefa28 0xee628
TlsGetValue 0x0 0x1800bd480 0xefa30 0xee630
TlsAlloc 0x0 0x1800bd488 0xefa38 0xee638
GetOverlappedResult 0x0 0x1800bd490 0xefa40 0xee640
GetSystemTime 0x0 0x1800bd498 0xefa48 0xee648
IsValidCodePage 0x0 0x1800bd4a0 0xefa50 0xee650
IsDBCSLeadByte 0x0 0x1800bd4a8 0xefa58 0xee658
GetStringTypeExW 0x0 0x1800bd4b0 0xefa60 0xee660
SystemTimeToFileTime 0x0 0x1800bd4b8 0xefa68 0xee668
FileTimeToSystemTime 0x0 0x1800bd4c0 0xefa70 0xee670
GetTickCount64 0x0 0x1800bd4c8 0xefa78 0xee678
CreateSemaphoreExW 0x0 0x1800bd4d0 0xefa80 0xee680
WaitForSingleObjectEx 0x0 0x1800bd4d8 0xefa88 0xee688
ReleaseSemaphore 0x0 0x1800bd4e0 0xefa90 0xee690
TryEnterCriticalSection 0x0 0x1800bd4e8 0xefa98 0xee698
RemoveDirectoryW 0x0 0x1800bd4f0 0xefaa0 0xee6a0
ReadFile 0x0 0x1800bd4f8 0xefaa8 0xee6a8
GetFileAttributesExW 0x0 0x1800bd500 0xefab0 0xee6b0
CreateDirectoryW 0x0 0x1800bd508 0xefab8 0xee6b8
InitializeCriticalSectionEx 0x0 0x1800bd510 0xefac0 0xee6c0
LocalAlloc 0x0 0x1800bd518 0xefac8 0xee6c8
FreeLibrary 0x0 0x1800bd520 0xefad0 0xee6d0
LoadLibraryA 0x0 0x1800bd528 0xefad8 0xee6d8
FileTimeToLocalFileTime 0x0 0x1800bd530 0xefae0 0xee6e0
SetLastError 0x0 0x1800bd538 0xefae8 0xee6e8
query.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
BindIFilterFromStorage 0x0 0x1800bd548 0xefaf8 0xee6f8
ole32.dll (15)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateILockBytesOnHGlobal 0x0 0x1800bd558 0xefb08 0xee708
PropVariantCopy 0x0 0x1800bd560 0xefb10 0xee710
CreateStreamOnHGlobal 0x0 0x1800bd568 0xefb18 0xee718
CoCreateGuid 0x0 0x1800bd570 0xefb20 0xee720
GetConvertStg 0x0 0x1800bd578 0xefb28 0xee728
StringFromGUID2 0x0 0x1800bd580 0xefb30 0xee730
WriteFmtUserTypeStg 0x0 0x1800bd588 0xefb38 0xee738
ReadClassStg 0x0 0x1800bd590 0xefb40 0xee740
StgOpenStorageOnILockBytes 0x0 0x1800bd598 0xefb48 0xee748
StgCreateDocfileOnILockBytes 0x0 0x1800bd5a0 0xefb50 0xee750
CoCreateInstance 0x0 0x1800bd5a8 0xefb58 0xee758
CoTaskMemFree 0x0 0x1800bd5b0 0xefb60 0xee760
CoTaskMemAlloc 0x0 0x1800bd5b8 0xefb68 0xee768
PropVariantClear 0x0 0x1800bd5c0 0xefb70 0xee770
CLSIDFromString 0x0 0x1800bd5c8 0xefb78 0xee778
MSVCP100.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Xout_of_range@std@@YAXPEBD@Z 0x0 0x1800bd5d8 0xefb88 0xee788
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x1800bd5e0 0xefb90 0xee790
OLEAUT32.dll (16)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysFreeString 0x6 0x1800bd5f0 0xefba0 0xee7a0
VariantChangeTypeEx 0x93 0x1800bd5f8 0xefba8 0xee7a8
VariantChangeType 0xc 0x1800bd600 0xefbb0 0xee7b0
VariantClear 0x9 0x1800bd608 0xefbb8 0xee7b8
SysStringLen 0x7 0x1800bd610 0xefbc0 0xee7c0
VariantInit 0x8 0x1800bd618 0xefbc8 0xee7c8
SysAllocString 0x2 0x1800bd620 0xefbd0 0xee7d0
SysAllocStringLen 0x4 0x1800bd628 0xefbd8 0xee7d8
SystemTimeToVariantTime 0xb8 0x1800bd630 0xefbe0 0xee7e0
VariantTimeToSystemTime 0xb9 0x1800bd638 0xefbe8 0xee7e8
SafeArrayCreate 0xf 0x1800bd640 0xefbf0 0xee7f0
SafeArrayGetDim 0x11 0x1800bd648 0xefbf8 0xee7f8
SafeArrayGetUBound 0x13 0x1800bd650 0xefc00 0xee800
SafeArrayGetLBound 0x14 0x1800bd658 0xefc08 0xee808
SafeArrayAccessData 0x17 0x1800bd660 0xefc10 0xee810
SafeArrayUnaccessData 0x18 0x1800bd668 0xefc18 0xee818
Exports (4)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180002ab8 0x1
DllGetClassObject 0x180002620 0x2
DllRegisterServer 0x18001525c 0x3
DllUnregisterServer 0x180015418 0x4
Digital Signatures (2)
»
Signature Properties
InternalName Microsoft Office Open XML Format Filter
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Office Open XML Format Filter
OriginalFilename offfiltx.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\filters\offfiltx.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\filters\offfiltx.dll (Modified File)
c:\program files\common files\microsoft shared\filters\offfiltx.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 1.12 MB
Hash Values MD5: 22cd6893caa9d3c373afa2cf77635f0e
SHA1: 9ac50bc7adbddcd7b7c3f3d34321cb681e45aeac
SHA256: 36e5cc3a0661bfb3f27aa8a52f762f4c3e3f86fafcd5b6f2136d3436e00f8668
Actions
c:\program files\common files\microsoft shared\filters\visfilt.dll
»
File Properties
Names c:\program files\common files\microsoft shared\filters\visfilt.dll (Modified File)
Size 3.74 MB
Hash Values MD5: 3aed295cdb86b67ef6d20e8a6e1fb765
SHA1: 7e763738ec6a78dea41079124d4f87868d34328f
SHA256: 3992c0be7ae184fd156150e6807bac2d2b5342a2e93d56c153670a5ddda469bb
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18000fc6c
Size Of Code 0x1f5600
Size Of Initialized Data 0x1c7200
Size Of Uninitialized Data 0x200
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:19:41
Compiler/Packer Unknown
Sections (7)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x1f5444 0x1f5600 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.4
.rdata 0x1801f7000 0x14ac88 0x14ae00 0x1f5a00 CNT_INITIALIZED_DATA, MEM_READ 5.91
.data 0x180342000 0x561f8 0x56000 0x340800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 6.22
.pdata 0x180399000 0x1cf20 0x1d000 0x396800 CNT_INITIALIZED_DATA, MEM_READ 5.96
.tls 0x1803b6000 0x29 0x0 0x0 CNT_UNINITIALIZED_DATA, MEM_READ, MEM_WRITE 0.0
.rsrc 0x1803b7000 0x500 0x600 0x3b3800 CNT_INITIALIZED_DATA, MEM_READ 2.77
.reloc 0x1803b8000 0x8b08 0x8c00 0x3b3e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.5
Digital Signatures (2)
»
Signature Properties
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 33 E5 27 86 A3 0E 4A 2A 80 00 00 00 00 00 33
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\filters\visfilt.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\filters\visfilt.dll (Modified File)
c:\program files\common files\microsoft shared\filters\visfilt.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 3.74 MB
Hash Values MD5: 0520ae921464d91df95d8173d8cf892f
SHA1: daa669d055663233a2a0db4f7e769916cfebb7bf
SHA256: 3caac82d10cc4a029e96df56377e1c22e2e0f0d4a20bfa26119172d91616d479
Actions
c:\program files\common files\microsoft shared\grphflt\epsimp32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\epsimp32.flt (Modified File)
Size 635.15 KB
Hash Values MD5: 9bc53132f679cc81dc035fa517996f07
SHA1: 57da96b6aed705a5cba131aa4f2498b3aa5e4b1f
SHA256: 9dbc949ecdf073a05b4ea0ed3e0101cfeb5c65e86b3cb4ccbee656926c18945d
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18007935c
Size Of Code 0x7c200
Size Of Initialized Data 0x21200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:44:00
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x7c0cc 0x7c200 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.39
.rdata 0x18007e000 0x15ba0 0x15c00 0x7c600 CNT_INITIALIZED_DATA, MEM_READ 5.47
.data 0x180094000 0x5180 0x4c00 0x92200 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.31
.pdata 0x18009a000 0x46e0 0x4800 0x96e00 CNT_INITIALIZED_DATA, MEM_READ 5.77
.rsrc 0x18009f000 0x720 0x800 0x9b600 CNT_INITIALIZED_DATA, MEM_READ 3.2
.reloc 0x1800a0000 0x125c 0x1400 0x9be00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.29
Imports (176)
»
GDI32.dll (60)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreatePen 0x0 0x18007e000 0x8a0c8 0x886c8
CreateRectRgn 0x0 0x18007e008 0x8a0d0 0x886d0
CreateSolidBrush 0x0 0x18007e010 0x8a0d8 0x886d8
DeleteObject 0x0 0x18007e018 0x8a0e0 0x886e0
GetCurrentPositionEx 0x0 0x18007e020 0x8a0e8 0x886e8
GetDeviceCaps 0x0 0x18007e028 0x8a0f0 0x886f0
GetStockObject 0x0 0x18007e030 0x8a0f8 0x886f8
GetTextExtentPoint32A 0x0 0x18007e038 0x8a100 0x88700
Rectangle 0x0 0x18007e040 0x8a108 0x88708
SelectClipRgn 0x0 0x18007e048 0x8a110 0x88710
ExtSelectClipRgn 0x0 0x18007e050 0x8a118 0x88718
SelectObject 0x0 0x18007e058 0x8a120 0x88720
SetTextColor 0x0 0x18007e060 0x8a128 0x88728
CloseEnhMetaFile 0x0 0x18007e068 0x8a130 0x88730
CreateEnhMetaFileA 0x0 0x18007e070 0x8a138 0x88738
DeleteEnhMetaFile 0x0 0x18007e078 0x8a140 0x88740
GetEnhMetaFileHeader 0x0 0x18007e080 0x8a148 0x88748
GetWorldTransform 0x0 0x18007e088 0x8a150 0x88750
SetWorldTransform 0x0 0x18007e090 0x8a158 0x88758
SelectClipPath 0x0 0x18007e098 0x8a160 0x88760
SetMiterLimit 0x0 0x18007e0a0 0x8a168 0x88768
StrokeAndFillPath 0x0 0x18007e0a8 0x8a170 0x88770
StrokePath 0x0 0x18007e0b0 0x8a178 0x88778
ExtCreatePen 0x0 0x18007e0b8 0x8a180 0x88780
CreateFontIndirectA 0x0 0x18007e0c0 0x8a188 0x88788
GetOutlineTextMetricsA 0x0 0x18007e0c8 0x8a190 0x88790
MoveToEx 0x0 0x18007e0d0 0x8a198 0x88798
SetTextAlign 0x0 0x18007e0d8 0x8a1a0 0x887a0
GetTextMetricsA 0x0 0x18007e0e0 0x8a1a8 0x887a8
TextOutA 0x0 0x18007e0e8 0x8a1b0 0x887b0
GetTextFaceA 0x0 0x18007e0f0 0x8a1b8 0x887b8
StretchDIBits 0x0 0x18007e0f8 0x8a1c0 0x887c0
CloseMetaFile 0x0 0x18007e100 0x8a1c8 0x887c8
CreateMetaFileA 0x0 0x18007e108 0x8a1d0 0x887d0
PolyPolygon 0x0 0x18007e110 0x8a1d8 0x887d8
SetBkMode 0x0 0x18007e118 0x8a1e0 0x887e0
SetROP2 0x0 0x18007e120 0x8a1e8 0x887e8
SetStretchBltMode 0x0 0x18007e128 0x8a1f0 0x887f0
GetPath 0x0 0x18007e130 0x8a1f8 0x887f8
WidenPath 0x0 0x18007e138 0x8a200 0x88800
Polyline 0x0 0x18007e140 0x8a208 0x88808
SetWindowExtEx 0x0 0x18007e148 0x8a210 0x88810
SetWindowOrgEx 0x0 0x18007e150 0x8a218 0x88818
GetTextExtentPointA 0x0 0x18007e158 0x8a220 0x88820
DeleteMetaFile 0x0 0x18007e160 0x8a228 0x88828
CreateBitmap 0x0 0x18007e168 0x8a230 0x88830
CreateCompatibleDC 0x0 0x18007e170 0x8a238 0x88838
DeleteDC 0x0 0x18007e178 0x8a240 0x88840
GetDIBits 0x0 0x18007e180 0x8a248 0x88848
GetGlyphOutlineA 0x0 0x18007e188 0x8a250 0x88850
GetCharacterPlacementA 0x0 0x18007e190 0x8a258 0x88858
SetMapMode 0x0 0x18007e198 0x8a260 0x88860
PolyDraw 0x0 0x18007e1a0 0x8a268 0x88868
EndPath 0x0 0x18007e1a8 0x8a270 0x88870
CloseFigure 0x0 0x18007e1b0 0x8a278 0x88878
BeginPath 0x0 0x18007e1b8 0x8a280 0x88880
SetPolyFillMode 0x0 0x18007e1c0 0x8a288 0x88888
GdiComment 0x0 0x18007e1c8 0x8a290 0x88890
SetGraphicsMode 0x0 0x18007e1d0 0x8a298 0x88898
Escape 0x0 0x18007e1d8 0x8a2a0 0x888a0
KERNEL32.dll (48)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetTickCount 0x0 0x18007e1e8 0x8a2b0 0x888b0
MapViewOfFileEx 0x0 0x18007e1f0 0x8a2b8 0x888b8
UnmapViewOfFile 0x0 0x18007e1f8 0x8a2c0 0x888c0
CreateFileMappingA 0x0 0x18007e200 0x8a2c8 0x888c8
GlobalAlloc 0x0 0x18007e208 0x8a2d0 0x888d0
GlobalLock 0x0 0x18007e210 0x8a2d8 0x888d8
GlobalUnlock 0x0 0x18007e218 0x8a2e0 0x888e0
GlobalFree 0x0 0x18007e220 0x8a2e8 0x888e8
RaiseFailFastException 0x0 0x18007e228 0x8a2f0 0x888f0
InitializeCriticalSection 0x0 0x18007e230 0x8a2f8 0x888f8
EnterCriticalSection 0x0 0x18007e238 0x8a300 0x88900
LeaveCriticalSection 0x0 0x18007e240 0x8a308 0x88908
DeleteCriticalSection 0x0 0x18007e248 0x8a310 0x88910
VirtualAlloc 0x0 0x18007e250 0x8a318 0x88918
VirtualFree 0x0 0x18007e258 0x8a320 0x88920
LocalAlloc 0x0 0x18007e260 0x8a328 0x88928
RtlCaptureContext 0x0 0x18007e268 0x8a330 0x88930
RtlLookupFunctionEntry 0x0 0x18007e270 0x8a338 0x88938
RtlVirtualUnwind 0x0 0x18007e278 0x8a340 0x88940
IsDebuggerPresent 0x0 0x18007e280 0x8a348 0x88948
SetUnhandledExceptionFilter 0x0 0x18007e288 0x8a350 0x88950
UnhandledExceptionFilter 0x0 0x18007e290 0x8a358 0x88958
GetCurrentProcess 0x0 0x18007e298 0x8a360 0x88960
TerminateProcess 0x0 0x18007e2a0 0x8a368 0x88968
LoadLibraryA 0x0 0x18007e2a8 0x8a370 0x88970
Sleep 0x0 0x18007e2b0 0x8a378 0x88978
DecodePointer 0x0 0x18007e2b8 0x8a380 0x88980
EncodePointer 0x0 0x18007e2c0 0x8a388 0x88988
WerRegisterMemoryBlock 0x0 0x18007e2c8 0x8a390 0x88990
VirtualProtect 0x0 0x18007e2d0 0x8a398 0x88998
GetSystemTimeAsFileTime 0x0 0x18007e2d8 0x8a3a0 0x889a0
GetCurrentThreadId 0x0 0x18007e2e0 0x8a3a8 0x889a8
GetCurrentProcessId 0x0 0x18007e2e8 0x8a3b0 0x889b0
HeapSetInformation 0x0 0x18007e2f0 0x8a3b8 0x889b8
GetProcessHeap 0x0 0x18007e2f8 0x8a3c0 0x889c0
QueryPerformanceCounter 0x0 0x18007e300 0x8a3c8 0x889c8
GetLastError 0x0 0x18007e308 0x8a3d0 0x889d0
GetProcAddress 0x0 0x18007e310 0x8a3d8 0x889d8
GetModuleHandleW 0x0 0x18007e318 0x8a3e0 0x889e0
FreeLibrary 0x0 0x18007e320 0x8a3e8 0x889e8
MulDiv 0x0 0x18007e328 0x8a3f0 0x889f0
CloseHandle 0x0 0x18007e330 0x8a3f8 0x889f8
SetFilePointer 0x0 0x18007e338 0x8a400 0x88a00
ReadFile 0x0 0x18007e340 0x8a408 0x88a08
GetFileSize 0x0 0x18007e348 0x8a410 0x88a10
CreateFileA 0x0 0x18007e350 0x8a418 0x88a18
RaiseException 0x0 0x18007e358 0x8a420 0x88a20
GetSystemInfo 0x0 0x18007e360 0x8a428 0x88a28
MSVCR100.dll (67)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
pow 0x0 0x18007e370 0x8a438 0x88a38
_invalid_parameter_noinfo_noreturn 0x0 0x18007e378 0x8a440 0x88a40
rand 0x0 0x18007e380 0x8a448 0x88a48
atan2 0x0 0x18007e388 0x8a450 0x88a50
ceil 0x0 0x18007e390 0x8a458 0x88a58
floor 0x0 0x18007e398 0x8a460 0x88a60
log 0x0 0x18007e3a0 0x8a468 0x88a68
log10f 0x0 0x18007e3a8 0x8a470 0x88a70
memchr 0x0 0x18007e3b0 0x8a478 0x88a78
strchr 0x0 0x18007e3b8 0x8a480 0x88a80
atof 0x0 0x18007e3c0 0x8a488 0x88a88
ceilf 0x0 0x18007e3c8 0x8a490 0x88a90
floorf 0x0 0x18007e3d0 0x8a498 0x88a98
longjmp 0x0 0x18007e3d8 0x8a4a0 0x88aa0
_setjmp 0x0 0x18007e3e0 0x8a4a8 0x88aa8
atan2f 0x0 0x18007e3e8 0x8a4b0 0x88ab0
_finite 0x0 0x18007e3f0 0x8a4b8 0x88ab8
_malloc_crt 0x0 0x18007e3f8 0x8a4c0 0x88ac0
_initterm 0x0 0x18007e400 0x8a4c8 0x88ac8
_initterm_e 0x0 0x18007e408 0x8a4d0 0x88ad0
_encoded_null 0x0 0x18007e410 0x8a4d8 0x88ad8
_amsg_exit 0x0 0x18007e418 0x8a4e0 0x88ae0
__C_specific_handler 0x0 0x18007e420 0x8a4e8 0x88ae8
__CppXcptFilter 0x0 0x18007e428 0x8a4f0 0x88af0
?terminate@@YAXXZ 0x0 0x18007e430 0x8a4f8 0x88af8
__crt_debugger_hook 0x0 0x18007e438 0x8a500 0x88b00
__clean_type_info_names_internal 0x0 0x18007e440 0x8a508 0x88b08
_unlock 0x0 0x18007e448 0x8a510 0x88b10
__dllonexit 0x0 0x18007e450 0x8a518 0x88b18
_lock 0x0 0x18007e458 0x8a520 0x88b20
_onexit 0x0 0x18007e460 0x8a528 0x88b28
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18007e468 0x8a530 0x88b30
memcpy_s 0x0 0x18007e470 0x8a538 0x88b38
_time64 0x0 0x18007e478 0x8a540 0x88b40
srand 0x0 0x18007e480 0x8a548 0x88b48
strstr 0x0 0x18007e488 0x8a550 0x88b50
isalnum 0x0 0x18007e490 0x8a558 0x88b58
isdigit 0x0 0x18007e498 0x8a560 0x88b60
islower 0x0 0x18007e4a0 0x8a568 0x88b68
isupper 0x0 0x18007e4a8 0x8a570 0x88b70
memcmp 0x0 0x18007e4b0 0x8a578 0x88b78
_msize 0x0 0x18007e4b8 0x8a580 0x88b80
_expand 0x0 0x18007e4c0 0x8a588 0x88b88
realloc 0x0 0x18007e4c8 0x8a590 0x88b90
?_set_new_handler@@YAP6AH_K@ZP6AH0@Z@Z 0x0 0x18007e4d0 0x8a598 0x88b98
??2@YAPEAX_K@Z 0x0 0x18007e4d8 0x8a5a0 0x88ba0
memset 0x0 0x18007e4e0 0x8a5a8 0x88ba8
memmove 0x0 0x18007e4e8 0x8a5b0 0x88bb0
sqrtf 0x0 0x18007e4f0 0x8a5b8 0x88bb8
sinf 0x0 0x18007e4f8 0x8a5c0 0x88bc0
cosf 0x0 0x18007e500 0x8a5c8 0x88bc8
__CxxFrameHandler3 0x0 0x18007e508 0x8a5d0 0x88bd0
??3@YAXPEAX@Z 0x0 0x18007e510 0x8a5d8 0x88bd8
memcpy 0x0 0x18007e518 0x8a5e0 0x88be0
??_V@YAXPEAX@Z 0x0 0x18007e520 0x8a5e8 0x88be8
??_U@YAPEAX_K@Z 0x0 0x18007e528 0x8a5f0 0x88bf0
sqrt 0x0 0x18007e530 0x8a5f8 0x88bf8
sin 0x0 0x18007e538 0x8a600 0x88c00
cos 0x0 0x18007e540 0x8a608 0x88c08
_CxxThrowException 0x0 0x18007e548 0x8a610 0x88c10
malloc 0x0 0x18007e550 0x8a618 0x88c18
free 0x0 0x18007e558 0x8a620 0x88c20
exit 0x0 0x18007e560 0x8a628 0x88c28
_vsnprintf 0x0 0x18007e568 0x8a630 0x88c30
fprintf 0x0 0x18007e570 0x8a638 0x88c38
__iob_func 0x0 0x18007e578 0x8a640 0x88c40
tan 0x0 0x18007e580 0x8a648 0x88c48
ADVAPI32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
EventWrite 0x0 0x18007e590 0x8a658 0x88c58
Exports (5)
»
Api name EAT Address Ordinal
GetFilterInfo 0x18002796c 0x1
GetFilterPref 0x180021628 0x3
ImportGr 0x180027a80 0x2
RegisterPercentCallback 0x180027dc8 0x4
SetFilterPref 0x180027e2c 0x5
Digital Signatures (2)
»
Signature Properties
InternalName epsimp32
FileVersion 2012.1500.4420.1017
CompanyName Access Softek, Inc.
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription Encapsulated PostScript Graphics Filter
OriginalFilename epsimp32.flt
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\epsimp32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\epsimp32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\epsimp32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 635.32 KB
Hash Values MD5: f01a01b90023d35a294d577deded09c4
SHA1: c3c982d90dd4caa3f6dfb2c5c99b815220a1ead8
SHA256: de925baa026e639f8784a60f57e8918e53e8a83eb532eeb17976e133977a08fd
Actions
c:\program files\common files\microsoft shared\grphflt\gifimp32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\gifimp32.flt (Modified File)
Size 250.13 KB
Hash Values MD5: 8ccbfd3c7d29199e24e635aaa40a6915
SHA1: 5e6c74b566ecedf7796a68ac05c7f8d1b8d75906
SHA256: c9a6f70b49d71e1cf02d81c07901d684380d6ddab3850d61066585c21dd6f7ec
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18002b4cc
Size Of Code 0x2c800
Size Of Initialized Data 0x10e00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:46:29
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x2c648 0x2c800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.45
.rdata 0x18002e000 0xc33c 0xc400 0x2cc00 CNT_INITIALIZED_DATA, MEM_READ 5.66
.data 0x18003b000 0x1808 0xe00 0x39000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 5.4
.pdata 0x18003d000 0x2274 0x2400 0x39e00 CNT_INITIALIZED_DATA, MEM_READ 5.23
.rsrc 0x180040000 0x7e8 0x800 0x3c200 CNT_INITIALIZED_DATA, MEM_READ 3.3
.reloc 0x180041000 0x2dc 0x400 0x3ca00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.46
Imports (152)
»
ADVAPI32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCloseKey 0x0 0x18002e000 0x36260 0x34e60
RegOpenKeyExA 0x0 0x18002e008 0x36268 0x34e68
RegQueryValueExA 0x0 0x18002e010 0x36270 0x34e70
RegCreateKeyExA 0x0 0x18002e018 0x36278 0x34e78
RegEnumKeyExA 0x0 0x18002e020 0x36280 0x34e80
RegSetValueExA 0x0 0x18002e028 0x36288 0x34e88
EventWrite 0x0 0x18002e030 0x36290 0x34e90
COMCTL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x18002e040 0x362a0 0x34ea0
GDI32.dll (29)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetViewportExtEx 0x0 0x18002e050 0x362b0 0x34eb0
GetWindowExtEx 0x0 0x18002e058 0x362b8 0x34eb8
CreateCompatibleDC 0x0 0x18002e060 0x362c0 0x34ec0
DeleteDC 0x0 0x18002e068 0x362c8 0x34ec8
DeleteObject 0x0 0x18002e070 0x362d0 0x34ed0
GetDeviceCaps 0x0 0x18002e078 0x362d8 0x34ed8
GetMetaFileBitsEx 0x0 0x18002e080 0x362e0 0x34ee0
SelectObject 0x0 0x18002e088 0x362e8 0x34ee8
SetMapMode 0x0 0x18002e090 0x362f0 0x34ef0
PlayMetaFileRecord 0x0 0x18002e098 0x362f8 0x34ef8
EnumMetaFile 0x0 0x18002e0a0 0x36300 0x34f00
CreateMetaFileA 0x0 0x18002e0a8 0x36308 0x34f08
EnumEnhMetaFile 0x0 0x18002e0b0 0x36310 0x34f10
GetEnhMetaFileHeader 0x0 0x18002e0b8 0x36318 0x34f18
PlayEnhMetaFileRecord 0x0 0x18002e0c0 0x36320 0x34f20
GetTextExtentPoint32A 0x0 0x18002e0c8 0x36328 0x34f28
CreateDIBSection 0x0 0x18002e0d0 0x36330 0x34f30
SetViewportExtEx 0x0 0x18002e0d8 0x36338 0x34f38
SetWindowExtEx 0x0 0x18002e0e0 0x36340 0x34f40
SetWindowOrgEx 0x0 0x18002e0e8 0x36348 0x34f48
GetObjectA 0x0 0x18002e0f0 0x36350 0x34f50
SetMetaFileBitsEx 0x0 0x18002e0f8 0x36358 0x34f58
Escape 0x0 0x18002e100 0x36360 0x34f60
GdiComment 0x0 0x18002e108 0x36368 0x34f68
CloseMetaFile 0x0 0x18002e110 0x36370 0x34f70
DeleteMetaFile 0x0 0x18002e118 0x36378 0x34f78
DeleteEnhMetaFile 0x0 0x18002e120 0x36380 0x34f80
RealizePalette 0x0 0x18002e128 0x36388 0x34f88
SelectPalette 0x0 0x18002e130 0x36390 0x34f90
gdiplus.dll (19)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GdipEmfToWmfBits 0x0 0x18002e140 0x363a0 0x34fa0
GdipRecordMetafile 0x0 0x18002e148 0x363a8 0x34fa8
GdipGetHemfFromMetafile 0x0 0x18002e150 0x363b0 0x34fb0
GdipDrawImageRectRectI 0x0 0x18002e158 0x363b8 0x34fb8
GdipDeleteGraphics 0x0 0x18002e160 0x363c0 0x34fc0
GdipBitmapUnlockBits 0x0 0x18002e168 0x363c8 0x34fc8
GdipBitmapLockBits 0x0 0x18002e170 0x363d0 0x34fd0
GdipCreateBitmapFromFileICM 0x0 0x18002e178 0x363d8 0x34fd8
GdipGetImageFlags 0x0 0x18002e180 0x363e0 0x34fe0
GdipGetImageVerticalResolution 0x0 0x18002e188 0x363e8 0x34fe8
GdipGetImageHorizontalResolution 0x0 0x18002e190 0x363f0 0x34ff0
GdipGetImageHeight 0x0 0x18002e198 0x363f8 0x34ff8
GdipGetImageWidth 0x0 0x18002e1a0 0x36400 0x35000
GdipGetImageBounds 0x0 0x18002e1a8 0x36408 0x35008
GdipGetImageGraphicsContext 0x0 0x18002e1b0 0x36410 0x35010
GdipDisposeImage 0x0 0x18002e1b8 0x36418 0x35018
GdipLoadImageFromFileICM 0x0 0x18002e1c0 0x36420 0x35020
GdiplusShutdown 0x0 0x18002e1c8 0x36428 0x35028
GdiplusStartup 0x0 0x18002e1d0 0x36430 0x35030
KERNEL32.dll (57)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetTickCount 0x0 0x18002e1e0 0x36440 0x35040
GetLastError 0x0 0x18002e1e8 0x36448 0x35048
_llseek 0x0 0x18002e1f0 0x36450 0x35050
MulDiv 0x0 0x18002e1f8 0x36458 0x35058
MultiByteToWideChar 0x0 0x18002e200 0x36460 0x35060
FindClose 0x0 0x18002e208 0x36468 0x35068
FindFirstFileA 0x0 0x18002e210 0x36470 0x35070
FreeLibrary 0x0 0x18002e218 0x36478 0x35078
GetModuleHandleW 0x0 0x18002e220 0x36480 0x35080
GetProcAddress 0x0 0x18002e228 0x36488 0x35088
LoadLibraryExA 0x0 0x18002e230 0x36490 0x35090
lstrcmpA 0x0 0x18002e238 0x36498 0x35098
lstrlenA 0x0 0x18002e240 0x364a0 0x350a0
Sleep 0x0 0x18002e248 0x364a8 0x350a8
DecodePointer 0x0 0x18002e250 0x364b0 0x350b0
EncodePointer 0x0 0x18002e258 0x364b8 0x350b8
LoadLibraryA 0x0 0x18002e260 0x364c0 0x350c0
RaiseFailFastException 0x0 0x18002e268 0x364c8 0x350c8
_lwrite 0x0 0x18002e270 0x364d0 0x350d0
_lread 0x0 0x18002e278 0x364d8 0x350d8
CreateFileMappingA 0x0 0x18002e280 0x364e0 0x350e0
UnmapViewOfFile 0x0 0x18002e288 0x364e8 0x350e8
MapViewOfFile 0x0 0x18002e290 0x364f0 0x350f0
WriteFile 0x0 0x18002e298 0x364f8 0x350f8
SetFilePointer 0x0 0x18002e2a0 0x36500 0x35100
GetFileSize 0x0 0x18002e2a8 0x36508 0x35108
HeapReAlloc 0x0 0x18002e2b0 0x36510 0x35110
CloseHandle 0x0 0x18002e2b8 0x36518 0x35118
ReadFile 0x0 0x18002e2c0 0x36520 0x35120
GetFileAttributesA 0x0 0x18002e2c8 0x36528 0x35128
CreateFileA 0x0 0x18002e2d0 0x36530 0x35130
GlobalFree 0x0 0x18002e2d8 0x36538 0x35138
GlobalAlloc 0x0 0x18002e2e0 0x36540 0x35140
GlobalUnlock 0x0 0x18002e2e8 0x36548 0x35148
GlobalLock 0x0 0x18002e2f0 0x36550 0x35150
DeleteFileA 0x0 0x18002e2f8 0x36558 0x35158
GetProcessHeap 0x0 0x18002e300 0x36560 0x35160
HeapFree 0x0 0x18002e308 0x36568 0x35168
HeapAlloc 0x0 0x18002e310 0x36570 0x35170
RaiseException 0x0 0x18002e318 0x36578 0x35178
GetCurrentThreadId 0x0 0x18002e320 0x36580 0x35180
QueryPerformanceCounter 0x0 0x18002e328 0x36588 0x35188
HeapSetInformation 0x0 0x18002e330 0x36590 0x35190
GetCurrentProcessId 0x0 0x18002e338 0x36598 0x35198
GetSystemTimeAsFileTime 0x0 0x18002e340 0x365a0 0x351a0
VirtualProtect 0x0 0x18002e348 0x365a8 0x351a8
WerRegisterMemoryBlock 0x0 0x18002e350 0x365b0 0x351b0
TerminateProcess 0x0 0x18002e358 0x365b8 0x351b8
GetCurrentProcess 0x0 0x18002e360 0x365c0 0x351c0
UnhandledExceptionFilter 0x0 0x18002e368 0x365c8 0x351c8
SetUnhandledExceptionFilter 0x0 0x18002e370 0x365d0 0x351d0
IsDebuggerPresent 0x0 0x18002e378 0x365d8 0x351d8
RtlVirtualUnwind 0x0 0x18002e380 0x365e0 0x351e0
RtlLookupFunctionEntry 0x0 0x18002e388 0x365e8 0x351e8
RtlCaptureContext 0x0 0x18002e390 0x365f0 0x351f0
LocalAlloc 0x0 0x18002e398 0x365f8 0x351f8
GlobalHandle 0x0 0x18002e3a0 0x36600 0x35200
MSVCR100.dll (39)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18002e3b0 0x36610 0x35210
?terminate@@YAXXZ 0x0 0x18002e3b8 0x36618 0x35218
__clean_type_info_names_internal 0x0 0x18002e3c0 0x36620 0x35220
__crt_debugger_hook 0x0 0x18002e3c8 0x36628 0x35228
_onexit 0x0 0x18002e3d0 0x36630 0x35230
_lock 0x0 0x18002e3d8 0x36638 0x35238
__dllonexit 0x0 0x18002e3e0 0x36640 0x35240
_unlock 0x0 0x18002e3e8 0x36648 0x35248
__CppXcptFilter 0x0 0x18002e3f0 0x36650 0x35250
_amsg_exit 0x0 0x18002e3f8 0x36658 0x35258
_encoded_null 0x0 0x18002e400 0x36660 0x35260
_initterm_e 0x0 0x18002e408 0x36668 0x35268
_initterm 0x0 0x18002e410 0x36670 0x35270
_malloc_crt 0x0 0x18002e418 0x36678 0x35278
__C_specific_handler 0x0 0x18002e420 0x36680 0x35280
strtod 0x0 0x18002e428 0x36688 0x35288
malloc 0x0 0x18002e430 0x36690 0x35290
free 0x0 0x18002e438 0x36698 0x35298
fread 0x0 0x18002e440 0x366a0 0x352a0
pow 0x0 0x18002e448 0x366a8 0x352a8
strncpy 0x0 0x18002e450 0x366b0 0x352b0
longjmp 0x0 0x18002e458 0x366b8 0x352b8
fprintf 0x0 0x18002e460 0x366c0 0x352c0
__iob_func 0x0 0x18002e468 0x366c8 0x352c8
abort 0x0 0x18002e470 0x366d0 0x352d0
memcmp 0x0 0x18002e478 0x366d8 0x352d8
floorf 0x0 0x18002e480 0x366e0 0x352e0
ceilf 0x0 0x18002e488 0x366e8 0x352e8
strstr 0x0 0x18002e490 0x366f0 0x352f0
atol 0x0 0x18002e498 0x366f8 0x352f8
_vsnprintf 0x0 0x18002e4a0 0x36700 0x35300
_setjmp 0x0 0x18002e4a8 0x36708 0x35308
_CxxThrowException 0x0 0x18002e4b0 0x36710 0x35310
__CxxFrameHandler3 0x0 0x18002e4b8 0x36718 0x35318
memset 0x0 0x18002e4c0 0x36720 0x35320
memcpy 0x0 0x18002e4c8 0x36728 0x35328
strcat_s 0x0 0x18002e4d0 0x36730 0x35330
strcpy_s 0x0 0x18002e4d8 0x36738 0x35338
sprintf 0x0 0x18002e4e0 0x36740 0x35340
Exports (12)
»
Api name EAT Address Ordinal
ExportGr 0x1800037bc 0x4
GetFilterInfo 0x180004060 0x1
GetFilterPref 0x180016ef4 0x3
ImportGr 0x180004354 0x2
MSFFClose 0x1800012a4 0x8
MSFFControl 0x180001d5c 0xc
MSFFGetLine 0x180001720 0x9
MSFFOpen 0x180001000 0x7
MSFFPutLine 0x180001ab8 0xa
MSFFSeek 0x180001cb8 0xb
RegisterPercentCallback 0x180003ff8 0x6
SetFilterPref 0x180004434 0x5
Digital Signatures (2)
»
Signature Properties
InternalName gifimp32
FileVersion 2012.1500.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription GIF Import/Export Graphic Filter
OriginalFilename gifimp32.flt
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\gifimp32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\gifimp32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\gifimp32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 250.31 KB
Hash Values MD5: 6ac34efd31c14552b76654152f935c00
SHA1: d70d77b43532c14ae4090ed8e0a22643ff865916
SHA256: 506607a15f783ff167521d4fcd6f23246d4017f0d63db885e81a9729d72b5b9f
Actions
c:\program files\common files\microsoft shared\grphflt\jpegim32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\jpegim32.flt (Modified File)
Size 228.14 KB
Hash Values MD5: 3ea451c27cf508eb310fbed92948e58e
SHA1: 36ad524136d710d094c9de0cf0070901383d69e6
SHA256: 15d659e67d300d340db898395d9f77a4b93eec7a7402c8a91a160bfd46589427
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180029630
Size Of Code 0x2ac00
Size Of Initialized Data 0xd200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:36:01
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x2aa40 0x2ac00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.4
.rdata 0x18002c000 0x8948 0x8a00 0x2b000 CNT_INITIALIZED_DATA, MEM_READ 4.93
.data 0x180035000 0x14c8 0xa00 0x33a00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.18
.pdata 0x180037000 0x2430 0x2600 0x34400 CNT_INITIALIZED_DATA, MEM_READ 5.25
.rsrc 0x18003a000 0x7e8 0x800 0x36a00 CNT_INITIALIZED_DATA, MEM_READ 3.28
.reloc 0x18003b000 0x3c4 0x400 0x37200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.19
Imports (135)
»
ADVAPI32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCloseKey 0x0 0x18002c000 0x30f20 0x2ff20
RegOpenKeyExA 0x0 0x18002c008 0x30f28 0x2ff28
RegQueryValueExA 0x0 0x18002c010 0x30f30 0x2ff30
RegCreateKeyExA 0x0 0x18002c018 0x30f38 0x2ff38
RegEnumKeyExA 0x0 0x18002c020 0x30f40 0x2ff40
RegSetValueExA 0x0 0x18002c028 0x30f48 0x2ff48
EventWrite 0x0 0x18002c030 0x30f50 0x2ff50
COMCTL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x18002c040 0x30f60 0x2ff60
GDI32.dll (27)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateCompatibleDC 0x0 0x18002c050 0x30f70 0x2ff70
DeleteDC 0x0 0x18002c058 0x30f78 0x2ff78
DeleteMetaFile 0x0 0x18002c060 0x30f80 0x2ff80
DeleteObject 0x0 0x18002c068 0x30f88 0x2ff88
GetDeviceCaps 0x0 0x18002c070 0x30f90 0x2ff90
GetMetaFileBitsEx 0x0 0x18002c078 0x30f98 0x2ff98
SelectObject 0x0 0x18002c080 0x30fa0 0x2ffa0
SetMapMode 0x0 0x18002c088 0x30fa8 0x2ffa8
PlayMetaFileRecord 0x0 0x18002c090 0x30fb0 0x2ffb0
EnumMetaFile 0x0 0x18002c098 0x30fb8 0x2ffb8
DeleteEnhMetaFile 0x0 0x18002c0a0 0x30fc0 0x2ffc0
EnumEnhMetaFile 0x0 0x18002c0a8 0x30fc8 0x2ffc8
GetEnhMetaFileHeader 0x0 0x18002c0b0 0x30fd0 0x2ffd0
PlayEnhMetaFileRecord 0x0 0x18002c0b8 0x30fd8 0x2ffd8
GetViewportExtEx 0x0 0x18002c0c0 0x30fe0 0x2ffe0
CreateDIBSection 0x0 0x18002c0c8 0x30fe8 0x2ffe8
SetViewportExtEx 0x0 0x18002c0d0 0x30ff0 0x2fff0
SetWindowExtEx 0x0 0x18002c0d8 0x30ff8 0x2fff8
SetWindowOrgEx 0x0 0x18002c0e0 0x31000 0x30000
GetObjectA 0x0 0x18002c0e8 0x31008 0x30008
SetMetaFileBitsEx 0x0 0x18002c0f0 0x31010 0x30010
Escape 0x0 0x18002c0f8 0x31018 0x30018
GdiComment 0x0 0x18002c100 0x31020 0x30020
GetTextExtentPoint32A 0x0 0x18002c108 0x31028 0x30028
GetWindowExtEx 0x0 0x18002c110 0x31030 0x30030
SelectPalette 0x0 0x18002c118 0x31038 0x30038
RealizePalette 0x0 0x18002c120 0x31040 0x30040
gdiplus.dll (19)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GdipEmfToWmfBits 0x0 0x18002c130 0x31050 0x30050
GdipRecordMetafile 0x0 0x18002c138 0x31058 0x30058
GdipGetHemfFromMetafile 0x0 0x18002c140 0x31060 0x30060
GdipDrawImageRectRectI 0x0 0x18002c148 0x31068 0x30068
GdipDeleteGraphics 0x0 0x18002c150 0x31070 0x30070
GdipBitmapUnlockBits 0x0 0x18002c158 0x31078 0x30078
GdipBitmapLockBits 0x0 0x18002c160 0x31080 0x30080
GdipCreateBitmapFromFileICM 0x0 0x18002c168 0x31088 0x30088
GdipGetImageFlags 0x0 0x18002c170 0x31090 0x30090
GdipGetImageVerticalResolution 0x0 0x18002c178 0x31098 0x30098
GdipGetImageHorizontalResolution 0x0 0x18002c180 0x310a0 0x300a0
GdipGetImageHeight 0x0 0x18002c188 0x310a8 0x300a8
GdipGetImageWidth 0x0 0x18002c190 0x310b0 0x300b0
GdipGetImageBounds 0x0 0x18002c198 0x310b8 0x300b8
GdipGetImageGraphicsContext 0x0 0x18002c1a0 0x310c0 0x300c0
GdipDisposeImage 0x0 0x18002c1a8 0x310c8 0x300c8
GdipLoadImageFromFileICM 0x0 0x18002c1b0 0x310d0 0x300d0
GdiplusShutdown 0x0 0x18002c1b8 0x310d8 0x300d8
GdiplusStartup 0x0 0x18002c1c0 0x310e0 0x300e0
KERNEL32.dll (49)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
FindClose 0x0 0x18002c1d0 0x310f0 0x300f0
FindFirstFileA 0x0 0x18002c1d8 0x310f8 0x300f8
FreeLibrary 0x0 0x18002c1e0 0x31100 0x30100
GetModuleHandleW 0x0 0x18002c1e8 0x31108 0x30108
GetProcAddress 0x0 0x18002c1f0 0x31110 0x30110
LoadLibraryExA 0x0 0x18002c1f8 0x31118 0x30118
lstrcmpA 0x0 0x18002c200 0x31120 0x30120
lstrlenA 0x0 0x18002c208 0x31128 0x30128
Sleep 0x0 0x18002c210 0x31130 0x30130
LoadLibraryA 0x0 0x18002c218 0x31138 0x30138
DecodePointer 0x0 0x18002c220 0x31140 0x30140
EncodePointer 0x0 0x18002c228 0x31148 0x30148
RaiseFailFastException 0x0 0x18002c230 0x31150 0x30150
HeapReAlloc 0x0 0x18002c238 0x31158 0x30158
MultiByteToWideChar 0x0 0x18002c240 0x31160 0x30160
MulDiv 0x0 0x18002c248 0x31168 0x30168
GlobalHandle 0x0 0x18002c250 0x31170 0x30170
GetLastError 0x0 0x18002c258 0x31178 0x30178
GetTickCount 0x0 0x18002c260 0x31180 0x30180
_llseek 0x0 0x18002c268 0x31188 0x30188
_lwrite 0x0 0x18002c270 0x31190 0x30190
_lread 0x0 0x18002c278 0x31198 0x30198
CloseHandle 0x0 0x18002c280 0x311a0 0x301a0
CreateFileA 0x0 0x18002c288 0x311a8 0x301a8
GlobalFree 0x0 0x18002c290 0x311b0 0x301b0
GlobalAlloc 0x0 0x18002c298 0x311b8 0x301b8
GlobalUnlock 0x0 0x18002c2a0 0x311c0 0x301c0
GlobalLock 0x0 0x18002c2a8 0x311c8 0x301c8
DeleteFileA 0x0 0x18002c2b0 0x311d0 0x301d0
RaiseException 0x0 0x18002c2b8 0x311d8 0x301d8
GetProcessHeap 0x0 0x18002c2c0 0x311e0 0x301e0
HeapFree 0x0 0x18002c2c8 0x311e8 0x301e8
HeapAlloc 0x0 0x18002c2d0 0x311f0 0x301f0
GetCurrentThreadId 0x0 0x18002c2d8 0x311f8 0x301f8
QueryPerformanceCounter 0x0 0x18002c2e0 0x31200 0x30200
HeapSetInformation 0x0 0x18002c2e8 0x31208 0x30208
GetCurrentProcessId 0x0 0x18002c2f0 0x31210 0x30210
GetSystemTimeAsFileTime 0x0 0x18002c2f8 0x31218 0x30218
VirtualProtect 0x0 0x18002c300 0x31220 0x30220
WerRegisterMemoryBlock 0x0 0x18002c308 0x31228 0x30228
TerminateProcess 0x0 0x18002c310 0x31230 0x30230
GetCurrentProcess 0x0 0x18002c318 0x31238 0x30238
UnhandledExceptionFilter 0x0 0x18002c320 0x31240 0x30240
SetUnhandledExceptionFilter 0x0 0x18002c328 0x31248 0x30248
IsDebuggerPresent 0x0 0x18002c330 0x31250 0x30250
RtlVirtualUnwind 0x0 0x18002c338 0x31258 0x30258
RtlLookupFunctionEntry 0x0 0x18002c340 0x31260 0x30260
RtlCaptureContext 0x0 0x18002c348 0x31268 0x30268
LocalAlloc 0x0 0x18002c350 0x31270 0x30270
MSVCR100.dll (32)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18002c360 0x31280 0x30280
?terminate@@YAXXZ 0x0 0x18002c368 0x31288 0x30288
__clean_type_info_names_internal 0x0 0x18002c370 0x31290 0x30290
_onexit 0x0 0x18002c378 0x31298 0x30298
_lock 0x0 0x18002c380 0x312a0 0x302a0
__dllonexit 0x0 0x18002c388 0x312a8 0x302a8
_unlock 0x0 0x18002c390 0x312b0 0x302b0
__crt_debugger_hook 0x0 0x18002c398 0x312b8 0x302b8
__CppXcptFilter 0x0 0x18002c3a0 0x312c0 0x302c0
_amsg_exit 0x0 0x18002c3a8 0x312c8 0x302c8
_encoded_null 0x0 0x18002c3b0 0x312d0 0x302d0
_initterm_e 0x0 0x18002c3b8 0x312d8 0x302d8
_initterm 0x0 0x18002c3c0 0x312e0 0x302e0
_malloc_crt 0x0 0x18002c3c8 0x312e8 0x302e8
__C_specific_handler 0x0 0x18002c3d0 0x312f0 0x302f0
floorf 0x0 0x18002c3d8 0x312f8 0x302f8
ceilf 0x0 0x18002c3e0 0x31300 0x30300
_CxxThrowException 0x0 0x18002c3e8 0x31308 0x30308
strstr 0x0 0x18002c3f0 0x31310 0x30310
atol 0x0 0x18002c3f8 0x31318 0x30318
_vsnprintf 0x0 0x18002c400 0x31320 0x30320
strcpy_s 0x0 0x18002c408 0x31328 0x30328
malloc 0x0 0x18002c410 0x31330 0x30330
sscanf_s 0x0 0x18002c418 0x31338 0x30338
free 0x0 0x18002c420 0x31340 0x30340
_dupenv_s 0x0 0x18002c428 0x31348 0x30348
longjmp 0x0 0x18002c430 0x31350 0x30350
sprintf_s 0x0 0x18002c438 0x31358 0x30358
memcpy 0x0 0x18002c440 0x31360 0x30360
memset 0x0 0x18002c448 0x31368 0x30368
_setjmp 0x0 0x18002c450 0x31370 0x30370
__CxxFrameHandler3 0x0 0x18002c458 0x31378 0x30378
Exports (12)
»
Api name EAT Address Ordinal
ExportGr 0x18001337c 0x4
GetFilterInfo 0x180013a58 0x1
GetFilterPref 0x180025b8c 0x3
ImportGr 0x180013c18 0x2
MSFFClose 0x1800012a0 0x8
MSFFControl 0x1800015d4 0xc
MSFFGetLine 0x180001358 0x9
MSFFOpen 0x180001000 0x7
MSFFPutLine 0x180001480 0xa
MSFFSeek 0x180001590 0xb
RegisterPercentCallback 0x1800139f0 0x6
SetFilterPref 0x180013cf8 0x5
Digital Signatures (2)
»
Signature Properties
InternalName jpegim32
FileVersion 2012.1500.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription JPEG Import/Export Graphic Filter
OriginalFilename jpegim32.flt
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\jpegim32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\jpegim32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\jpegim32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 228.32 KB
Hash Values MD5: c185e0cfcb57b9a1866fc3e1ecbc94e0
SHA1: f95072cd0eef0145ae595554494e0d172ed6ced4
SHA256: 5118411007a7bc2795b566400c3994cae10b9d6960bfff4c1cd6d6b657333bd5
Actions
c:\program files\common files\microsoft shared\grphflt\ms.eps
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.eps (Modified File)
Size 14.71 KB
Hash Values MD5: 2d6e9b31482030d4fef06bce9365cc76
SHA1: 4058b74ba434624ebfea89962382dc10c3751f7d
SHA256: 984fc67b15e46d58020e218e7b63d4b07130410e456c38e15c180c1abedea377
Actions
c:\program files\common files\microsoft shared\grphflt\ms.eps, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.eps (Modified File)
c:\program files\common files\microsoft shared\grphflt\ms.eps.[sepsis@protonmail.com].sepsis (Created File)
Size 14.89 KB
Hash Values MD5: b89c66ae83ee319c47ef70aea07d4f6f
SHA1: 1657ceb6734e2283b199173665836d951c1b5ccb
SHA256: 2830f64ece6ec6cfe9a8350cb8e36fc6d7c4075a92f6af8739b3e21da3e36622
Actions
c:\program files\common files\microsoft shared\grphflt\ms.gif
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.gif (Modified File)
Size 1.04 KB
Hash Values MD5: 6936f4ee421c9242c660de4dfd7191b6
SHA1: 0ba478de375a06803fe995b44fe647ecb9343ad3
SHA256: 827f3149a54c5bcd6fc435953dca7a7806f76d6f9da89409d8763859233df933
Actions
c:\program files\common files\microsoft shared\grphflt\ms.gif, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.gif (Modified File)
c:\program files\common files\microsoft shared\grphflt\ms.gif.[sepsis@protonmail.com].sepsis (Created File)
Size 1.22 KB
Hash Values MD5: e8b4fcad81b1fc2f77bc2bbc86c74428
SHA1: 0edf6d2383163920e473e19114109abf26916aa8
SHA256: 3ba1141f77ad6cb0631528a39cfdebd4783ac5e957792c9c94f3a4db916cfc54
Actions
c:\program files\common files\microsoft shared\grphflt\ms.jpg
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.jpg (Modified File)
Size 1.04 KB
Hash Values MD5: a1b434ea0c57b8f8b234d7dddfd67d5f
SHA1: 96076c20a1ef80baff7f0ff7e8d5804133425735
SHA256: ffb1a4dd4b6da771d46def621cf71421051203606aa1d3b64b73e92606328ecb
Actions
c:\program files\common files\microsoft shared\grphflt\ms.jpg, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.jpg (Modified File)
c:\program files\common files\microsoft shared\grphflt\ms.jpg.[sepsis@protonmail.com].sepsis (Created File)
Size 1.21 KB
Hash Values MD5: bab08a48799d6bceabd6ffa69a45adff
SHA1: 912f5ceb4061fe42b901d97c5af31c4cb06350d0
SHA256: 4ff4728b8d7f3e8a7722a88f24d613b286cc5e79662ec763ea72fde87b60e90d
Actions
c:\program files\common files\microsoft shared\grphflt\ms.png
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.png (Modified File)
Size 1.64 KB
Hash Values MD5: 3a4407be2afbd8b0348459d72f94127d
SHA1: 15e832c2647e3b819fffe933bc19a4e22a64ad3e
SHA256: 39d247ae0014a175ec24ce5207b08f4017328cb1aae8916b046b5ac954899442
Actions
c:\program files\common files\microsoft shared\grphflt\ms.png, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.png (Modified File)
c:\program files\common files\microsoft shared\grphflt\ms.png.[sepsis@protonmail.com].sepsis (Created File)
Size 1.82 KB
Hash Values MD5: 0cfca8e12b1969e69a50d379d1e0b0a4
SHA1: d4940905210412d428d32beb2bdb4bcbaed3a583
SHA256: 756e173f860c789ec89215b77998efef4319aca90f3b0b570ec8c362c8314792
Actions
c:\program files\common files\microsoft shared\grphflt\ms.wpg
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.wpg (Modified File)
Size 1.35 KB
Hash Values MD5: ed21686acf6f81430b47aadd809139bf
SHA1: 5c02852a8b28fa336c273d0787a49641259f38a5
SHA256: beb31af1581af2866335bd0ad03d916b24c7bf6aeb707c703b6f40cfc8f0bced
Actions
c:\program files\common files\microsoft shared\grphflt\ms.wpg, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\ms.wpg (Modified File)
c:\program files\common files\microsoft shared\grphflt\ms.wpg.[sepsis@protonmail.com].sepsis (Created File)
Size 1.53 KB
Hash Values MD5: f8e664a4cdddccdd94a2e001a154d7c3
SHA1: 3b8d80d7538aaff83fd35ce50bdecfc965189c95
SHA256: 7b4b523dfb131121c8aa23cd3fc71dcd2fb2c2b6d6f7eb8537151d8499a48e0e
Actions
c:\program files\common files\microsoft shared\grphflt\pictim32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\pictim32.flt (Modified File)
Size 74.65 KB
Hash Values MD5: 54a242b8e991dcc59204db3001d6cc24
SHA1: 4d8d59da07b8d81046b0cab6758465127b0116ca
SHA256: 356c9cc04da8de17db7fbc3e8e5c980ea6a2b013cb99cdd4403462a5de2623e7
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18000be58
Size Of Code 0xb800
Size Of Initialized Data 0x6800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:50:45
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xb79c 0xb800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.38
.rdata 0x18000d000 0x20b8 0x2200 0xbc00 CNT_INITIALIZED_DATA, MEM_READ 4.66
.data 0x180010000 0x30a8 0x1e00 0xde00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.89
.pdata 0x180014000 0x840 0xa00 0xfc00 CNT_INITIALIZED_DATA, MEM_READ 3.78
.rsrc 0x180015000 0x640 0x800 0x10600 CNT_INITIALIZED_DATA, MEM_READ 2.75
.reloc 0x180016000 0x50 0x200 0x10e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 1.01
Imports (129)
»
ADVAPI32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCloseKey 0x0 0x18000d000 0xdba0 0xc7a0
RegCreateKeyExA 0x0 0x18000d008 0xdba8 0xc7a8
RegQueryValueExA 0x0 0x18000d010 0xdbb0 0xc7b0
RegSetValueExA 0x0 0x18000d018 0xdbb8 0xc7b8
RegOpenKeyExA 0x0 0x18000d020 0xdbc0 0xc7c0
EventWrite 0x0 0x18000d028 0xdbc8 0xc7c8
COMCTL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x18000d038 0xdbd8 0xc7d8
GDI32.dll (51)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreatePenIndirect 0x0 0x18000d048 0xdbe8 0xc7e8
CreatePatternBrush 0x0 0x18000d050 0xdbf0 0xc7f0
DeleteObject 0x0 0x18000d058 0xdbf8 0xc7f8
Ellipse 0x0 0x18000d060 0xdc00 0xc800
GetStockObject 0x0 0x18000d068 0xdc08 0xc808
IntersectClipRect 0x0 0x18000d070 0xdc10 0xc810
LineTo 0x0 0x18000d078 0xdc18 0xc818
Pie 0x0 0x18000d080 0xdc20 0xc820
Rectangle 0x0 0x18000d088 0xdc28 0xc828
RestoreDC 0x0 0x18000d090 0xdc30 0xc830
RoundRect 0x0 0x18000d098 0xdc38 0xc838
SaveDC 0x0 0x18000d0a0 0xdc40 0xc840
SelectObject 0x0 0x18000d0a8 0xdc48 0xc848
SetBkColor 0x0 0x18000d0b0 0xdc50 0xc850
SetBkMode 0x0 0x18000d0b8 0xdc58 0xc858
SetROP2 0x0 0x18000d0c0 0xdc60 0xc860
SetStretchBltMode 0x0 0x18000d0c8 0xdc68 0xc868
SetTextCharacterExtra 0x0 0x18000d0d0 0xdc70 0xc870
SetTextColor 0x0 0x18000d0d8 0xdc78 0xc878
SetTextAlign 0x0 0x18000d0e0 0xdc80 0xc880
MoveToEx 0x0 0x18000d0e8 0xdc88 0xc888
Polygon 0x0 0x18000d0f0 0xdc90 0xc890
Polyline 0x0 0x18000d0f8 0xdc98 0xc898
CreatePen 0x0 0x18000d100 0xdca0 0xc8a0
CreateCompatibleBitmap 0x0 0x18000d108 0xdca8 0xc8a8
CreateCompatibleDC 0x0 0x18000d110 0xdcb0 0xc8b0
CreateDIBitmap 0x0 0x18000d118 0xdcb8 0xc8b8
CreateICA 0x0 0x18000d120 0xdcc0 0xc8c0
CreateMetaFileA 0x0 0x18000d128 0xdcc8 0xc8c8
DeleteDC 0x0 0x18000d130 0xdcd0 0xc8d0
DeleteMetaFile 0x0 0x18000d138 0xdcd8 0xc8d8
EnumFontsA 0x0 0x18000d140 0xdce0 0xc8e0
Escape 0x0 0x18000d148 0xdce8 0xc8e8
ExcludeClipRect 0x0 0x18000d150 0xdcf0 0xc8f0
PolyPolygon 0x0 0x18000d158 0xdcf8 0xc8f8
StretchDIBits 0x0 0x18000d160 0xdd00 0xc900
TextOutA 0x0 0x18000d168 0xdd08 0xc908
SetWindowExtEx 0x0 0x18000d170 0xdd10 0xc910
SetWindowOrgEx 0x0 0x18000d178 0xdd18 0xc918
GetDeviceCaps 0x0 0x18000d180 0xdd20 0xc920
PlayMetaFile 0x0 0x18000d188 0xdd28 0xc928
CloseEnhMetaFile 0x0 0x18000d190 0xdd30 0xc930
CreateEnhMetaFileA 0x0 0x18000d198 0xdd38 0xc938
DeleteEnhMetaFile 0x0 0x18000d1a0 0xdd40 0xc940
CreateBrushIndirect 0x0 0x18000d1a8 0xdd48 0xc948
GetViewportExtEx 0x0 0x18000d1b0 0xdd50 0xc950
GetWindowExtEx 0x0 0x18000d1b8 0xdd58 0xc958
CloseMetaFile 0x0 0x18000d1c0 0xdd60 0xc960
GetTextExtentPoint32A 0x0 0x18000d1c8 0xdd68 0xc968
CreateFontIndirectA 0x0 0x18000d1d0 0xdd70 0xc970
Arc 0x0 0x18000d1d8 0xdd78 0xc978
KERNEL32.dll (46)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GlobalUnlock 0x0 0x18000d1e8 0xdd88 0xc988
GlobalAlloc 0x0 0x18000d1f0 0xdd90 0xc990
GlobalReAlloc 0x0 0x18000d1f8 0xdd98 0xc998
GlobalFree 0x0 0x18000d200 0xdda0 0xc9a0
lstrcmpA 0x0 0x18000d208 0xdda8 0xc9a8
CreateFileA 0x0 0x18000d210 0xddb0 0xc9b0
CloseHandle 0x0 0x18000d218 0xddb8 0xc9b8
_lread 0x0 0x18000d220 0xddc0 0xc9c0
_llseek 0x0 0x18000d228 0xddc8 0xc9c8
GetVersionExA 0x0 0x18000d230 0xddd0 0xc9d0
lstrcmpiA 0x0 0x18000d238 0xddd8 0xc9d8
lstrlenA 0x0 0x18000d240 0xdde0 0xc9e0
IsDBCSLeadByte 0x0 0x18000d248 0xdde8 0xc9e8
GetSystemDefaultLangID 0x0 0x18000d250 0xddf0 0xc9f0
RaiseFailFastException 0x0 0x18000d258 0xddf8 0xc9f8
HeapAlloc 0x0 0x18000d260 0xde00 0xca00
HeapFree 0x0 0x18000d268 0xde08 0xca08
GetProcessHeap 0x0 0x18000d270 0xde10 0xca10
GetTickCount 0x0 0x18000d278 0xde18 0xca18
LocalAlloc 0x0 0x18000d280 0xde20 0xca20
RtlCaptureContext 0x0 0x18000d288 0xde28 0xca28
RtlLookupFunctionEntry 0x0 0x18000d290 0xde30 0xca30
RtlVirtualUnwind 0x0 0x18000d298 0xde38 0xca38
IsDebuggerPresent 0x0 0x18000d2a0 0xde40 0xca40
SetUnhandledExceptionFilter 0x0 0x18000d2a8 0xde48 0xca48
UnhandledExceptionFilter 0x0 0x18000d2b0 0xde50 0xca50
GetCurrentProcess 0x0 0x18000d2b8 0xde58 0xca58
TerminateProcess 0x0 0x18000d2c0 0xde60 0xca60
Sleep 0x0 0x18000d2c8 0xde68 0xca68
DecodePointer 0x0 0x18000d2d0 0xde70 0xca70
EncodePointer 0x0 0x18000d2d8 0xde78 0xca78
WerRegisterMemoryBlock 0x0 0x18000d2e0 0xde80 0xca80
VirtualProtect 0x0 0x18000d2e8 0xde88 0xca88
GetSystemTimeAsFileTime 0x0 0x18000d2f0 0xde90 0xca90
GetCurrentThreadId 0x0 0x18000d2f8 0xde98 0xca98
GetCurrentProcessId 0x0 0x18000d300 0xdea0 0xcaa0
HeapSetInformation 0x0 0x18000d308 0xdea8 0xcaa8
QueryPerformanceCounter 0x0 0x18000d310 0xdeb0 0xcab0
GetProcAddress 0x0 0x18000d318 0xdeb8 0xcab8
GetModuleHandleW 0x0 0x18000d320 0xdec0 0xcac0
FreeLibrary 0x0 0x18000d328 0xdec8 0xcac8
GlobalLock 0x0 0x18000d330 0xded0 0xcad0
GlobalSize 0x0 0x18000d338 0xded8 0xcad8
RaiseException 0x0 0x18000d340 0xdee0 0xcae0
GetLastError 0x0 0x18000d348 0xdee8 0xcae8
LoadLibraryA 0x0 0x18000d350 0xdef0 0xcaf0
MSVCR100.dll (25)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x18000d360 0xdf00 0xcb00
_lock 0x0 0x18000d368 0xdf08 0xcb08
__dllonexit 0x0 0x18000d370 0xdf10 0xcb10
_unlock 0x0 0x18000d378 0xdf18 0xcb18
__clean_type_info_names_internal 0x0 0x18000d380 0xdf20 0xcb20
__crt_debugger_hook 0x0 0x18000d388 0xdf28 0xcb28
__CppXcptFilter 0x0 0x18000d390 0xdf30 0xcb30
__C_specific_handler 0x0 0x18000d398 0xdf38 0xcb38
_amsg_exit 0x0 0x18000d3a0 0xdf40 0xcb40
_encoded_null 0x0 0x18000d3a8 0xdf48 0xcb48
free 0x0 0x18000d3b0 0xdf50 0xcb50
_initterm_e 0x0 0x18000d3b8 0xdf58 0xcb58
_initterm 0x0 0x18000d3c0 0xdf60 0xcb60
_malloc_crt 0x0 0x18000d3c8 0xdf68 0xcb68
strcpy_s 0x0 0x18000d3d0 0xdf70 0xcb70
strncmp 0x0 0x18000d3d8 0xdf78 0xcb78
isdigit 0x0 0x18000d3e0 0xdf80 0xcb80
sqrt 0x0 0x18000d3e8 0xdf88 0xcb88
sin 0x0 0x18000d3f0 0xdf90 0xcb90
memset 0x0 0x18000d3f8 0xdf98 0xcb98
floor 0x0 0x18000d400 0xdfa0 0xcba0
cos 0x0 0x18000d408 0xdfa8 0xcba8
ceil 0x0 0x18000d410 0xdfb0 0xcbb0
_vsnprintf 0x0 0x18000d418 0xdfb8 0xcbb8
memcpy 0x0 0x18000d420 0xdfc0 0xcbc0
Exports (8)
»
Api name EAT Address Ordinal
EnumFontFunc 0x180004194 0x7
GetFilterInfo 0x18000733c 0x1
GetFilterPref 0x180007460 0x3
ImportEmbeddedGr 0x1800075a4 0x5
ImportGr 0x180007468 0x2
QD2GDI 0x180007ec0 0x6
SetFilterPref 0x1800076e0 0x4
WEP 0x180007eb4 0x8
Digital Signatures (2)
»
Signature Properties
InternalName PICTIM32
FileVersion 2012.1500.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription Microsoft PICT Import Filter
OriginalFilename PICTIM32.FLT
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\pictim32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\pictim32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\pictim32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 74.82 KB
Hash Values MD5: 8b806f7da233198cbec9960a05c1aafe
SHA1: b217f887daf47143da6375f76b17845caaa07383
SHA256: 040644b7a36c09f68d25f524e15f81c97ebced94342ad5d1cd3b07b6a4d24cef
Actions
c:\program files\common files\microsoft shared\grphflt\png32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\png32.flt (Modified File)
Size 271.66 KB
Hash Values MD5: 4bbfc518967193c7be4a6d7838bd3999
SHA1: 4f7fe874ad2827dc11340e8ecfb83a844aa502d2
SHA256: 7bdd886c4abc19050d69dc8d0ffa51228d9237884cd438331865b87262c8016c
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18002fd8c
Size Of Code 0x31000
Size Of Initialized Data 0x11a00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:50:45
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x30e38 0x31000 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.44
.rdata 0x180032000 0xce74 0xd000 0x31400 CNT_INITIALIZED_DATA, MEM_READ 5.72
.data 0x18003f000 0x1708 0xe00 0x3e400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 5.51
.pdata 0x180041000 0x25bc 0x2600 0x3f200 CNT_INITIALIZED_DATA, MEM_READ 5.43
.rsrc 0x180044000 0x7e8 0x800 0x41800 CNT_INITIALIZED_DATA, MEM_READ 3.27
.reloc 0x180045000 0x324 0x400 0x42000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.73
Imports (146)
»
ADVAPI32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCloseKey 0x0 0x180032000 0x3ad60 0x3a160
RegOpenKeyExA 0x0 0x180032008 0x3ad68 0x3a168
RegQueryValueExA 0x0 0x180032010 0x3ad70 0x3a170
RegCreateKeyExA 0x0 0x180032018 0x3ad78 0x3a178
RegEnumKeyExA 0x0 0x180032020 0x3ad80 0x3a180
RegSetValueExA 0x0 0x180032028 0x3ad88 0x3a188
EventWrite 0x0 0x180032030 0x3ad90 0x3a190
COMCTL32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x11 0x180032040 0x3ada0 0x3a1a0
GDI32.dll (29)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetViewportExtEx 0x0 0x180032050 0x3adb0 0x3a1b0
GetWindowExtEx 0x0 0x180032058 0x3adb8 0x3a1b8
CreateCompatibleDC 0x0 0x180032060 0x3adc0 0x3a1c0
DeleteDC 0x0 0x180032068 0x3adc8 0x3a1c8
DeleteObject 0x0 0x180032070 0x3add0 0x3a1d0
GetDeviceCaps 0x0 0x180032078 0x3add8 0x3a1d8
GetMetaFileBitsEx 0x0 0x180032080 0x3ade0 0x3a1e0
SelectObject 0x0 0x180032088 0x3ade8 0x3a1e8
SetMapMode 0x0 0x180032090 0x3adf0 0x3a1f0
PlayMetaFileRecord 0x0 0x180032098 0x3adf8 0x3a1f8
EnumMetaFile 0x0 0x1800320a0 0x3ae00 0x3a200
DeleteEnhMetaFile 0x0 0x1800320a8 0x3ae08 0x3a208
CreateMetaFileA 0x0 0x1800320b0 0x3ae10 0x3a210
GetEnhMetaFileHeader 0x0 0x1800320b8 0x3ae18 0x3a218
PlayEnhMetaFileRecord 0x0 0x1800320c0 0x3ae20 0x3a220
GetTextExtentPoint32A 0x0 0x1800320c8 0x3ae28 0x3a228
CreateDIBSection 0x0 0x1800320d0 0x3ae30 0x3a230
SetViewportExtEx 0x0 0x1800320d8 0x3ae38 0x3a238
SetWindowExtEx 0x0 0x1800320e0 0x3ae40 0x3a240
SetWindowOrgEx 0x0 0x1800320e8 0x3ae48 0x3a248
GetObjectA 0x0 0x1800320f0 0x3ae50 0x3a250
SetMetaFileBitsEx 0x0 0x1800320f8 0x3ae58 0x3a258
Escape 0x0 0x180032100 0x3ae60 0x3a260
GdiComment 0x0 0x180032108 0x3ae68 0x3a268
CloseMetaFile 0x0 0x180032110 0x3ae70 0x3a270
DeleteMetaFile 0x0 0x180032118 0x3ae78 0x3a278
EnumEnhMetaFile 0x0 0x180032120 0x3ae80 0x3a280
RealizePalette 0x0 0x180032128 0x3ae88 0x3a288
SelectPalette 0x0 0x180032130 0x3ae90 0x3a290
gdiplus.dll (19)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GdipEmfToWmfBits 0x0 0x180032140 0x3aea0 0x3a2a0
GdipRecordMetafile 0x0 0x180032148 0x3aea8 0x3a2a8
GdipGetHemfFromMetafile 0x0 0x180032150 0x3aeb0 0x3a2b0
GdipDrawImageRectRectI 0x0 0x180032158 0x3aeb8 0x3a2b8
GdipDeleteGraphics 0x0 0x180032160 0x3aec0 0x3a2c0
GdipBitmapUnlockBits 0x0 0x180032168 0x3aec8 0x3a2c8
GdipBitmapLockBits 0x0 0x180032170 0x3aed0 0x3a2d0
GdipCreateBitmapFromFileICM 0x0 0x180032178 0x3aed8 0x3a2d8
GdipGetImageFlags 0x0 0x180032180 0x3aee0 0x3a2e0
GdipGetImageVerticalResolution 0x0 0x180032188 0x3aee8 0x3a2e8
GdipGetImageHorizontalResolution 0x0 0x180032190 0x3aef0 0x3a2f0
GdipGetImageHeight 0x0 0x180032198 0x3aef8 0x3a2f8
GdipGetImageWidth 0x0 0x1800321a0 0x3af00 0x3a300
GdipGetImageBounds 0x0 0x1800321a8 0x3af08 0x3a308
GdipGetImageGraphicsContext 0x0 0x1800321b0 0x3af10 0x3a310
GdipDisposeImage 0x0 0x1800321b8 0x3af18 0x3a318
GdipLoadImageFromFileICM 0x0 0x1800321c0 0x3af20 0x3a320
GdiplusShutdown 0x0 0x1800321c8 0x3af28 0x3a328
GdiplusStartup 0x0 0x1800321d0 0x3af30 0x3a330
KERNEL32.dll (49)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
FindClose 0x0 0x1800321e0 0x3af40 0x3a340
FindFirstFileA 0x0 0x1800321e8 0x3af48 0x3a348
FreeLibrary 0x0 0x1800321f0 0x3af50 0x3a350
GetModuleHandleW 0x0 0x1800321f8 0x3af58 0x3a358
GetProcAddress 0x0 0x180032200 0x3af60 0x3a360
LoadLibraryExA 0x0 0x180032208 0x3af68 0x3a368
lstrcmpA 0x0 0x180032210 0x3af70 0x3a370
lstrlenA 0x0 0x180032218 0x3af78 0x3a378
Sleep 0x0 0x180032220 0x3af80 0x3a380
DecodePointer 0x0 0x180032228 0x3af88 0x3a388
EncodePointer 0x0 0x180032230 0x3af90 0x3a390
LoadLibraryA 0x0 0x180032238 0x3af98 0x3a398
RaiseFailFastException 0x0 0x180032240 0x3afa0 0x3a3a0
HeapReAlloc 0x0 0x180032248 0x3afa8 0x3a3a8
MultiByteToWideChar 0x0 0x180032250 0x3afb0 0x3a3b0
MulDiv 0x0 0x180032258 0x3afb8 0x3a3b8
GlobalHandle 0x0 0x180032260 0x3afc0 0x3a3c0
GetLastError 0x0 0x180032268 0x3afc8 0x3a3c8
GetTickCount 0x0 0x180032270 0x3afd0 0x3a3d0
_llseek 0x0 0x180032278 0x3afd8 0x3a3d8
_lwrite 0x0 0x180032280 0x3afe0 0x3a3e0
_lread 0x0 0x180032288 0x3afe8 0x3a3e8
CloseHandle 0x0 0x180032290 0x3aff0 0x3a3f0
CreateFileA 0x0 0x180032298 0x3aff8 0x3a3f8
GlobalFree 0x0 0x1800322a0 0x3b000 0x3a400
GlobalAlloc 0x0 0x1800322a8 0x3b008 0x3a408
GlobalUnlock 0x0 0x1800322b0 0x3b010 0x3a410
GlobalLock 0x0 0x1800322b8 0x3b018 0x3a418
DeleteFileA 0x0 0x1800322c0 0x3b020 0x3a420
GetProcessHeap 0x0 0x1800322c8 0x3b028 0x3a428
HeapFree 0x0 0x1800322d0 0x3b030 0x3a430
HeapAlloc 0x0 0x1800322d8 0x3b038 0x3a438
RaiseException 0x0 0x1800322e0 0x3b040 0x3a440
GetCurrentThreadId 0x0 0x1800322e8 0x3b048 0x3a448
QueryPerformanceCounter 0x0 0x1800322f0 0x3b050 0x3a450
HeapSetInformation 0x0 0x1800322f8 0x3b058 0x3a458
GetCurrentProcessId 0x0 0x180032300 0x3b060 0x3a460
GetSystemTimeAsFileTime 0x0 0x180032308 0x3b068 0x3a468
VirtualProtect 0x0 0x180032310 0x3b070 0x3a470
WerRegisterMemoryBlock 0x0 0x180032318 0x3b078 0x3a478
TerminateProcess 0x0 0x180032320 0x3b080 0x3a480
GetCurrentProcess 0x0 0x180032328 0x3b088 0x3a488
UnhandledExceptionFilter 0x0 0x180032330 0x3b090 0x3a490
SetUnhandledExceptionFilter 0x0 0x180032338 0x3b098 0x3a498
IsDebuggerPresent 0x0 0x180032340 0x3b0a0 0x3a4a0
RtlVirtualUnwind 0x0 0x180032348 0x3b0a8 0x3a4a8
RtlLookupFunctionEntry 0x0 0x180032350 0x3b0b0 0x3a4b0
RtlCaptureContext 0x0 0x180032358 0x3b0b8 0x3a4b8
LocalAlloc 0x0 0x180032360 0x3b0c0 0x3a4c0
MSVCR100.dll (41)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x180032370 0x3b0d0 0x3a4d0
?terminate@@YAXXZ 0x0 0x180032378 0x3b0d8 0x3a4d8
__clean_type_info_names_internal 0x0 0x180032380 0x3b0e0 0x3a4e0
__crt_debugger_hook 0x0 0x180032388 0x3b0e8 0x3a4e8
_onexit 0x0 0x180032390 0x3b0f0 0x3a4f0
_lock 0x0 0x180032398 0x3b0f8 0x3a4f8
__dllonexit 0x0 0x1800323a0 0x3b100 0x3a500
_unlock 0x0 0x1800323a8 0x3b108 0x3a508
__CppXcptFilter 0x0 0x1800323b0 0x3b110 0x3a510
_amsg_exit 0x0 0x1800323b8 0x3b118 0x3a518
_encoded_null 0x0 0x1800323c0 0x3b120 0x3a520
_initterm_e 0x0 0x1800323c8 0x3b128 0x3a528
_initterm 0x0 0x1800323d0 0x3b130 0x3a530
_malloc_crt 0x0 0x1800323d8 0x3b138 0x3a538
__C_specific_handler 0x0 0x1800323e0 0x3b140 0x3a540
strtod 0x0 0x1800323e8 0x3b148 0x3a548
malloc 0x0 0x1800323f0 0x3b150 0x3a550
free 0x0 0x1800323f8 0x3b158 0x3a558
pow 0x0 0x180032400 0x3b160 0x3a560
abort 0x0 0x180032408 0x3b168 0x3a568
strncpy 0x0 0x180032410 0x3b170 0x3a570
longjmp 0x0 0x180032418 0x3b178 0x3a578
fprintf 0x0 0x180032420 0x3b180 0x3a580
__iob_func 0x0 0x180032428 0x3b188 0x3a588
fread 0x0 0x180032430 0x3b190 0x3a590
fwrite 0x0 0x180032438 0x3b198 0x3a598
sprintf 0x0 0x180032440 0x3b1a0 0x3a5a0
memcmp 0x0 0x180032448 0x3b1a8 0x3a5a8
floorf 0x0 0x180032450 0x3b1b0 0x3a5b0
ceilf 0x0 0x180032458 0x3b1b8 0x3a5b8
__CxxFrameHandler3 0x0 0x180032460 0x3b1c0 0x3a5c0
_CxxThrowException 0x0 0x180032468 0x3b1c8 0x3a5c8
strstr 0x0 0x180032470 0x3b1d0 0x3a5d0
atol 0x0 0x180032478 0x3b1d8 0x3a5d8
_vsnprintf 0x0 0x180032480 0x3b1e0 0x3a5e0
_setjmp 0x0 0x180032488 0x3b1e8 0x3a5e8
memset 0x0 0x180032490 0x3b1f0 0x3a5f0
memcpy 0x0 0x180032498 0x3b1f8 0x3a5f8
ceil 0x0 0x1800324a0 0x3b200 0x3a600
strcpy_s 0x0 0x1800324a8 0x3b208 0x3a608
fflush 0x0 0x1800324b0 0x3b210 0x3a610
Exports (12)
»
Api name EAT Address Ordinal
ExportGr 0x18000413c 0x4
GetFilterInfo 0x1800048a0 0x1
GetFilterPref 0x1800150f4 0x3
ImportGr 0x180004a44 0x2
MSFFClose 0x1800013d0 0x8
MSFFControl 0x180001900 0xc
MSFFGetLine 0x1800014e4 0x9
MSFFOpen 0x180001000 0x7
MSFFPutLine 0x180001648 0xa
MSFFSeek 0x1800018bc 0xb
RegisterPercentCallback 0x180004838 0x6
SetFilterPref 0x180004b24 0x5
Digital Signatures (2)
»
Signature Properties
InternalName png32
FileVersion 2012.1500.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription PNG Import/Export Graphic Filter
OriginalFilename png32.flt
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\png32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\png32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\png32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 271.83 KB
Hash Values MD5: 8a86d7d639eb0ec65fa33f7c3bf3caec
SHA1: 88f03253366b74e934d6e8a075488e4d9de2f52e
SHA256: f3ed9aa3e03b266572274e6ee73e3608435015169625402032a03a2ec09129be
Actions
c:\program files\common files\microsoft shared\grphflt\wpgimp32.flt
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\wpgimp32.flt (Modified File)
Size 263.66 KB
Hash Values MD5: bcc1e13f8993204b6939b1d153fe3c44
SHA1: 313c4e1ad1507068beee561e0378fb491b871944
SHA256: a70572beede87eb6d3fc42d33d2dcffac69049e2d9f592ed330cd7e9c6e0aa87
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18002d238
Size Of Code 0x2d600
Size Of Initialized Data 0x13800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:41:22
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x2d550 0x2d600 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.29
.rdata 0x18002f000 0xf428 0xf600 0x2da00 CNT_INITIALIZED_DATA, MEM_READ 3.14
.data 0x18003f000 0x23c0 0x1600 0x3d000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.21
.pdata 0x180042000 0x108c 0x1200 0x3e600 CNT_INITIALIZED_DATA, MEM_READ 4.9
.rsrc 0x180044000 0x948 0xa00 0x3f800 CNT_INITIALIZED_DATA, MEM_READ 3.35
.reloc 0x180045000 0x1f8 0x200 0x40200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.24
Imports (104)
»
ADVAPI32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegOpenKeyExA 0x0 0x18002f000 0x3c5a0 0x3afa0
RegQueryValueExA 0x0 0x18002f008 0x3c5a8 0x3afa8
EventWrite 0x0 0x18002f010 0x3c5b0 0x3afb0
GDI32.dll (27)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetStockObject 0x0 0x18002f020 0x3c5c0 0x3afc0
PolyPolygon 0x0 0x18002f028 0x3c5c8 0x3afc8
SelectObject 0x0 0x18002f030 0x3c5d0 0x3afd0
SetBkColor 0x0 0x18002f038 0x3c5d8 0x3afd8
SetBkMode 0x0 0x18002f040 0x3c5e0 0x3afe0
SetPolyFillMode 0x0 0x18002f048 0x3c5e8 0x3afe8
StretchDIBits 0x0 0x18002f050 0x3c5f0 0x3aff0
SetTextColor 0x0 0x18002f058 0x3c5f8 0x3aff8
Polygon 0x0 0x18002f060 0x3c600 0x3b000
Polyline 0x0 0x18002f068 0x3c608 0x3b008
CreateCompatibleDC 0x0 0x18002f070 0x3c610 0x3b010
CreateFontA 0x0 0x18002f078 0x3c618 0x3b018
DeleteDC 0x0 0x18002f080 0x3c620 0x3b020
EnumFontFamiliesA 0x0 0x18002f088 0x3c628 0x3b028
GetGlyphOutlineA 0x0 0x18002f090 0x3c630 0x3b030
CloseMetaFile 0x0 0x18002f098 0x3c638 0x3b038
CreateMetaFileA 0x0 0x18002f0a0 0x3c640 0x3b040
DeleteMetaFile 0x0 0x18002f0a8 0x3c648 0x3b048
PlayMetaFile 0x0 0x18002f0b0 0x3c650 0x3b050
Rectangle 0x0 0x18002f0b8 0x3c658 0x3b058
SetWindowExtEx 0x0 0x18002f0c0 0x3c660 0x3b060
SetWindowOrgEx 0x0 0x18002f0c8 0x3c668 0x3b068
CreatePen 0x0 0x18002f0d0 0x3c670 0x3b070
CreatePatternBrush 0x0 0x18002f0d8 0x3c678 0x3b078
CreateSolidBrush 0x0 0x18002f0e0 0x3c680 0x3b080
CreateBitmap 0x0 0x18002f0e8 0x3c688 0x3b088
DeleteObject 0x0 0x18002f0f0 0x3c690 0x3b090
KERNEL32.dll (41)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
lstrlenA 0x0 0x18002f100 0x3c6a0 0x3b0a0
GlobalHandle 0x0 0x18002f108 0x3c6a8 0x3b0a8
GlobalFree 0x0 0x18002f110 0x3c6b0 0x3b0b0
GetProfileStringA 0x0 0x18002f118 0x3c6b8 0x3b0b8
MulDiv 0x0 0x18002f120 0x3c6c0 0x3b0c0
GlobalSize 0x0 0x18002f128 0x3c6c8 0x3b0c8
_lopen 0x0 0x18002f130 0x3c6d0 0x3b0d0
GlobalUnlock 0x0 0x18002f138 0x3c6d8 0x3b0d8
_lclose 0x0 0x18002f140 0x3c6e0 0x3b0e0
_llseek 0x0 0x18002f148 0x3c6e8 0x3b0e8
LocalAlloc 0x0 0x18002f150 0x3c6f0 0x3b0f0
RtlCaptureContext 0x0 0x18002f158 0x3c6f8 0x3b0f8
RtlLookupFunctionEntry 0x0 0x18002f160 0x3c700 0x3b100
RtlVirtualUnwind 0x0 0x18002f168 0x3c708 0x3b108
IsDebuggerPresent 0x0 0x18002f170 0x3c710 0x3b110
SetUnhandledExceptionFilter 0x0 0x18002f178 0x3c718 0x3b118
UnhandledExceptionFilter 0x0 0x18002f180 0x3c720 0x3b120
GetCurrentProcess 0x0 0x18002f188 0x3c728 0x3b128
TerminateProcess 0x0 0x18002f190 0x3c730 0x3b130
Sleep 0x0 0x18002f198 0x3c738 0x3b138
LoadLibraryA 0x0 0x18002f1a0 0x3c740 0x3b140
DecodePointer 0x0 0x18002f1a8 0x3c748 0x3b148
EncodePointer 0x0 0x18002f1b0 0x3c750 0x3b150
WerRegisterMemoryBlock 0x0 0x18002f1b8 0x3c758 0x3b158
VirtualProtect 0x0 0x18002f1c0 0x3c760 0x3b160
GetTickCount 0x0 0x18002f1c8 0x3c768 0x3b168
GetSystemTimeAsFileTime 0x0 0x18002f1d0 0x3c770 0x3b170
GetCurrentThreadId 0x0 0x18002f1d8 0x3c778 0x3b178
GetCurrentProcessId 0x0 0x18002f1e0 0x3c780 0x3b180
HeapSetInformation 0x0 0x18002f1e8 0x3c788 0x3b188
GetProcessHeap 0x0 0x18002f1f0 0x3c790 0x3b190
QueryPerformanceCounter 0x0 0x18002f1f8 0x3c798 0x3b198
GetLastError 0x0 0x18002f200 0x3c7a0 0x3b1a0
GetProcAddress 0x0 0x18002f208 0x3c7a8 0x3b1a8
GetModuleHandleW 0x0 0x18002f210 0x3c7b0 0x3b1b0
FreeLibrary 0x0 0x18002f218 0x3c7b8 0x3b1b8
GlobalLock 0x0 0x18002f220 0x3c7c0 0x3b1c0
GlobalAlloc 0x0 0x18002f228 0x3c7c8 0x3b1c8
RaiseException 0x0 0x18002f230 0x3c7d0 0x3b1d0
_lread 0x0 0x18002f238 0x3c7d8 0x3b1d8
lstrcmpA 0x0 0x18002f240 0x3c7e0 0x3b1e0
MSVCR100.dll (33)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?terminate@@YAXXZ 0x0 0x18002f250 0x3c7f0 0x3b1f0
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18002f258 0x3c7f8 0x3b1f8
_onexit 0x0 0x18002f260 0x3c800 0x3b200
_lock 0x0 0x18002f268 0x3c808 0x3b208
__dllonexit 0x0 0x18002f270 0x3c810 0x3b210
_unlock 0x0 0x18002f278 0x3c818 0x3b218
__clean_type_info_names_internal 0x0 0x18002f280 0x3c820 0x3b220
__crt_debugger_hook 0x0 0x18002f288 0x3c828 0x3b228
__CppXcptFilter 0x0 0x18002f290 0x3c830 0x3b230
__C_specific_handler 0x0 0x18002f298 0x3c838 0x3b238
_amsg_exit 0x0 0x18002f2a0 0x3c840 0x3b240
_encoded_null 0x0 0x18002f2a8 0x3c848 0x3b248
free 0x0 0x18002f2b0 0x3c850 0x3b250
_initterm_e 0x0 0x18002f2b8 0x3c858 0x3b258
_initterm 0x0 0x18002f2c0 0x3c860 0x3b260
_malloc_crt 0x0 0x18002f2c8 0x3c868 0x3b268
_setjmp 0x0 0x18002f2d0 0x3c870 0x3b270
??3@YAXPEAX@Z 0x0 0x18002f2d8 0x3c878 0x3b278
??2@YAPEAX_K@Z 0x0 0x18002f2e0 0x3c880 0x3b280
atan2f 0x0 0x18002f2e8 0x3c888 0x3b288
sqrt 0x0 0x18002f2f0 0x3c890 0x3b290
strcpy_s 0x0 0x18002f2f8 0x3c898 0x3b298
memset 0x0 0x18002f300 0x3c8a0 0x3b2a0
sqrtf 0x0 0x18002f308 0x3c8a8 0x3b2a8
sin 0x0 0x18002f310 0x3c8b0 0x3b2b0
cos 0x0 0x18002f318 0x3c8b8 0x3b2b8
__CxxFrameHandler3 0x0 0x18002f320 0x3c8c0 0x3b2c0
sinf 0x0 0x18002f328 0x3c8c8 0x3b2c8
memcpy 0x0 0x18002f330 0x3c8d0 0x3b2d0
cosf 0x0 0x18002f338 0x3c8d8 0x3b2d8
_invalid_parameter_noinfo_noreturn 0x0 0x18002f340 0x3c8e0 0x3b2e0
atan2 0x0 0x18002f348 0x3c8e8 0x3b2e8
longjmp 0x0 0x18002f350 0x3c8f0 0x3b2f0
Exports (5)
»
Api name EAT Address Ordinal
DllMain 0x18002c564 0xc
GetFilterInfo 0x18002c588 0x1
GetFilterPref 0x180004fb0 0x3
ImportEmbeddedGr 0x18002b710 0x4
ImportGr 0x18002b6ec 0x2
Digital Signatures (2)
»
Signature Properties
InternalName wpgimp32
FileVersion 2012.1500.4420.1017
CompanyName Access Softek, Inc.
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 2012.1500.4420.1017
FileDescription WordPerfect Graphic Import Filter
OriginalFilename WPGIMP32.FLT
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\grphflt\wpgimp32.flt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\grphflt\wpgimp32.flt (Modified File)
c:\program files\common files\microsoft shared\grphflt\wpgimp32.flt.[sepsis@protonmail.com].sepsis (Created File)
Size 263.83 KB
Hash Values MD5: 31d015ed828cc0b1709be03f1683e558
SHA1: 5e4b26033a9a29e2121387bc461ae02e3ac8a8b2
SHA256: b9109453cf2bfbb128159f934a3e67faff1a4ee8f38b76d1bf3b22e3a5987550
Actions
c:\program files\common files\microsoft shared\help\hx.hxc
»
File Properties
Names c:\program files\common files\microsoft shared\help\hx.hxc (Modified File)
Size 0.78 KB
Hash Values MD5: fc6f9e1fd2cd944dffd548bae8ab2fc3
SHA1: 18ea2e4bde2874472efcc16a43c8c9774acd37fa
SHA256: 24f3d1d585a06151ddacbfb1ee9512f554348d1e2bd8f8e3bd1bce3f0501f919
Actions
c:\program files\common files\microsoft shared\help\hx.hxc, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\hx.hxc (Modified File)
c:\program files\common files\microsoft shared\help\hx.hxc.[sepsis@protonmail.com].sepsis (Created File)
Size 0.96 KB
Hash Values MD5: 5a910a305d21654241d1881dd6b2ca98
SHA1: fac1e073a5820950c7805fac75380def45b93976
SHA256: 52f465b6655509ec4d8dd902ed101d69f88fc5160ba515357c5b2e8035c7a306
Actions
c:\program files\common files\microsoft shared\help\hx.hxt
»
File Properties
Names c:\program files\common files\microsoft shared\help\hx.hxt (Modified File)
Size 0.17 KB
Hash Values MD5: 868dec059e20c7f28ba2805e6b047e44
SHA1: ed0f824a2319e2009dd8cd66cb3bfdb4035177e4
SHA256: 137bf5ec736bd430929690afc8fc92e999c8cfe08a4235d599cd1fdec9075762
Actions
c:\program files\common files\microsoft shared\help\hx.hxt, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\hx.hxt (Modified File)
c:\program files\common files\microsoft shared\help\hx.hxt.[sepsis@protonmail.com].sepsis (Created File)
Size 0.34 KB
Hash Values MD5: 332f8938a6dde0047ebf514b38118915
SHA1: 11258317cb082042b126f9d0a4d1332b98a52f6e
SHA256: 3729ee9975b714fef76a42b4d77fd4242fc8489f3c84c87f5088b3e4c7c45b55
Actions
c:\program files\common files\microsoft shared\help\hxds.dll
»
File Properties
Names c:\program files\common files\microsoft shared\help\hxds.dll (Modified File)
Size 1.18 MB
Hash Values MD5: 33061148aeaadf431d0580d42dad55bb
SHA1: a02a0e367bf58098c05031739050e8d64b02001c
SHA256: d839ddc0780bdb9a01632a79d065fa5e050ebd45961ac3c73039c522248b624c
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800645f8
Size Of Code 0x93c00
Size Of Initialized Data 0x9ae00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:49:24
Compiler/Packer Unknown
Sections (8)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x9374c 0x93800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.38
.rdata 0x180095000 0x406a8 0x40800 0x93c00 CNT_INITIALIZED_DATA, MEM_READ 4.16
.data 0x1800d6000 0xe910 0xbc00 0xd4400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.46
.pdata 0x1800e5000 0x9390 0x9400 0xe0000 CNT_INITIALIZED_DATA, MEM_READ 5.88
text 0x1800ef000 0x2a1 0x400 0xe9400 CNT_CODE, CNT_INITIALIZED_DATA, MEM_EXECUTE 4.05
data 0x1800f0000 0x19e0 0x1a00 0xe9800 CNT_INITIALIZED_DATA, MEM_READ 6.78
.rsrc 0x1800f2000 0x3eb78 0x3ec00 0xeb200 CNT_INITIALIZED_DATA, MEM_READ 5.43
.reloc 0x180131000 0x2078 0x2200 0x129e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.39
Imports (249)
»
KERNEL32.dll (158)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RaiseException 0x0 0x180095000 0xb5780 0xb4380
SetLastError 0x0 0x180095008 0xb5788 0xb4388
ReleaseSemaphore 0x0 0x180095010 0xb5790 0xb4390
WaitForSingleObject 0x0 0x180095018 0xb5798 0xb4398
GetCurrentProcess 0x0 0x180095020 0xb57a0 0xb43a0
GetCurrentThreadId 0x0 0x180095028 0xb57a8 0xb43a8
FlushInstructionCache 0x0 0x180095030 0xb57b0 0xb43b0
GetVersionExW 0x0 0x180095038 0xb57b8 0xb43b8
GlobalAlloc 0x0 0x180095040 0xb57c0 0xb43c0
GlobalLock 0x0 0x180095048 0xb57c8 0xb43c8
GlobalUnlock 0x0 0x180095050 0xb57d0 0xb43d0
GlobalFree 0x0 0x180095058 0xb57d8 0xb43d8
MulDiv 0x0 0x180095060 0xb57e0 0xb43e0
lstrcmpW 0x0 0x180095068 0xb57e8 0xb43e8
CreateSemaphoreW 0x0 0x180095070 0xb57f0 0xb43f0
GetTempFileNameA 0x0 0x180095078 0xb57f8 0xb43f8
GetEnvironmentVariableA 0x0 0x180095080 0xb5800 0xb4400
GetEnvironmentVariableW 0x0 0x180095088 0xb5808 0xb4408
GetWindowsDirectoryA 0x0 0x180095090 0xb5810 0xb4410
GetWindowsDirectoryW 0x0 0x180095098 0xb5818 0xb4418
MoveFileExW 0x0 0x1800950a0 0xb5820 0xb4420
CreateFileA 0x0 0x1800950a8 0xb5828 0xb4428
GetFileAttributesA 0x0 0x1800950b0 0xb5830 0xb4430
SetFileAttributesA 0x0 0x1800950b8 0xb5838 0xb4438
GetFullPathNameW 0x0 0x1800950c0 0xb5840 0xb4440
GetFileInformationByHandle 0x0 0x1800950c8 0xb5848 0xb4448
OutputDebugStringW 0x0 0x1800950d0 0xb5850 0xb4450
InitializeCriticalSectionAndSpinCount 0x0 0x1800950d8 0xb5858 0xb4458
DisableThreadLibraryCalls 0x0 0x1800950e0 0xb5860 0xb4460
LoadLibraryExW 0x0 0x1800950e8 0xb5868 0xb4468
LoadResource 0x0 0x1800950f0 0xb5870 0xb4470
SizeofResource 0x0 0x1800950f8 0xb5878 0xb4478
lstrcmpiW 0x0 0x180095100 0xb5880 0xb4480
FindResourceW 0x0 0x180095108 0xb5888 0xb4488
GetSystemDirectoryA 0x0 0x180095110 0xb5890 0xb4490
LocalAlloc 0x0 0x180095118 0xb5898 0xb4498
LocalFree 0x0 0x180095120 0xb58a0 0xb44a0
GlobalSize 0x0 0x180095128 0xb58a8 0xb44a8
LockResource 0x0 0x180095130 0xb58b0 0xb44b0
GetCurrentThread 0x0 0x180095138 0xb58b8 0xb44b8
GetUserDefaultLCID 0x0 0x180095140 0xb58c0 0xb44c0
FlsSetValue 0x0 0x180095148 0xb58c8 0xb44c8
GetCommandLineA 0x0 0x180095150 0xb58d0 0xb44d0
EncodePointer 0x0 0x180095158 0xb58d8 0xb44d8
DecodePointer 0x0 0x180095160 0xb58e0 0xb44e0
TerminateProcess 0x0 0x180095168 0xb58e8 0xb44e8
UnhandledExceptionFilter 0x0 0x180095170 0xb58f0 0xb44f0
SetUnhandledExceptionFilter 0x0 0x180095178 0xb58f8 0xb44f8
GetTempPathW 0x0 0x180095180 0xb5900 0xb4500
RtlVirtualUnwind 0x0 0x180095188 0xb5908 0xb4508
RtlLookupFunctionEntry 0x0 0x180095190 0xb5910 0xb4510
RtlCaptureContext 0x0 0x180095198 0xb5918 0xb4518
RtlUnwindEx 0x0 0x1800951a0 0xb5920 0xb4520
HeapFree 0x0 0x1800951a8 0xb5928 0xb4528
HeapAlloc 0x0 0x1800951b0 0xb5930 0xb4530
HeapReAlloc 0x0 0x1800951b8 0xb5938 0xb4538
RtlPcToFileHeader 0x0 0x1800951c0 0xb5940 0xb4540
VirtualProtect 0x0 0x1800951c8 0xb5948 0xb4548
VirtualAlloc 0x0 0x1800951d0 0xb5950 0xb4550
SetThreadStackGuarantee 0x0 0x1800951d8 0xb5958 0xb4558
GetSystemInfo 0x0 0x1800951e0 0xb5960 0xb4560
VirtualQuery 0x0 0x1800951e8 0xb5968 0xb4568
FlsGetValue 0x0 0x1800951f0 0xb5970 0xb4570
FlsFree 0x0 0x1800951f8 0xb5978 0xb4578
FlsAlloc 0x0 0x180095200 0xb5980 0xb4580
ExitProcess 0x0 0x180095208 0xb5988 0xb4588
SetHandleCount 0x0 0x180095210 0xb5990 0xb4590
GetStdHandle 0x0 0x180095218 0xb5998 0xb4598
GetStartupInfoW 0x0 0x180095220 0xb59a0 0xb45a0
GetModuleFileNameA 0x0 0x180095228 0xb59a8 0xb45a8
FreeEnvironmentStringsW 0x0 0x180095230 0xb59b0 0xb45b0
GetEnvironmentStringsW 0x0 0x180095238 0xb59b8 0xb45b8
HeapSetInformation 0x0 0x180095240 0xb59c0 0xb45c0
GetVersion 0x0 0x180095248 0xb59c8 0xb45c8
HeapCreate 0x0 0x180095250 0xb59d0 0xb45d0
HeapDestroy 0x0 0x180095258 0xb59d8 0xb45d8
QueryPerformanceCounter 0x0 0x180095260 0xb59e0 0xb45e0
GetCurrentProcessId 0x0 0x180095268 0xb59e8 0xb45e8
HeapSize 0x0 0x180095270 0xb59f0 0xb45f0
GetCPInfo 0x0 0x180095278 0xb59f8 0xb45f8
GetACP 0x0 0x180095280 0xb5a00 0xb4600
GetOEMCP 0x0 0x180095288 0xb5a08 0xb4608
IsValidCodePage 0x0 0x180095290 0xb5a10 0xb4610
GetStringTypeW 0x0 0x180095298 0xb5a18 0xb4618
LoadLibraryW 0x0 0x1800952a0 0xb5a20 0xb4620
LCMapStringW 0x0 0x1800952a8 0xb5a28 0xb4628
GetLocaleInfoA 0x0 0x1800952b0 0xb5a30 0xb4630
GetConsoleCP 0x0 0x1800952b8 0xb5a38 0xb4638
GetConsoleMode 0x0 0x1800952c0 0xb5a40 0xb4640
SetStdHandle 0x0 0x1800952c8 0xb5a48 0xb4648
FlushFileBuffers 0x0 0x1800952d0 0xb5a50 0xb4650
WriteConsoleW 0x0 0x1800952d8 0xb5a58 0xb4658
GetProcessHeap 0x0 0x1800952e0 0xb5a60 0xb4660
RemoveDirectoryW 0x0 0x1800952e8 0xb5a68 0xb4668
RemoveDirectoryA 0x0 0x1800952f0 0xb5a70 0xb4670
GetTempFileNameW 0x0 0x1800952f8 0xb5a78 0xb4678
GetFileType 0x0 0x180095300 0xb5a80 0xb4680
GetFileSize 0x0 0x180095308 0xb5a88 0xb4688
DeleteFileW 0x0 0x180095310 0xb5a90 0xb4690
DeleteFileA 0x0 0x180095318 0xb5a98 0xb4698
CreateFileW 0x0 0x180095320 0xb5aa0 0xb46a0
CreateDirectoryW 0x0 0x180095328 0xb5aa8 0xb46a8
CreateDirectoryA 0x0 0x180095330 0xb5ab0 0xb46b0
IsValidLocale 0x0 0x180095338 0xb5ab8 0xb46b8
CopyFileW 0x0 0x180095340 0xb5ac0 0xb46c0
CopyFileA 0x0 0x180095348 0xb5ac8 0xb46c8
GetSystemTimeAsFileTime 0x0 0x180095350 0xb5ad0 0xb46d0
Sleep 0x0 0x180095358 0xb5ad8 0xb46d8
CloseHandle 0x0 0x180095360 0xb5ae0 0xb46e0
WriteFile 0x0 0x180095368 0xb5ae8 0xb46e8
SetFilePointer 0x0 0x180095370 0xb5af0 0xb46f0
SetEndOfFile 0x0 0x180095378 0xb5af8 0xb46f8
ReadFile 0x0 0x180095380 0xb5b00 0xb4700
FindNextFileW 0x0 0x180095388 0xb5b08 0xb4708
FindFirstFileW 0x0 0x180095390 0xb5b10 0xb4710
FindClose 0x0 0x180095398 0xb5b18 0xb4718
SetFileAttributesW 0x0 0x1800953a0 0xb5b20 0xb4720
GetFileAttributesW 0x0 0x1800953a8 0xb5b28 0xb4728
GetTickCount 0x0 0x1800953b0 0xb5b30 0xb4730
GetModuleFileNameW 0x0 0x1800953b8 0xb5b38 0xb4738
DeleteCriticalSection 0x0 0x1800953c0 0xb5b40 0xb4740
LeaveCriticalSection 0x0 0x1800953c8 0xb5b48 0xb4748
EnterCriticalSection 0x0 0x1800953d0 0xb5b50 0xb4750
InitializeCriticalSection 0x0 0x1800953d8 0xb5b58 0xb4758
GetSystemDefaultLangID 0x0 0x1800953e0 0xb5b60 0xb4760
OutputDebugStringA 0x0 0x1800953e8 0xb5b68 0xb4768
MultiByteToWideChar 0x0 0x1800953f0 0xb5b70 0xb4770
lstrlenW 0x0 0x1800953f8 0xb5b78 0xb4778
lstrlenA 0x0 0x180095400 0xb5b80 0xb4780
FormatMessageW 0x0 0x180095408 0xb5b88 0xb4788
FormatMessageA 0x0 0x180095410 0xb5b90 0xb4790
LoadLibraryExA 0x0 0x180095418 0xb5b98 0xb4798
GetProcAddress 0x0 0x180095420 0xb5ba0 0xb47a0
GetModuleHandleW 0x0 0x180095428 0xb5ba8 0xb47a8
FreeLibrary 0x0 0x180095430 0xb5bb0 0xb47b0
GetLastError 0x0 0x180095438 0xb5bb8 0xb47b8
WideCharToMultiByte 0x0 0x180095440 0xb5bc0 0xb47c0
SetErrorMode 0x0 0x180095448 0xb5bc8 0xb47c8
IsDebuggerPresent 0x0 0x180095450 0xb5bd0 0xb47d0
GetDriveTypeA 0x0 0x180095458 0xb5bd8 0xb47d8
SetCurrentDirectoryW 0x0 0x180095460 0xb5be0 0xb47e0
SetEnvironmentVariableW 0x0 0x180095468 0xb5be8 0xb47e8
LoadLibraryA 0x0 0x180095470 0xb5bf0 0xb47f0
InterlockedPopEntrySList 0x0 0x180095478 0xb5bf8 0xb47f8
VirtualFree 0x0 0x180095480 0xb5c00 0xb4800
InterlockedPushEntrySList 0x0 0x180095488 0xb5c08 0xb4808
UnmapViewOfFile 0x0 0x180095490 0xb5c10 0xb4810
MapViewOfFile 0x0 0x180095498 0xb5c18 0xb4818
CreateFileMappingW 0x0 0x1800954a0 0xb5c20 0xb4820
GetCurrentDirectoryW 0x0 0x1800954a8 0xb5c28 0xb4828
CompareStringA 0x0 0x1800954b0 0xb5c30 0xb4830
CompareStringW 0x0 0x1800954b8 0xb5c38 0xb4838
GetSystemDefaultLCID 0x0 0x1800954c0 0xb5c40 0xb4840
GetVersionExA 0x0 0x1800954c8 0xb5c48 0xb4848
GetTempPathA 0x0 0x1800954d0 0xb5c50 0xb4850
GetModuleHandleA 0x0 0x1800954d8 0xb5c58 0xb4858
FindResourceExW 0x0 0x1800954e0 0xb5c60 0xb4860
GetDiskFreeSpaceA 0x0 0x1800954e8 0xb5c68 0xb4868
GDI32.dll (12)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetObjectW 0x0 0x1800954f8 0xb5c78 0xb4878
SelectObject 0x0 0x180095500 0xb5c80 0xb4880
GetStockObject 0x0 0x180095508 0xb5c88 0xb4888
GetDeviceCaps 0x0 0x180095510 0xb5c90 0xb4890
DeleteObject 0x0 0x180095518 0xb5c98 0xb4898
DeleteDC 0x0 0x180095520 0xb5ca0 0xb48a0
CreateSolidBrush 0x0 0x180095528 0xb5ca8 0xb48a8
CreateCompatibleDC 0x0 0x180095530 0xb5cb0 0xb48b0
CreateCompatibleBitmap 0x0 0x180095538 0xb5cb8 0xb48b8
BitBlt 0x0 0x180095540 0xb5cc0 0xb48c0
GetTextExtentExPointW 0x0 0x180095548 0xb5cc8 0xb48c8
GetTextExtentExPointA 0x0 0x180095550 0xb5cd0 0xb48d0
VERSION.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VerQueryValueW 0x0 0x180095560 0xb5ce0 0xb48e0
VerQueryValueA 0x0 0x180095568 0xb5ce8 0xb48e8
GetFileVersionInfoA 0x0 0x180095570 0xb5cf0 0xb48f0
GetFileVersionInfoSizeA 0x0 0x180095578 0xb5cf8 0xb48f8
ADVAPI32.dll (26)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetNamedSecurityInfoW 0x0 0x180095588 0xb5d08 0xb4908
RevertToSelf 0x0 0x180095590 0xb5d10 0xb4910
MapGenericMask 0x0 0x180095598 0xb5d18 0xb4918
ImpersonateSelf 0x0 0x1800955a0 0xb5d20 0xb4920
AccessCheck 0x0 0x1800955a8 0xb5d28 0xb4928
OpenThreadToken 0x0 0x1800955b0 0xb5d30 0xb4930
OpenProcessToken 0x0 0x1800955b8 0xb5d38 0xb4938
SetEntriesInAclW 0x0 0x1800955c0 0xb5d40 0xb4940
SetSecurityDescriptorDacl 0x0 0x1800955c8 0xb5d48 0xb4948
InitializeSecurityDescriptor 0x0 0x1800955d0 0xb5d50 0xb4950
FreeSid 0x0 0x1800955d8 0xb5d58 0xb4958
AllocateAndInitializeSid 0x0 0x1800955e0 0xb5d60 0xb4960
RegQueryInfoKeyW 0x0 0x1800955e8 0xb5d68 0xb4968
RegEnumKeyExW 0x0 0x1800955f0 0xb5d70 0xb4970
RegDeleteKeyW 0x0 0x1800955f8 0xb5d78 0xb4978
RegQueryValueExA 0x0 0x180095600 0xb5d80 0xb4980
RegOpenKeyExA 0x0 0x180095608 0xb5d88 0xb4988
RegSetValueExW 0x0 0x180095610 0xb5d90 0xb4990
RegSetValueExA 0x0 0x180095618 0xb5d98 0xb4998
RegQueryValueExW 0x0 0x180095620 0xb5da0 0xb49a0
RegOpenKeyExW 0x0 0x180095628 0xb5da8 0xb49a8
RegDeleteValueW 0x0 0x180095630 0xb5db0 0xb49b0
RegDeleteValueA 0x0 0x180095638 0xb5db8 0xb49b8
RegCreateKeyExW 0x0 0x180095640 0xb5dc0 0xb49c0
RegCreateKeyExA 0x0 0x180095648 0xb5dc8 0xb49c8
RegCloseKey 0x0 0x180095650 0xb5dd0 0xb49d0
ole32.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
OleLockRunning 0x0 0x180095660 0xb5de0 0xb49e0
OleUninitialize 0x0 0x180095668 0xb5de8 0xb49e8
CoCreateGuid 0x0 0x180095670 0xb5df0 0xb49f0
CoTaskMemAlloc 0x0 0x180095678 0xb5df8 0xb49f8
StringFromGUID2 0x0 0x180095680 0xb5e00 0xb4a00
CLSIDFromProgID 0x0 0x180095688 0xb5e08 0xb4a08
CLSIDFromString 0x0 0x180095690 0xb5e10 0xb4a10
CoCreateInstance 0x0 0x180095698 0xb5e18 0xb4a18
CoGetClassObject 0x0 0x1800956a0 0xb5e20 0xb4a20
CreateStreamOnHGlobal 0x0 0x1800956a8 0xb5e28 0xb4a28
CoRegisterMessageFilter 0x0 0x1800956b0 0xb5e30 0xb4a30
CoTaskMemFree 0x0 0x1800956b8 0xb5e38 0xb4a38
CoDisconnectObject 0x0 0x1800956c0 0xb5e40 0xb4a40
CoTaskMemRealloc 0x0 0x1800956c8 0xb5e48 0xb4a48
CoGetMalloc 0x0 0x1800956d0 0xb5e50 0xb4a50
CreateBindCtx 0x0 0x1800956d8 0xb5e58 0xb4a58
CreateItemMoniker 0x0 0x1800956e0 0xb5e60 0xb4a60
StringFromCLSID 0x0 0x1800956e8 0xb5e68 0xb4a68
CreatePointerMoniker 0x0 0x1800956f0 0xb5e70 0xb4a70
OleInitialize 0x0 0x1800956f8 0xb5e78 0xb4a78
OLEAUT32.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VariantInit 0x8 0x180095708 0xb5e88 0xb4a88
VariantClear 0x9 0x180095710 0xb5e90 0xb4a90
SysStringLen 0x7 0x180095718 0xb5e98 0xb4a98
LoadTypeLib 0xa1 0x180095720 0xb5ea0 0xb4aa0
LoadRegTypeLib 0xa2 0x180095728 0xb5ea8 0xb4aa8
SysAllocStringLen 0x4 0x180095730 0xb5eb0 0xb4ab0
OleCreateFontIndirect 0x1a4 0x180095738 0xb5eb8 0xb4ab8
SetErrorInfo 0xc9 0x180095740 0xb5ec0 0xb4ac0
GetErrorInfo 0xc8 0x180095748 0xb5ec8 0xb4ac8
VarUI4FromStr 0x115 0x180095750 0xb5ed0 0xb4ad0
RegisterTypeLib 0xa3 0x180095758 0xb5ed8 0xb4ad8
UnRegisterTypeLib 0xba 0x180095760 0xb5ee0 0xb4ae0
SafeArrayAccessData 0x17 0x180095768 0xb5ee8 0xb4ae8
SafeArrayUnaccessData 0x18 0x180095770 0xb5ef0 0xb4af0
SafeArrayCreateVector 0x19b 0x180095778 0xb5ef8 0xb4af8
SysStringByteLen 0x95 0x180095780 0xb5f00 0xb4b00
SysAllocStringByteLen 0x96 0x180095788 0xb5f08 0xb4b08
CreateErrorInfo 0xca 0x180095790 0xb5f10 0xb4b10
SysFreeString 0x6 0x180095798 0xb5f18 0xb4b18
SysAllocString 0x2 0x1800957a0 0xb5f20 0xb4b20
WINSPOOL.DRV (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StartDocPrinterW 0x0 0x1800957b0 0xb5f30 0xb4b30
OpenPrinterA 0x0 0x1800957b8 0xb5f38 0xb4b38
OpenPrinterW 0x0 0x1800957c0 0xb5f40 0xb4b40
ClosePrinter 0x0 0x1800957c8 0xb5f48 0xb4b48
EndDocPrinter 0x0 0x1800957d0 0xb5f50 0xb4b50
EndPagePrinter 0x0 0x1800957d8 0xb5f58 0xb4b58
WritePrinter 0x0 0x1800957e0 0xb5f60 0xb4b60
StartDocPrinterA 0x0 0x1800957e8 0xb5f68 0xb4b68
StartPagePrinter 0x0 0x1800957f0 0xb5f70 0xb4b70
Exports (5)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180042068 0x1
DllGetClassObject 0x180042044 0x2
DllRegisterServer 0x180042108 0x3
DllUnregisterServer 0x180042130 0x4
HxGetObjectCA 0x180050d60 0x5
Digital Signatures (2)
»
Signature Properties
LegalCopyright © Microsoft Corporation. All rights reserved.
InternalName HXDS.DLL
FileVersion 5.70.51021.0
CompanyName Microsoft Corporation
ProductName Microsoft ® Help 2.7
ProductVersion 5.70.51021.0
FileDescription Microsoft® Help Data Services Module
OriginalFilename HXDS.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\help\hxds.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\hxds.dll (Modified File)
c:\program files\common files\microsoft shared\help\hxds.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 1.18 MB
Hash Values MD5: 667f6c344628b16b732846a33ef8729a
SHA1: b6813117ca3e3964cbda66d36123878616f8b285
SHA256: ce71b282e803bb143ce10e680678de427e9e6373d8625f046a7e877c4e2d2a4c
Actions
c:\program files\common files\microsoft shared\help\hxruntime.hxs
»
File Properties
Names c:\program files\common files\microsoft shared\help\hxruntime.hxs (Modified File)
Size 27.23 KB
Hash Values MD5: 382c886fd239f3df7e8b8d6958df8f2c
SHA1: 68772e09e649eca0b229976dce85d4e1c1c9b96e
SHA256: fe9702b0ec12b5d86a079f753c9e9cfe29f30714c34eb38904ea3d6a27a60961
Actions
PE Information
»
Information Value
Image Base 0x400000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x0
Size Of Uninitialized Data 0x0
Format x86
Type Unknown
Subsystem IMAGE_SUBSYSTEM_UNKNOWN
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 1970-01-01 01:00:00
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rsrc 0x400188 0x374 0x400 0x188 CNT_INITIALIZED_DATA, MEM_READ 2.27
.its 0x40055c 0x18 0x200 0x55c CNT_INITIALIZED_DATA, MEM_READ 3.18
c:\program files\common files\microsoft shared\help\hxruntime.hxs, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\hxruntime.hxs (Modified File)
c:\program files\common files\microsoft shared\help\hxruntime.hxs.[sepsis@protonmail.com].sepsis (Created File)
Size 27.40 KB
Hash Values MD5: 69b22a0aa6b2e57404fc7f60f7de9894
SHA1: 94197a64b2dcf3c09550efd309060754b0de9398
SHA256: 156fc56ce03ae51a79ef0743bdfb5fc1336717d899a6f813446dc26d75cbadbc
Actions
c:\program files\common files\microsoft shared\help\itircl55.dll
»
File Properties
Names c:\program files\common files\microsoft shared\help\itircl55.dll (Modified File)
Size 1.72 MB
Hash Values MD5: f92f9c6dafe390da792c63d84b927672
SHA1: 8eee9b85789becb184ff6576ccc1113152cf5da1
SHA256: 7804a26e4e6e682fdf642c18a3dd7bd05aea429868f0c200b061cb62afdb0729
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18001a22c
Size Of Code 0x46800
Size Of Initialized Data 0x172600
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:43:41
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x466d0 0x46800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.38
.rdata 0x180048000 0x196ac 0x19800 0x46c00 CNT_INITIALIZED_DATA, MEM_READ 3.95
.data 0x180062000 0x14d150 0x14ae00 0x60400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 5.8
.pdata 0x1801b0000 0x40bc 0x4200 0x1ab200 CNT_INITIALIZED_DATA, MEM_READ 5.51
.rsrc 0x1801b5000 0x6148 0x6200 0x1af400 CNT_INITIALIZED_DATA, MEM_READ 5.42
.reloc 0x1801bc000 0x16e0 0x1800 0x1b5600 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.39
Imports (137)
»
KERNEL32.dll (111)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LoadLibraryExW 0x0 0x180048000 0x59940 0x58540
LoadResource 0x0 0x180048008 0x59948 0x58548
SizeofResource 0x0 0x180048010 0x59950 0x58550
lstrcmpiW 0x0 0x180048018 0x59958 0x58558
lstrlenW 0x0 0x180048020 0x59960 0x58560
FindResourceW 0x0 0x180048028 0x59968 0x58568
MultiByteToWideChar 0x0 0x180048030 0x59970 0x58570
GetLocaleInfoA 0x0 0x180048038 0x59978 0x58578
GetUserDefaultLCID 0x0 0x180048040 0x59980 0x58580
GlobalAlloc 0x0 0x180048048 0x59988 0x58588
GlobalReAlloc 0x0 0x180048050 0x59990 0x58590
GlobalLock 0x0 0x180048058 0x59998 0x58598
GlobalUnlock 0x0 0x180048060 0x599a0 0x585a0
GlobalFree 0x0 0x180048068 0x599a8 0x585a8
lstrlenA 0x0 0x180048070 0x599b0 0x585b0
WideCharToMultiByte 0x0 0x180048078 0x599b8 0x585b8
GetACP 0x0 0x180048080 0x599c0 0x585c0
CompareStringA 0x0 0x180048088 0x599c8 0x585c8
LCMapStringW 0x0 0x180048090 0x599d0 0x585d0
lstrcmpiA 0x0 0x180048098 0x599d8 0x585d8
GetCurrentThreadId 0x0 0x1800480a0 0x599e0 0x585e0
FlsSetValue 0x0 0x1800480a8 0x599e8 0x585e8
GetCommandLineA 0x0 0x1800480b0 0x599f0 0x585f0
DecodePointer 0x0 0x1800480b8 0x599f8 0x585f8
EncodePointer 0x0 0x1800480c0 0x59a00 0x58600
RtlPcToFileHeader 0x0 0x1800480c8 0x59a08 0x58608
RtlLookupFunctionEntry 0x0 0x1800480d0 0x59a10 0x58610
RtlUnwindEx 0x0 0x1800480d8 0x59a18 0x58618
TerminateProcess 0x0 0x1800480e0 0x59a20 0x58620
GetCurrentProcess 0x0 0x1800480e8 0x59a28 0x58628
UnhandledExceptionFilter 0x0 0x1800480f0 0x59a30 0x58630
SetUnhandledExceptionFilter 0x0 0x1800480f8 0x59a38 0x58638
IsDebuggerPresent 0x0 0x180048100 0x59a40 0x58640
RtlVirtualUnwind 0x0 0x180048108 0x59a48 0x58648
RtlCaptureContext 0x0 0x180048110 0x59a50 0x58650
HeapFree 0x0 0x180048118 0x59a58 0x58658
HeapAlloc 0x0 0x180048120 0x59a60 0x58660
FlsGetValue 0x0 0x180048128 0x59a68 0x58668
FlsFree 0x0 0x180048130 0x59a70 0x58670
SetLastError 0x0 0x180048138 0x59a78 0x58678
FlsAlloc 0x0 0x180048140 0x59a80 0x58680
Sleep 0x0 0x180048148 0x59a88 0x58688
ExitProcess 0x0 0x180048150 0x59a90 0x58690
SetHandleCount 0x0 0x180048158 0x59a98 0x58698
GetStdHandle 0x0 0x180048160 0x59aa0 0x586a0
GetFileType 0x0 0x180048168 0x59aa8 0x586a8
GetStartupInfoW 0x0 0x180048170 0x59ab0 0x586b0
GetModuleFileNameA 0x0 0x180048178 0x59ab8 0x586b8
FreeEnvironmentStringsW 0x0 0x180048180 0x59ac0 0x586c0
GetEnvironmentStringsW 0x0 0x180048188 0x59ac8 0x586c8
HeapSetInformation 0x0 0x180048190 0x59ad0 0x586d0
GetVersion 0x0 0x180048198 0x59ad8 0x586d8
HeapCreate 0x0 0x1800481a0 0x59ae0 0x586e0
HeapDestroy 0x0 0x1800481a8 0x59ae8 0x586e8
QueryPerformanceCounter 0x0 0x1800481b0 0x59af0 0x586f0
GetTickCount 0x0 0x1800481b8 0x59af8 0x586f8
GetCurrentProcessId 0x0 0x1800481c0 0x59b00 0x58700
GetProcAddress 0x0 0x1800481c8 0x59b08 0x58708
WriteFile 0x0 0x1800481d0 0x59b10 0x58710
HeapSize 0x0 0x1800481d8 0x59b18 0x58718
HeapReAlloc 0x0 0x1800481e0 0x59b20 0x58720
GetCPInfo 0x0 0x1800481e8 0x59b28 0x58728
GetOEMCP 0x0 0x1800481f0 0x59b30 0x58730
IsValidCodePage 0x0 0x1800481f8 0x59b38 0x58738
LoadLibraryW 0x0 0x180048200 0x59b40 0x58740
SetFilePointer 0x0 0x180048208 0x59b48 0x58748
GetConsoleCP 0x0 0x180048210 0x59b50 0x58750
GetConsoleMode 0x0 0x180048218 0x59b58 0x58758
GetStringTypeW 0x0 0x180048220 0x59b60 0x58760
SetStdHandle 0x0 0x180048228 0x59b68 0x58768
WriteConsoleW 0x0 0x180048230 0x59b70 0x58770
CreateFileW 0x0 0x180048238 0x59b78 0x58778
CloseHandle 0x0 0x180048240 0x59b80 0x58780
FlushFileBuffers 0x0 0x180048248 0x59b88 0x58788
GetModuleHandleW 0x0 0x180048250 0x59b90 0x58790
GetModuleFileNameW 0x0 0x180048258 0x59b98 0x58798
FreeLibrary 0x0 0x180048260 0x59ba0 0x587a0
DisableThreadLibraryCalls 0x0 0x180048268 0x59ba8 0x587a8
GetVersionExW 0x0 0x180048270 0x59bb0 0x587b0
RaiseException 0x0 0x180048278 0x59bb8 0x587b8
DeleteCriticalSection 0x0 0x180048280 0x59bc0 0x587c0
InitializeCriticalSectionAndSpinCount 0x0 0x180048288 0x59bc8 0x587c8
LeaveCriticalSection 0x0 0x180048290 0x59bd0 0x587d0
GlobalHandle 0x0 0x180048298 0x59bd8 0x587d8
GetWindowsDirectoryA 0x0 0x1800482a0 0x59be0 0x587e0
GetFullPathNameA 0x0 0x1800482a8 0x59be8 0x587e8
GetCurrentDirectoryA 0x0 0x1800482b0 0x59bf0 0x587f0
ReadFile 0x0 0x1800482b8 0x59bf8 0x587f8
EnterCriticalSection 0x0 0x1800482c0 0x59c00 0x58800
CreateFileA 0x0 0x1800482c8 0x59c08 0x58808
GetFileSize 0x0 0x1800482d0 0x59c10 0x58810
CreateFileMappingW 0x0 0x1800482d8 0x59c18 0x58818
MapViewOfFile 0x0 0x1800482e0 0x59c20 0x58820
InitializeCriticalSection 0x0 0x1800482e8 0x59c28 0x58828
SetEvent 0x0 0x1800482f0 0x59c30 0x58830
ResetEvent 0x0 0x1800482f8 0x59c38 0x58838
WaitForSingleObject 0x0 0x180048300 0x59c40 0x58840
CreateEventW 0x0 0x180048308 0x59c48 0x58848
VirtualAlloc 0x0 0x180048310 0x59c50 0x58850
VirtualFree 0x0 0x180048318 0x59c58 0x58858
DeleteFileA 0x0 0x180048320 0x59c60 0x58860
UnmapViewOfFile 0x0 0x180048328 0x59c68 0x58868
GetTempPathA 0x0 0x180048330 0x59c70 0x58870
GetTempFileNameA 0x0 0x180048338 0x59c78 0x58878
HeapValidate 0x0 0x180048340 0x59c80 0x58880
GetProcessHeap 0x0 0x180048348 0x59c88 0x58888
GetSystemDefaultLCID 0x0 0x180048350 0x59c90 0x58890
LocalAlloc 0x0 0x180048358 0x59c98 0x58898
LoadLibraryA 0x0 0x180048360 0x59ca0 0x588a0
GetSystemTimeAsFileTime 0x0 0x180048368 0x59ca8 0x588a8
GetLastError 0x0 0x180048370 0x59cb0 0x588b0
ADVAPI32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegQueryValueExA 0x0 0x180048380 0x59cc0 0x588c0
RegQueryValueExW 0x0 0x180048388 0x59cc8 0x588c8
RegSetValueExW 0x0 0x180048390 0x59cd0 0x588d0
RegQueryInfoKeyW 0x0 0x180048398 0x59cd8 0x588d8
RegOpenKeyExW 0x0 0x1800483a0 0x59ce0 0x588e0
RegEnumKeyExW 0x0 0x1800483a8 0x59ce8 0x588e8
RegDeleteValueW 0x0 0x1800483b0 0x59cf0 0x588f0
RegDeleteKeyW 0x0 0x1800483b8 0x59cf8 0x588f8
RegCreateKeyExW 0x0 0x1800483c0 0x59d00 0x58900
RegCloseKey 0x0 0x1800483c8 0x59d08 0x58908
RegOpenKeyExA 0x0 0x1800483d0 0x59d10 0x58910
ole32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromCLSID 0x0 0x1800483e0 0x59d20 0x58920
CoGetClassObject 0x0 0x1800483e8 0x59d28 0x58928
CoTaskMemFree 0x0 0x1800483f0 0x59d30 0x58930
CoTaskMemRealloc 0x0 0x1800483f8 0x59d38 0x58938
CoTaskMemAlloc 0x0 0x180048400 0x59d40 0x58940
StringFromGUID2 0x0 0x180048408 0x59d48 0x58948
CoCreateInstance 0x0 0x180048410 0x59d50 0x58950
CLSIDFromProgID 0x0 0x180048418 0x59d58 0x58958
OLEAUT32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysFreeString 0x6 0x180048428 0x59d68 0x58968
SysAllocString 0x2 0x180048430 0x59d70 0x58970
SysStringLen 0x7 0x180048438 0x59d78 0x58978
UnRegisterTypeLib 0xba 0x180048440 0x59d80 0x58980
RegisterTypeLib 0xa3 0x180048448 0x59d88 0x58988
LoadTypeLib 0xa1 0x180048450 0x59d90 0x58990
VarUI4FromStr 0x115 0x180048458 0x59d98 0x58998
Exports (4)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180003e4c 0x1
DllGetClassObject 0x180003e28 0x2
DllRegisterServer 0x180003e98 0x3
DllUnregisterServer 0x180003eb8 0x4
Digital Signatures (2)
»
Signature Properties
LegalCopyright Copyright © Microsoft Corp.
InternalName ITIRCL55
FileVersion 5.70.51021.0
CompanyName Microsoft Corporation
ProductName Microsoft ® Infotech Technology Library
ProductVersion 5.70.51021.0
FileDescription Microsoft® InfoTech IR Local DLL
OriginalFilename ITIRCL55.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\help\itircl55.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\itircl55.dll (Modified File)
c:\program files\common files\microsoft shared\help\itircl55.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 1.72 MB
Hash Values MD5: f24d563717ee2f63156fb105458c05a6
SHA1: 4a998e2f9733e243fda92b335f5d8ca35264dde5
SHA256: 27388703598ba072ce4802e4405458cc1a6a04bf11b8f8afe3d67aa62414e201
Actions
c:\program files\common files\microsoft shared\help\keywords.hxk
»
File Properties
Names c:\program files\common files\microsoft shared\help\keywords.hxk (Modified File)
Size 0.13 KB
Hash Values MD5: 9543c1e9a5d5f39bcfbebe1a07b76826
SHA1: dc38edfb5a39e3ac7e6d42810656ec888a24146e
SHA256: ecaa81ff698af2f4d795128d0d218b4171a69cc0c6a9bdcf52c92e0fc2454ad0
Actions
c:\program files\common files\microsoft shared\help\keywords.hxk, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\keywords.hxk (Modified File)
c:\program files\common files\microsoft shared\help\keywords.hxk.[sepsis@protonmail.com].sepsis (Created File)
Size 0.31 KB
Hash Values MD5: a090c1a1b74ff8085781f2b8e9924887
SHA1: a74ae3151765acf4ea9e0b7849e8d80c9aa100e6
SHA256: b20c0c3677553e1cc34f680aa1f13e7e10650cae310f1a594290967dd16f4a60
Actions
c:\program files\common files\microsoft shared\help\msitss55.dll
»
File Properties
Names c:\program files\common files\microsoft shared\help\msitss55.dll (Modified File)
Size 434.17 KB
Hash Values MD5: a74679c355958740b5165736414df2d2
SHA1: ef5e79accbf25fb1096345ed92fcac223d4a73b6
SHA256: cbd70817a676fff0dc1d70587f28313867f9e9783bdbae2b7191301d4cbe210b
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001ecc
Size Of Code 0x45800
Size Of Initialized Data 0x26a00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:52:07
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x45700 0x45800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.32
.rdata 0x180047000 0x196e8 0x19800 0x45c00 CNT_INITIALIZED_DATA, MEM_READ 4.37
.data 0x180061000 0x4f78 0x3800 0x5f400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.16
.pdata 0x180066000 0x408c 0x4200 0x62c00 CNT_INITIALIZED_DATA, MEM_READ 5.57
.rsrc 0x18006b000 0x31c8 0x3200 0x66e00 CNT_INITIALIZED_DATA, MEM_READ 3.98
.reloc 0x18006f000 0xc10 0xe00 0x6a000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.15
Imports (147)
»
KERNEL32.dll (115)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetProcAddress 0x0 0x180047000 0x53480 0x52080
GetModuleHandleW 0x0 0x180047008 0x53488 0x52088
ExitProcess 0x0 0x180047010 0x53490 0x52090
DecodePointer 0x0 0x180047018 0x53498 0x52098
SetHandleCount 0x0 0x180047020 0x534a0 0x520a0
GetStdHandle 0x0 0x180047028 0x534a8 0x520a8
InitializeCriticalSectionAndSpinCount 0x0 0x180047030 0x534b0 0x520b0
GetFileType 0x0 0x180047038 0x534b8 0x520b8
GetStartupInfoW 0x0 0x180047040 0x534c0 0x520c0
DeleteCriticalSection 0x0 0x180047048 0x534c8 0x520c8
FreeEnvironmentStringsW 0x0 0x180047050 0x534d0 0x520d0
GetEnvironmentStringsW 0x0 0x180047058 0x534d8 0x520d8
HeapSetInformation 0x0 0x180047060 0x534e0 0x520e0
GetVersion 0x0 0x180047068 0x534e8 0x520e8
HeapCreate 0x0 0x180047070 0x534f0 0x520f0
HeapDestroy 0x0 0x180047078 0x534f8 0x520f8
QueryPerformanceCounter 0x0 0x180047080 0x53500 0x52100
GetTickCount 0x0 0x180047088 0x53508 0x52108
GetCurrentProcessId 0x0 0x180047090 0x53510 0x52110
GetSystemTimeAsFileTime 0x0 0x180047098 0x53518 0x52118
UnhandledExceptionFilter 0x0 0x1800470a0 0x53520 0x52120
SetUnhandledExceptionFilter 0x0 0x1800470a8 0x53528 0x52128
IsDebuggerPresent 0x0 0x1800470b0 0x53530 0x52130
RtlVirtualUnwind 0x0 0x1800470b8 0x53538 0x52138
RtlLookupFunctionEntry 0x0 0x1800470c0 0x53540 0x52140
RtlCaptureContext 0x0 0x1800470c8 0x53548 0x52148
TerminateProcess 0x0 0x1800470d0 0x53550 0x52150
GetCurrentProcess 0x0 0x1800470d8 0x53558 0x52158
LeaveCriticalSection 0x0 0x1800470e0 0x53560 0x52160
EnterCriticalSection 0x0 0x1800470e8 0x53568 0x52168
GetCPInfo 0x0 0x1800470f0 0x53570 0x52170
GetACP 0x0 0x1800470f8 0x53578 0x52178
GetOEMCP 0x0 0x180047100 0x53580 0x52180
IsValidCodePage 0x0 0x180047108 0x53588 0x52188
HeapAlloc 0x0 0x180047110 0x53590 0x52190
HeapReAlloc 0x0 0x180047118 0x53598 0x52198
FreeLibrary 0x0 0x180047120 0x535a0 0x521a0
LoadLibraryW 0x0 0x180047128 0x535a8 0x521a8
WriteFile 0x0 0x180047130 0x535b0 0x521b0
GetModuleFileNameW 0x0 0x180047138 0x535b8 0x521b8
LCMapStringW 0x0 0x180047140 0x535c0 0x521c0
MultiByteToWideChar 0x0 0x180047148 0x535c8 0x521c8
GetStringTypeW 0x0 0x180047150 0x535d0 0x521d0
HeapSize 0x0 0x180047158 0x535d8 0x521d8
Sleep 0x0 0x180047160 0x535e0 0x521e0
HeapFree 0x0 0x180047168 0x535e8 0x521e8
FlsAlloc 0x0 0x180047170 0x535f0 0x521f0
GetLastError 0x0 0x180047178 0x535f8 0x521f8
SetLastError 0x0 0x180047180 0x53600 0x52200
FlsFree 0x0 0x180047188 0x53608 0x52208
FlsGetValue 0x0 0x180047190 0x53610 0x52210
CreateEventW 0x0 0x180047198 0x53618 0x52218
WaitForSingleObject 0x0 0x1800471a0 0x53620 0x52220
RaiseException 0x0 0x1800471a8 0x53628 0x52228
InitializeCriticalSection 0x0 0x1800471b0 0x53630 0x52230
LoadLibraryExA 0x0 0x1800471b8 0x53638 0x52238
LoadLibraryExW 0x0 0x1800471c0 0x53640 0x52240
LoadResource 0x0 0x1800471c8 0x53648 0x52248
SizeofResource 0x0 0x1800471d0 0x53650 0x52250
lstrcmpiW 0x0 0x1800471d8 0x53658 0x52258
lstrlenW 0x0 0x1800471e0 0x53660 0x52260
FindResourceW 0x0 0x1800471e8 0x53668 0x52268
GetLocaleInfoA 0x0 0x1800471f0 0x53670 0x52270
GetUserDefaultLCID 0x0 0x1800471f8 0x53678 0x52278
GetFileAttributesA 0x0 0x180047200 0x53680 0x52280
GetFileAttributesW 0x0 0x180047208 0x53688 0x52288
GetFullPathNameA 0x0 0x180047210 0x53690 0x52290
GetFullPathNameW 0x0 0x180047218 0x53698 0x52298
DeleteFileA 0x0 0x180047220 0x536a0 0x522a0
GetTempPathA 0x0 0x180047228 0x536a8 0x522a8
GetTempFileNameA 0x0 0x180047230 0x536b0 0x522b0
MoveFileA 0x0 0x180047238 0x536b8 0x522b8
FlushFileBuffers 0x0 0x180047240 0x536c0 0x522c0
GetFileSize 0x0 0x180047248 0x536c8 0x522c8
GetFileTime 0x0 0x180047250 0x536d0 0x522d0
LockFile 0x0 0x180047258 0x536d8 0x522d8
ReadFile 0x0 0x180047260 0x536e0 0x522e0
SetEndOfFile 0x0 0x180047268 0x536e8 0x522e8
SetFilePointer 0x0 0x180047270 0x536f0 0x522f0
SetFileTime 0x0 0x180047278 0x536f8 0x522f8
UnlockFile 0x0 0x180047280 0x53700 0x52300
CloseHandle 0x0 0x180047288 0x53708 0x52308
CreateFileA 0x0 0x180047290 0x53710 0x52310
DeleteFileW 0x0 0x180047298 0x53718 0x52318
GetDriveTypeA 0x0 0x1800472a0 0x53720 0x52320
CreateFileMappingW 0x0 0x1800472a8 0x53728 0x52328
MapViewOfFile 0x0 0x1800472b0 0x53730 0x52330
UnmapViewOfFile 0x0 0x1800472b8 0x53738 0x52338
MoveFileW 0x0 0x1800472c0 0x53740 0x52340
GetVolumeInformationA 0x0 0x1800472c8 0x53748 0x52348
GetCurrentDirectoryA 0x0 0x1800472d0 0x53750 0x52350
CreateDirectoryA 0x0 0x1800472d8 0x53758 0x52358
FindClose 0x0 0x1800472e0 0x53760 0x52360
FindFirstFileA 0x0 0x1800472e8 0x53768 0x52368
FindNextFileA 0x0 0x1800472f0 0x53770 0x52370
GlobalMemoryStatus 0x0 0x1800472f8 0x53778 0x52378
LocalAlloc 0x0 0x180047300 0x53780 0x52380
LoadLibraryA 0x0 0x180047308 0x53788 0x52388
RtlPcToFileHeader 0x0 0x180047310 0x53790 0x52390
EncodePointer 0x0 0x180047318 0x53798 0x52398
RtlUnwindEx 0x0 0x180047320 0x537a0 0x523a0
GetCommandLineA 0x0 0x180047328 0x537a8 0x523a8
FlsSetValue 0x0 0x180047330 0x537b0 0x523b0
GetCurrentThreadId 0x0 0x180047338 0x537b8 0x523b8
WideCharToMultiByte 0x0 0x180047340 0x537c0 0x523c0
lstrlenA 0x0 0x180047348 0x537c8 0x523c8
GetModuleFileNameA 0x0 0x180047350 0x537d0 0x523d0
ResetEvent 0x0 0x180047358 0x537d8 0x523d8
SetEvent 0x0 0x180047360 0x537e0 0x523e0
GetVersionExW 0x0 0x180047368 0x537e8 0x523e8
GetFileAttributesExW 0x0 0x180047370 0x537f0 0x523f0
GetFileAttributesExA 0x0 0x180047378 0x537f8 0x523f8
CreateFileW 0x0 0x180047380 0x53800 0x52400
GetProcessHeap 0x0 0x180047388 0x53808 0x52408
HeapValidate 0x0 0x180047390 0x53810 0x52410
ADVAPI32.dll (15)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegCreateKeyExA 0x0 0x1800473a0 0x53820 0x52420
RegSetValueExW 0x0 0x1800473a8 0x53828 0x52428
RegQueryInfoKeyW 0x0 0x1800473b0 0x53830 0x52430
RegOpenKeyExW 0x0 0x1800473b8 0x53838 0x52438
RegEnumKeyExW 0x0 0x1800473c0 0x53840 0x52440
RegDeleteValueW 0x0 0x1800473c8 0x53848 0x52448
RegDeleteKeyW 0x0 0x1800473d0 0x53850 0x52450
RegCreateKeyExW 0x0 0x1800473d8 0x53858 0x52458
RegSetValueExA 0x0 0x1800473e0 0x53860 0x52460
RegQueryValueExA 0x0 0x1800473e8 0x53868 0x52468
RegOpenKeyExA 0x0 0x1800473f0 0x53870 0x52470
RegEnumKeyExA 0x0 0x1800473f8 0x53878 0x52478
RegDeleteKeyA 0x0 0x180047400 0x53880 0x52480
RegQueryValueExW 0x0 0x180047408 0x53888 0x52488
RegCloseKey 0x0 0x180047410 0x53890 0x52490
ole32.dll (10)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CLSIDFromString 0x0 0x180047420 0x538a0 0x524a0
CreateBindCtx 0x0 0x180047428 0x538a8 0x524a8
CoTaskMemFree 0x0 0x180047430 0x538b0 0x524b0
CoTaskMemRealloc 0x0 0x180047438 0x538b8 0x524b8
CoTaskMemAlloc 0x0 0x180047440 0x538c0 0x524c0
CoCreateInstance 0x0 0x180047448 0x538c8 0x524c8
CoGetMalloc 0x0 0x180047450 0x538d0 0x524d0
StringFromGUID2 0x0 0x180047458 0x538d8 0x524d8
CoGetClassObject 0x0 0x180047460 0x538e0 0x524e0
StringFromCLSID 0x0 0x180047468 0x538e8 0x524e8
OLEAUT32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LoadTypeLib 0xa1 0x180047478 0x538f8 0x524f8
RegisterTypeLib 0xa3 0x180047480 0x53900 0x52500
UnRegisterTypeLib 0xba 0x180047488 0x53908 0x52508
SysStringLen 0x7 0x180047490 0x53910 0x52510
SysFreeString 0x6 0x180047498 0x53918 0x52518
SysAllocString 0x2 0x1800474a0 0x53920 0x52520
VarUI4FromStr 0x115 0x1800474a8 0x53928 0x52528
Exports (6)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x1800014a4 0x2
DllGetClassObject 0x1800014b8 0x3
DllMain 0x180001000 0x4
DllRegisterServer 0x180001074 0x5
DllUnregisterServer 0x1800013d4 0x6
WMCreateStreamForURL 0x180001c48 0x1
Icons (6)
»
Digital Signatures (2)
»
Signature Properties
LegalCopyright Copyright © Microsoft Corp.
InternalName MSITSS
FileVersion 5.70.51021.0
CompanyName Microsoft Corporation
ProductName Microsoft(R) Infotech Information Storage System Library
ProductVersion 5.70.51021.0
FileDescription Microsoft® InfoTech Storage System Library
OriginalFilename MSITSS.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\help\msitss55.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\msitss55.dll (Modified File)
c:\program files\common files\microsoft shared\help\msitss55.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 434.35 KB
Hash Values MD5: 1764fad1c166cb87ce23f9a2a73b5b5f
SHA1: a358df20202c117d1a93b654a9e4f1ff236f66f4
SHA256: f1e1d4301138e16d80d1e208185c0a622c6f4a818d9b8c95d78b23cd3c9b1114
Actions
c:\program files\common files\microsoft shared\help\namedurls.hxk
»
File Properties
Names c:\program files\common files\microsoft shared\help\namedurls.hxk (Modified File)
Size 0.14 KB
Hash Values MD5: 67d7183cf742812fe8f2466eebdb114c
SHA1: 465770f3be0a5a578e0a1776f4c4e7238caceeac
SHA256: 7ac8ae8fbf69e7dcba2dfc3b74c7f1ea9ca1fe85b73d0c096b8cf5d80e036931
Actions
c:\program files\common files\microsoft shared\help\namedurls.hxk, ...
»
File Properties
Names c:\program files\common files\microsoft shared\help\namedurls.hxk (Modified File)
c:\program files\common files\microsoft shared\help\namedurls.hxk.[sepsis@protonmail.com].sepsis (Created File)
Size 0.31 KB
Hash Values MD5: c29d9f7f3aff22bc50b2e2bf802b5fc2
SHA1: 90b22a9ecfb0de25572bbb448c91bff1c2eff84d
SHA256: f27c7a2b9e3653570e783d532f65b1818eee9dc4f550f35e036d03b91eb88e17
Actions
c:\program files\common files\microsoft shared\msclientdatamgr\mscdm.dll
»
File Properties
Names c:\program files\common files\microsoft shared\msclientdatamgr\mscdm.dll (Modified File)
Size 474.17 KB
Hash Values MD5: 5b80f96d7c2f1bab0df4a29f6761f9af
SHA1: 3254803fe75a88b45fc9f728c7bf00990167b607
SHA256: 28fafc6faf5765db748c736ac82c49d9cc8c32b5a6cab842dd7357484f9878b4
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800484d0
Size Of Code 0x4a400
Size Of Initialized Data 0x2ae00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:48:15
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x4a21c 0x4a400 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.18
.rdata 0x18004c000 0x203c8 0x20400 0x4a800 CNT_INITIALIZED_DATA, MEM_READ 4.05
.data 0x18006d000 0x3cb0 0x3600 0x6ac00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.37
.pdata 0x180071000 0x4110 0x4200 0x6e200 CNT_INITIALIZED_DATA, MEM_READ 5.45
.rsrc 0x180076000 0x1148 0x1200 0x72400 CNT_INITIALIZED_DATA, MEM_READ 4.17
.reloc 0x180078000 0x1678 0x1800 0x73600 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.36
Imports (145)
»
MSVCR100.dll (40)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18004c000 0x5f968 0x5e168
__clean_type_info_names_internal 0x0 0x18004c008 0x5f970 0x5e170
__crt_debugger_hook 0x0 0x18004c010 0x5f978 0x5e178
_onexit 0x0 0x18004c018 0x5f980 0x5e180
_lock 0x0 0x18004c020 0x5f988 0x5e188
__dllonexit 0x0 0x18004c028 0x5f990 0x5e190
_unlock 0x0 0x18004c030 0x5f998 0x5e198
?terminate@@YAXXZ 0x0 0x18004c038 0x5f9a0 0x5e1a0
__CppXcptFilter 0x0 0x18004c040 0x5f9a8 0x5e1a8
__C_specific_handler 0x0 0x18004c048 0x5f9b0 0x5e1b0
_amsg_exit 0x0 0x18004c050 0x5f9b8 0x5e1b8
_encoded_null 0x0 0x18004c058 0x5f9c0 0x5e1c0
_initterm_e 0x0 0x18004c060 0x5f9c8 0x5e1c8
_initterm 0x0 0x18004c068 0x5f9d0 0x5e1d0
_malloc_crt 0x0 0x18004c070 0x5f9d8 0x5e1d8
vswprintf_s 0x0 0x18004c078 0x5f9e0 0x5e1e0
calloc 0x0 0x18004c080 0x5f9e8 0x5e1e8
_vsnwprintf_s 0x0 0x18004c088 0x5f9f0 0x5e1f0
_wtol 0x0 0x18004c090 0x5f9f8 0x5e1f8
??_V@YAXPEAX@Z 0x0 0x18004c098 0x5fa00 0x5e200
??2@YAPEAX_K@Z 0x0 0x18004c0a0 0x5fa08 0x5e208
memcpy_s 0x0 0x18004c0a8 0x5fa10 0x5e210
wcscat_s 0x0 0x18004c0b0 0x5fa18 0x5e218
wcscpy_s 0x0 0x18004c0b8 0x5fa20 0x5e220
wcsncpy_s 0x0 0x18004c0c0 0x5fa28 0x5e228
wcsstr 0x0 0x18004c0c8 0x5fa30 0x5e230
free 0x0 0x18004c0d0 0x5fa38 0x5e238
malloc 0x0 0x18004c0d8 0x5fa40 0x5e240
_recalloc 0x0 0x18004c0e0 0x5fa48 0x5e248
??_U@YAPEAX_K@Z 0x0 0x18004c0e8 0x5fa50 0x5e250
__CxxFrameHandler3 0x0 0x18004c0f0 0x5fa58 0x5e258
memset 0x0 0x18004c0f8 0x5fa60 0x5e260
iswspace 0x0 0x18004c100 0x5fa68 0x5e268
memcpy 0x0 0x18004c108 0x5fa70 0x5e270
realloc 0x0 0x18004c110 0x5fa78 0x5e278
memcmp 0x0 0x18004c118 0x5fa80 0x5e280
memmove 0x0 0x18004c120 0x5fa88 0x5e288
wcschr 0x0 0x18004c128 0x5fa90 0x5e290
wcscspn 0x0 0x18004c130 0x5fa98 0x5e298
??3@YAXPEAX@Z 0x0 0x18004c138 0x5faa0 0x5e2a0
KERNEL32.dll (51)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetSystemTimeAsFileTime 0x0 0x18004c148 0x5fab0 0x5e2b0
LocalAlloc 0x0 0x18004c150 0x5fab8 0x5e2b8
RtlCaptureContext 0x0 0x18004c158 0x5fac0 0x5e2c0
RtlLookupFunctionEntry 0x0 0x18004c160 0x5fac8 0x5e2c8
RtlVirtualUnwind 0x0 0x18004c168 0x5fad0 0x5e2d0
IsDebuggerPresent 0x0 0x18004c170 0x5fad8 0x5e2d8
SetUnhandledExceptionFilter 0x0 0x18004c178 0x5fae0 0x5e2e0
UnhandledExceptionFilter 0x0 0x18004c180 0x5fae8 0x5e2e8
GetCurrentProcess 0x0 0x18004c188 0x5faf0 0x5e2f0
TerminateProcess 0x0 0x18004c190 0x5faf8 0x5e2f8
DecodePointer 0x0 0x18004c198 0x5fb00 0x5e300
EncodePointer 0x0 0x18004c1a0 0x5fb08 0x5e308
HeapFree 0x0 0x18004c1a8 0x5fb10 0x5e310
HeapAlloc 0x0 0x18004c1b0 0x5fb18 0x5e318
WerRegisterMemoryBlock 0x0 0x18004c1b8 0x5fb20 0x5e320
VirtualProtect 0x0 0x18004c1c0 0x5fb28 0x5e328
GetTickCount 0x0 0x18004c1c8 0x5fb30 0x5e330
LoadLibraryA 0x0 0x18004c1d0 0x5fb38 0x5e338
GetCurrentProcessId 0x0 0x18004c1d8 0x5fb40 0x5e340
HeapSetInformation 0x0 0x18004c1e0 0x5fb48 0x5e348
GetProcessHeap 0x0 0x18004c1e8 0x5fb50 0x5e350
QueryPerformanceCounter 0x0 0x18004c1f0 0x5fb58 0x5e358
RaiseException 0x0 0x18004c1f8 0x5fb60 0x5e360
GetLastError 0x0 0x18004c200 0x5fb68 0x5e368
EnterCriticalSection 0x0 0x18004c208 0x5fb70 0x5e370
LeaveCriticalSection 0x0 0x18004c210 0x5fb78 0x5e378
InitializeCriticalSectionAndSpinCount 0x0 0x18004c218 0x5fb80 0x5e380
DeleteCriticalSection 0x0 0x18004c220 0x5fb88 0x5e388
DisableThreadLibraryCalls 0x0 0x18004c228 0x5fb90 0x5e390
FreeLibrary 0x0 0x18004c230 0x5fb98 0x5e398
GetModuleFileNameW 0x0 0x18004c238 0x5fba0 0x5e3a0
GetModuleHandleW 0x0 0x18004c240 0x5fba8 0x5e3a8
GetProcAddress 0x0 0x18004c248 0x5fbb0 0x5e3b0
LoadLibraryExW 0x0 0x18004c250 0x5fbb8 0x5e3b8
LoadResource 0x0 0x18004c258 0x5fbc0 0x5e3c0
SizeofResource 0x0 0x18004c260 0x5fbc8 0x5e3c8
lstrcmpiW 0x0 0x18004c268 0x5fbd0 0x5e3d0
lstrlenW 0x0 0x18004c270 0x5fbd8 0x5e3d8
FindResourceW 0x0 0x18004c278 0x5fbe0 0x5e3e0
MultiByteToWideChar 0x0 0x18004c280 0x5fbe8 0x5e3e8
WaitForSingleObject 0x0 0x18004c288 0x5fbf0 0x5e3f0
GetCurrentThreadId 0x0 0x18004c290 0x5fbf8 0x5e3f8
GetSystemDefaultLCID 0x0 0x18004c298 0x5fc00 0x5e400
SetEvent 0x0 0x18004c2a0 0x5fc08 0x5e408
WaitForMultipleObjects 0x0 0x18004c2a8 0x5fc10 0x5e410
Sleep 0x0 0x18004c2b0 0x5fc18 0x5e418
CompareStringW 0x0 0x18004c2b8 0x5fc20 0x5e420
WideCharToMultiByte 0x0 0x18004c2c0 0x5fc28 0x5e428
GetUserDefaultLCID 0x0 0x18004c2c8 0x5fc30 0x5e430
InitializeCriticalSection 0x0 0x18004c2d0 0x5fc38 0x5e438
GetModuleFileNameA 0x0 0x18004c2d8 0x5fc40 0x5e440
ole32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoCreateGuid 0x0 0x18004c2e8 0x5fc50 0x5e450
CoTaskMemFree 0x0 0x18004c2f0 0x5fc58 0x5e458
CoTaskMemRealloc 0x0 0x18004c2f8 0x5fc60 0x5e460
StringFromCLSID 0x0 0x18004c300 0x5fc68 0x5e468
CoGetMalloc 0x0 0x18004c308 0x5fc70 0x5e470
CoCreateInstance 0x0 0x18004c310 0x5fc78 0x5e478
CoTaskMemAlloc 0x0 0x18004c318 0x5fc80 0x5e480
StringFromGUID2 0x0 0x18004c320 0x5fc88 0x5e488
OLEAUT32.dll (25)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VariantClear 0x9 0x18004c330 0x5fc98 0x5e498
VariantCopy 0xa 0x18004c338 0x5fca0 0x5e4a0
VariantInit 0x8 0x18004c340 0x5fca8 0x5e4a8
VarCmp 0xb0 0x18004c348 0x5fcb0 0x5e4b0
SysAllocStringLen 0x4 0x18004c350 0x5fcb8 0x5e4b8
SysStringByteLen 0x95 0x18004c358 0x5fcc0 0x5e4c0
SysAllocStringByteLen 0x96 0x18004c360 0x5fcc8 0x5e4c8
VariantChangeType 0xc 0x18004c368 0x5fcd0 0x5e4d0
VarSub 0x9f 0x18004c370 0x5fcd8 0x5e4d8
SafeArrayDestroy 0x10 0x18004c378 0x5fce0 0x5e4e0
SafeArrayGetUBound 0x13 0x18004c380 0x5fce8 0x5e4e8
SafeArrayGetElement 0x19 0x18004c388 0x5fcf0 0x5e4f0
VarBstrCmp 0x13a 0x18004c390 0x5fcf8 0x5e4f8
SetErrorInfo 0xc9 0x18004c398 0x5fd00 0x5e500
GetErrorInfo 0xc8 0x18004c3a0 0x5fd08 0x5e508
CreateErrorInfo 0xca 0x18004c3a8 0x5fd10 0x5e510
VariantChangeTypeEx 0x93 0x18004c3b0 0x5fd18 0x5e518
UnRegisterTypeLib 0xba 0x18004c3b8 0x5fd20 0x5e520
RegisterTypeLib 0xa3 0x18004c3c0 0x5fd28 0x5e528
LoadTypeLib 0xa1 0x18004c3c8 0x5fd30 0x5e530
VarUI4FromStr 0x115 0x18004c3d0 0x5fd38 0x5e538
SysStringLen 0x7 0x18004c3d8 0x5fd40 0x5e540
SysAllocString 0x2 0x18004c3e0 0x5fd48 0x5e548
SysFreeString 0x6 0x18004c3e8 0x5fd50 0x5e550
VarAdd 0x8d 0x18004c3f0 0x5fd58 0x5e558
ADVAPI32.dll (17)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegOpenKeyExA 0x0 0x18004c400 0x5fd68 0x5e568
RegCreateKeyExW 0x0 0x18004c408 0x5fd70 0x5e570
RegDeleteKeyW 0x0 0x18004c410 0x5fd78 0x5e578
ReportEventW 0x0 0x18004c418 0x5fd80 0x5e580
RegisterEventSourceW 0x0 0x18004c420 0x5fd88 0x5e588
DeregisterEventSource 0x0 0x18004c428 0x5fd90 0x5e590
RegSetValueExA 0x0 0x18004c430 0x5fd98 0x5e598
RegQueryValueExW 0x0 0x18004c438 0x5fda0 0x5e5a0
RegQueryValueExA 0x0 0x18004c440 0x5fda8 0x5e5a8
RegCloseKey 0x0 0x18004c448 0x5fdb0 0x5e5b0
RegDeleteKeyA 0x0 0x18004c450 0x5fdb8 0x5e5b8
RegCreateKeyExA 0x0 0x18004c458 0x5fdc0 0x5e5c0
RegSetValueExW 0x0 0x18004c460 0x5fdc8 0x5e5c8
RegQueryInfoKeyW 0x0 0x18004c468 0x5fdd0 0x5e5d0
RegOpenKeyExW 0x0 0x18004c470 0x5fdd8 0x5e5d8
RegEnumKeyExW 0x0 0x18004c478 0x5fde0 0x5e5e0
RegDeleteValueW 0x0 0x18004c480 0x5fde8 0x5e5e8
mfc100u.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0xcdc 0x18004c490 0x5fdf8 0x5e5f8
(by ordinal) 0x7ed 0x18004c498 0x5fe00 0x5e600
(by ordinal) 0x7e7 0x18004c4a0 0x5fe08 0x5e608
(by ordinal) 0x7e9 0x18004c4a8 0x5fe10 0x5e610
Exports (5)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180034618 0xd
DllGetClassObject 0x180034370 0xe
DllMain 0x1800348e0 0xc
DllRegisterServer 0x180034670 0xf
DllUnregisterServer 0x180034824 0x10
Digital Signatures (2)
»
Signature Properties
InternalName Microsoft Client Data Manager
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsot Office System 2007 Client Data Manager
OriginalFilename MSCDM.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\msclientdatamgr\mscdm.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\msclientdatamgr\mscdm.dll (Modified File)
c:\program files\common files\microsoft shared\msclientdatamgr\mscdm.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 474.35 KB
Hash Values MD5: 1e53c61737cdd277038516efce7e5a2f
SHA1: 93e625cd64dbf7459de2e5be89263bbf37199ccc
SHA256: 662dbbcd37052dbe3271e56f84a0796cd5d957e51de199c29b90ab2a5e245d8e
Actions
c:\program files\common files\microsoft shared\office15\1033\aceintl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\aceintl.dll (Modified File)
Size 196.70 KB
Hash Values MD5: ed0f71ba2445385829287a632e7c8c5f
SHA1: bb28e5d9f397cba17fa0f3eac30b9383ed1f4c49
SHA256: 65cceebd453d0ccf88114f4db6d17bbf4580d41197a83ccb19b812be88da24a6
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800010f8
Size Of Code 0xe00
Size Of Initialized Data 0x2ea00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:50:10
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xc60 0xe00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.55
.rdata 0x180002000 0x78c 0x800 0x1200 CNT_INITIALIZED_DATA, MEM_READ 4.31
.data 0x180003000 0x5c0 0x200 0x1a00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.23
.pdata 0x180004000 0x120 0x200 0x1c00 CNT_INITIALIZED_DATA, MEM_READ 2.37
.rsrc 0x180005000 0x2d73c 0x2d800 0x1e00 CNT_INITIALIZED_DATA, MEM_READ 3.42
.reloc 0x180033000 0x10 0x200 0x2f600 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.15
Imports (39)
»
MSVCR100.dll (15)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180002000 0x2260 0x1460
_lock 0x0 0x180002008 0x2268 0x1468
__dllonexit 0x0 0x180002010 0x2270 0x1470
_unlock 0x0 0x180002018 0x2278 0x1478
__clean_type_info_names_internal 0x0 0x180002020 0x2280 0x1480
__crt_debugger_hook 0x0 0x180002028 0x2288 0x1488
__CppXcptFilter 0x0 0x180002030 0x2290 0x1490
__C_specific_handler 0x0 0x180002038 0x2298 0x1498
_amsg_exit 0x0 0x180002040 0x22a0 0x14a0
_encoded_null 0x0 0x180002048 0x22a8 0x14a8
free 0x0 0x180002050 0x22b0 0x14b0
_initterm_e 0x0 0x180002058 0x22b8 0x14b8
_initterm 0x0 0x180002060 0x22c0 0x14c0
_malloc_crt 0x0 0x180002068 0x22c8 0x14c8
memcpy 0x0 0x180002070 0x22d0 0x14d0
KERNEL32.dll (24)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
QueryPerformanceCounter 0x0 0x180002080 0x22e0 0x14e0
RtlCaptureContext 0x0 0x180002088 0x22e8 0x14e8
RtlLookupFunctionEntry 0x0 0x180002090 0x22f0 0x14f0
RtlVirtualUnwind 0x0 0x180002098 0x22f8 0x14f8
IsDebuggerPresent 0x0 0x1800020a0 0x2300 0x1500
SetUnhandledExceptionFilter 0x0 0x1800020a8 0x2308 0x1508
UnhandledExceptionFilter 0x0 0x1800020b0 0x2310 0x1510
GetCurrentProcess 0x0 0x1800020b8 0x2318 0x1518
TerminateProcess 0x0 0x1800020c0 0x2320 0x1520
Sleep 0x0 0x1800020c8 0x2328 0x1528
DecodePointer 0x0 0x1800020d0 0x2330 0x1530
EncodePointer 0x0 0x1800020d8 0x2338 0x1538
WerRegisterMemoryBlock 0x0 0x1800020e0 0x2340 0x1540
VirtualProtect 0x0 0x1800020e8 0x2348 0x1548
GetTickCount 0x0 0x1800020f0 0x2350 0x1550
GetSystemTimeAsFileTime 0x0 0x1800020f8 0x2358 0x1558
DisableThreadLibraryCalls 0x0 0x180002100 0x2360 0x1560
LoadResource 0x0 0x180002108 0x2368 0x1568
LockResource 0x0 0x180002110 0x2370 0x1570
FindResourceA 0x0 0x180002118 0x2378 0x1578
GetProcessHeap 0x0 0x180002120 0x2380 0x1580
HeapSetInformation 0x0 0x180002128 0x2388 0x1588
GetCurrentProcessId 0x0 0x180002130 0x2390 0x1590
GetCurrentThreadId 0x0 0x180002138 0x2398 0x1598
Exports (1)
»
Api name EAT Address Ordinal
CchLszOfId2 0x180001000 0x2
Digital Signatures (2)
»
Signature Properties
InternalName aceintl
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Access database engine International DLL
OriginalFilename aceintl.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\aceintl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\aceintl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\aceintl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 196.87 KB
Hash Values MD5: be8c8fea5988a4e1f7f26d8eea4edfcf
SHA1: ac03db4447aebce19ecaf6d371c6c7d10442255e
SHA256: 6238344ffc7f7d2338349d4b4447ed5331e3a0cd0caaa8dae58a7dec6b0d8a11
Actions
c:\program files\common files\microsoft shared\office15\1033\aceodbci.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\aceodbci.dll (Modified File)
Size 52.19 KB
Hash Values MD5: 10544b35237102a985b5f53d666424d4
SHA1: bb00a347c06c3408c2c7d7314a582cd5da09c272
SHA256: ab8a0622e935c69e8d4ba839f06153e5230dcd684939270630dc2fddebb87d5a
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001538
Size Of Code 0xc00
Size Of Initialized Data 0xaa00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:33:48
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xaf8 0xc00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.62
.rdata 0x180002000 0xea4 0x1000 0x1000 CNT_INITIALIZED_DATA, MEM_READ 2.27
.data 0x180003000 0x5c0 0x200 0x2000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.23
.pdata 0x180004000 0xe4 0x200 0x2200 CNT_INITIALIZED_DATA, MEM_READ 1.87
.rsrc 0x180005000 0x8e28 0x9000 0x2400 CNT_INITIALIZED_DATA, MEM_READ 3.66
.reloc 0x18000e000 0x10 0x200 0xb400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.15
Imports (34)
»
MSVCR100.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180002000 0x2a18 0x1a18
_lock 0x0 0x180002008 0x2a20 0x1a20
__dllonexit 0x0 0x180002010 0x2a28 0x1a28
_unlock 0x0 0x180002018 0x2a30 0x1a30
__clean_type_info_names_internal 0x0 0x180002020 0x2a38 0x1a38
__crt_debugger_hook 0x0 0x180002028 0x2a40 0x1a40
__CppXcptFilter 0x0 0x180002030 0x2a48 0x1a48
__C_specific_handler 0x0 0x180002038 0x2a50 0x1a50
_amsg_exit 0x0 0x180002040 0x2a58 0x1a58
_encoded_null 0x0 0x180002048 0x2a60 0x1a60
free 0x0 0x180002050 0x2a68 0x1a68
_initterm_e 0x0 0x180002058 0x2a70 0x1a70
_initterm 0x0 0x180002060 0x2a78 0x1a78
_malloc_crt 0x0 0x180002068 0x2a80 0x1a80
KERNEL32.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetCurrentProcessId 0x0 0x180002078 0x2a90 0x1a90
RtlCaptureContext 0x0 0x180002080 0x2a98 0x1a98
RtlLookupFunctionEntry 0x0 0x180002088 0x2aa0 0x1aa0
RtlVirtualUnwind 0x0 0x180002090 0x2aa8 0x1aa8
IsDebuggerPresent 0x0 0x180002098 0x2ab0 0x1ab0
SetUnhandledExceptionFilter 0x0 0x1800020a0 0x2ab8 0x1ab8
UnhandledExceptionFilter 0x0 0x1800020a8 0x2ac0 0x1ac0
GetCurrentProcess 0x0 0x1800020b0 0x2ac8 0x1ac8
TerminateProcess 0x0 0x1800020b8 0x2ad0 0x1ad0
Sleep 0x0 0x1800020c0 0x2ad8 0x1ad8
DecodePointer 0x0 0x1800020c8 0x2ae0 0x1ae0
EncodePointer 0x0 0x1800020d0 0x2ae8 0x1ae8
WerRegisterMemoryBlock 0x0 0x1800020d8 0x2af0 0x1af0
VirtualProtect 0x0 0x1800020e0 0x2af8 0x1af8
GetTickCount 0x0 0x1800020e8 0x2b00 0x1b00
QueryPerformanceCounter 0x0 0x1800020f0 0x2b08 0x1b08
GetProcessHeap 0x0 0x1800020f8 0x2b10 0x1b10
HeapSetInformation 0x0 0x180002100 0x2b18 0x1b18
GetCurrentThreadId 0x0 0x180002108 0x2b20 0x1b20
GetSystemTimeAsFileTime 0x0 0x180002110 0x2b28 0x1b28
Exports (2)
»
Api name EAT Address Ordinal
DllMain 0x180001000 0x1f4
IntlLibHinst 0x180001018 0x1
Digital Signatures (2)
»
Signature Properties
InternalName aceodbci
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Access database engine ODBC International DLL
OriginalFilename aceodbci.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\aceodbci.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\aceodbci.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\aceodbci.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 52.36 KB
Hash Values MD5: 9e9e7daf3a4499bf1a0b01b5a0b31d24
SHA1: db30fdf794c98a834239bd948b6ca328df366b74
SHA256: 1a80a33aaad3e641ea485158a127bfc2ba07c55aae05e823b71226ea6b96bf95
Actions
c:\program files\common files\microsoft shared\office15\1033\acewstr.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\acewstr.dll (Modified File)
Size 839.17 KB
Hash Values MD5: 10ed6c90286e20b5775f08ce51dab3fc
SHA1: 5aef92733452f766d524fc2f9433e02db6e5fb98
SHA256: b6e6ca83d7c32093ad31db94e75b4837f2851a7e21c4467bf37f26d268830606
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800021f0
Size Of Code 0x6600
Size Of Initialized Data 0xc9e00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:39:20
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x65a4 0x6600 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.45
.rdata 0x180008000 0x122c 0x1400 0x6a00 CNT_INITIALIZED_DATA, MEM_READ 3.97
.data 0x18000a000 0xc7640 0xc7200 0x7e00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.81
.pdata 0x1800d2000 0x318 0x400 0xcf000 CNT_INITIALIZED_DATA, MEM_READ 3.53
.rsrc 0x1800d3000 0xb64 0xc00 0xcf400 CNT_INITIALIZED_DATA, MEM_READ 3.39
.reloc 0x1800d4000 0x80 0x200 0xd0000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 1.71
Imports (58)
»
MSVCR100.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180008000 0x8980 0x7380
_lock 0x0 0x180008008 0x8988 0x7388
__dllonexit 0x0 0x180008010 0x8990 0x7390
_unlock 0x0 0x180008018 0x8998 0x7398
__clean_type_info_names_internal 0x0 0x180008020 0x89a0 0x73a0
__crt_debugger_hook 0x0 0x180008028 0x89a8 0x73a8
__CppXcptFilter 0x0 0x180008030 0x89b0 0x73b0
_amsg_exit 0x0 0x180008038 0x89b8 0x73b8
_encoded_null 0x0 0x180008040 0x89c0 0x73c0
_initterm_e 0x0 0x180008048 0x89c8 0x73c8
_initterm 0x0 0x180008050 0x89d0 0x73d0
_malloc_crt 0x0 0x180008058 0x89d8 0x73d8
__C_specific_handler 0x0 0x180008060 0x89e0 0x73e0
wcsrchr 0x0 0x180008068 0x89e8 0x73e8
memmove 0x0 0x180008070 0x89f0 0x73f0
memset 0x0 0x180008078 0x89f8 0x73f8
memcpy 0x0 0x180008080 0x8a00 0x7400
malloc 0x0 0x180008088 0x8a08 0x7408
free 0x0 0x180008090 0x8a10 0x7410
wcsncat_s 0x0 0x180008098 0x8a18 0x7418
KERNEL32.dll (38)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GlobalAlloc 0x0 0x1800080a8 0x8a28 0x7428
RtlCaptureContext 0x0 0x1800080b0 0x8a30 0x7430
RtlLookupFunctionEntry 0x0 0x1800080b8 0x8a38 0x7438
RtlVirtualUnwind 0x0 0x1800080c0 0x8a40 0x7440
IsDebuggerPresent 0x0 0x1800080c8 0x8a48 0x7448
SetUnhandledExceptionFilter 0x0 0x1800080d0 0x8a50 0x7450
UnhandledExceptionFilter 0x0 0x1800080d8 0x8a58 0x7458
GetCurrentProcess 0x0 0x1800080e0 0x8a60 0x7460
TerminateProcess 0x0 0x1800080e8 0x8a68 0x7468
Sleep 0x0 0x1800080f0 0x8a70 0x7470
DecodePointer 0x0 0x1800080f8 0x8a78 0x7478
EncodePointer 0x0 0x180008100 0x8a80 0x7480
WerRegisterMemoryBlock 0x0 0x180008108 0x8a88 0x7488
VirtualProtect 0x0 0x180008110 0x8a90 0x7490
GetTickCount 0x0 0x180008118 0x8a98 0x7498
GetSystemTimeAsFileTime 0x0 0x180008120 0x8aa0 0x74a0
GetCurrentThreadId 0x0 0x180008128 0x8aa8 0x74a8
GetCurrentProcessId 0x0 0x180008130 0x8ab0 0x74b0
HeapSetInformation 0x0 0x180008138 0x8ab8 0x74b8
GetProcessHeap 0x0 0x180008140 0x8ac0 0x74c0
QueryPerformanceCounter 0x0 0x180008148 0x8ac8 0x74c8
InitializeCriticalSection 0x0 0x180008150 0x8ad0 0x74d0
EnterCriticalSection 0x0 0x180008158 0x8ad8 0x74d8
LeaveCriticalSection 0x0 0x180008160 0x8ae0 0x74e0
DeleteCriticalSection 0x0 0x180008168 0x8ae8 0x74e8
FreeLibrary 0x0 0x180008170 0x8af0 0x74f0
GetModuleFileNameW 0x0 0x180008178 0x8af8 0x74f8
GetProcAddress 0x0 0x180008180 0x8b00 0x7500
LoadResource 0x0 0x180008188 0x8b08 0x7508
LockResource 0x0 0x180008190 0x8b10 0x7510
GlobalFree 0x0 0x180008198 0x8b18 0x7518
FindResourceA 0x0 0x1800081a0 0x8b20 0x7520
GetSystemDefaultLCID 0x0 0x1800081a8 0x8b28 0x7528
GetUserDefaultLCID 0x0 0x1800081b0 0x8b30 0x7530
RaiseException 0x0 0x1800081b8 0x8b38 0x7538
GetLastError 0x0 0x1800081c0 0x8b40 0x7540
GetModuleHandleW 0x0 0x1800081c8 0x8b48 0x7548
LoadLibraryExW 0x0 0x1800081d0 0x8b50 0x7550
Exports (7)
»
Api name EAT Address Ordinal
None 0x18000193c 0x1
None 0x180001c48 0x2
None 0x1800044bc 0x3
None 0x180006754 0x4
None 0x180004620 0x5
None 0x1800060e0 0x6
None 0x1800044d4 0x7
Digital Signatures (2)
»
Signature Properties
InternalName acewstr
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Access database engine Sort DLL
OriginalFilename acewstr.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\acewstr.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\acewstr.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\acewstr.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 839.35 KB
Hash Values MD5: 9ebcdfa5720d1b4d0676a1b90d6050c6
SHA1: 9f1303873f9bcf255949c5ae47ff7ff0a8018247
SHA256: dfa0841cae6fb52b0d14a78dad5bb7db6bb9e5e9b8d9cbb0813629c53e83257e
Actions
c:\program files\common files\microsoft shared\office15\1033\ado210.chm
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\ado210.chm (Modified File)
Size 1.60 MB
Hash Values MD5: 07f24da6c320ab7b6dfe820fb68b676a
SHA1: 1ee30ea1e0ba5d1e06bf1e9b0ee6139adbd5d8ad
SHA256: b8d6e8020044e60b44c22c45d64b6c9ee13606c612ea0da946ee05d0d01e4b41
Actions
c:\program files\common files\microsoft shared\office15\1033\ado210.chm, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\ado210.chm (Modified File)
c:\program files\common files\microsoft shared\office15\1033\ado210.chm.[sepsis@protonmail.com].sepsis (Created File)
Size 1.60 MB
Hash Values MD5: 53fa6ab167d4cf68f5485a827c9f5426
SHA1: 1d38d51435d660e62f23a3aa851401bb1092bdff
SHA256: 798c229d9384dc338d2bdbe1163b4bec541137c700e9e148953c447ae97971a2
Actions
c:\program files\common files\microsoft shared\office15\1033\alrtintl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\alrtintl.dll (Modified File)
Size 150.59 KB
Hash Values MD5: 89ce4d1c870ab754d6a197c042466942
SHA1: 98d89cf3573c2fe86786837e0a1e6e21c798136e
SHA256: d8ad0522a2cafd00fc360177b7102f9fe1c8a5243a8b00de377d971fdff763d0
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x23c00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:36:54
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x170 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.77
.rsrc 0x180002000 0x23964 0x23a00 0x600 CNT_INITIALIZED_DATA, MEM_READ 7.43
Digital Signatures (2)
»
Signature Properties
InternalName alrtintl
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Alert Intl
OriginalFilename AlrtIntl.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\alrtintl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\alrtintl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\alrtintl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 150.77 KB
Hash Values MD5: e4e7bfa9e0b14f5ead56a1e7b5d6f436
SHA1: b6054cc98f146519f3bb00a044f85b85ae2e2de4
SHA256: 1929c76bbbf9f8252ccdb2d16d5ab1e5c62a76b4acb04787386ffcdf6f9c10d0
Actions
c:\program files\common files\microsoft shared\office15\1033\msointl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.dll (Modified File)
Size 3.46 MB
Hash Values MD5: 8f9811db3ddd440e2601027eb756a42d
SHA1: 7f763efda83358603474804c53ebc6f318931263
SHA256: fa56b4f2c40eb59d3d29fea8644024d500bf79b15e1c5d8266372887f8a01e09
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x373400
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:35:55
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x16c 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.68
.rsrc 0x180002000 0x3731b0 0x373200 0x600 CNT_INITIALIZED_DATA, MEM_READ Unknown
Digital Signatures (2)
»
Signature Properties
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\msointl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\msointl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 3.46 MB
Hash Values MD5: ef3ce4d94d705066ae8d508bb577fc8f
SHA1: e79f6cf9b060cb29a46d51e308b4d49de2532f8b
SHA256: a9e19978f5270b2ae51ba2eeac974a7ab6c7d2c1653a11142cbb0a647af37a09
Actions
c:\program files\common files\microsoft shared\office15\1033\msointl.dll.idx_dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.dll.idx_dll (Modified File)
Size 51.64 KB
Hash Values MD5: 7b34955960ff21d45655ac01ec973d14
SHA1: a25e476316e50892c84b7e5030bb19d177338cba
SHA256: 47ad666d0f101d1b6365997c7e18a66752d5addbbd2c53eff1a9ff1bc83f7eb6
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0xb000
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:39:20
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x16c 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.86
.rsrc 0x180002000 0xad28 0xae00 0x600 CNT_INITIALIZED_DATA, MEM_READ 4.48
Digital Signatures (2)
»
Signature Properties
InternalName 4.0
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription UICaptions Support File Template
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\msointl.dll.idx_dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.dll.idx_dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\msointl.dll.idx_dll.[sepsis@protonmail.com].sepsis (Created File)
Size 51.82 KB
Hash Values MD5: c08256ba876262809f3fe1fcc583d069
SHA1: 198e1495c5a6ab7a7e935bde35029b34e813f3d4
SHA256: 84d57e8229377a7d8564767b5a288a3192f63c67fa6f5e1423fcd6c6b5c4cb2f
Actions
c:\program files\common files\microsoft shared\office15\1033\msointl.rest.idx_dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.rest.idx_dll (Modified File)
Size 1.42 MB
Hash Values MD5: 0025bc172206303fe3a5f4ba25ccebb8
SHA1: 27eee98511e2edbb75ee6a4b9658471d13335ffd
SHA256: a4d5e4c35782ac8e62e56c10358f2681b5637ac5b2e31631eac6dee5a35a3f94
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x168800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:39:20
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x16c 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.86
.rsrc 0x180002000 0x1684dc 0x168600 0x600 CNT_INITIALIZED_DATA, MEM_READ 5.12
Digital Signatures (2)
»
Signature Properties
InternalName 4.0
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription UICaptions Support File Template
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\msointl.rest.idx_dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\msointl.rest.idx_dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\msointl.rest.idx_dll.[sepsis@protonmail.com].sepsis (Created File)
Size 1.42 MB
Hash Values MD5: 3ea4252fab4c5db8789d25072c3ae5da
SHA1: 4747cb0ba11394894f1c469be496c7948b5d3a97
SHA256: 139172e558815fe78d405bb31fde49d82d927b78f91a7bcd0c606b82321393a8
Actions
c:\program files\common files\microsoft shared\office15\1033\mssoapr3.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\mssoapr3.dll (Modified File)
Size 41.15 KB
Hash Values MD5: cecc0e57e5af5293aa27cafa6eec027e
SHA1: dfc1204e28a7e82433d098f137b22339b5e88e34
SHA256: 7eef8f4b6ab046ea737c8d1408941b2107f72d24a14bde7b80ac6d7fd453d68d
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001548
Size Of Code 0xc00
Size Of Initialized Data 0x7e00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 20:36:52
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xb10 0xc00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.65
.rdata 0x180002000 0x750 0x800 0x1000 CNT_INITIALIZED_DATA, MEM_READ 4.2
.data 0x180003000 0x5c8 0x200 0x1800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.23
.pdata 0x180004000 0xe4 0x200 0x1a00 CNT_INITIALIZED_DATA, MEM_READ 1.9
.rsrc 0x180005000 0x6b10 0x6c00 0x1c00 CNT_INITIALIZED_DATA, MEM_READ 3.36
.reloc 0x18000c000 0x10 0x200 0x8800 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.15
Imports (35)
»
KERNEL32.dll (21)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DisableThreadLibraryCalls 0x0 0x180002000 0x2298 0x1298
RtlLookupFunctionEntry 0x0 0x180002008 0x22a0 0x12a0
RtlVirtualUnwind 0x0 0x180002010 0x22a8 0x12a8
IsDebuggerPresent 0x0 0x180002018 0x22b0 0x12b0
SetUnhandledExceptionFilter 0x0 0x180002020 0x22b8 0x12b8
UnhandledExceptionFilter 0x0 0x180002028 0x22c0 0x12c0
GetCurrentProcess 0x0 0x180002030 0x22c8 0x12c8
TerminateProcess 0x0 0x180002038 0x22d0 0x12d0
Sleep 0x0 0x180002040 0x22d8 0x12d8
DecodePointer 0x0 0x180002048 0x22e0 0x12e0
EncodePointer 0x0 0x180002050 0x22e8 0x12e8
WerRegisterMemoryBlock 0x0 0x180002058 0x22f0 0x12f0
VirtualProtect 0x0 0x180002060 0x22f8 0x12f8
GetTickCount 0x0 0x180002068 0x2300 0x1300
GetSystemTimeAsFileTime 0x0 0x180002070 0x2308 0x1308
GetCurrentThreadId 0x0 0x180002078 0x2310 0x1310
QueryPerformanceCounter 0x0 0x180002080 0x2318 0x1318
GetProcessHeap 0x0 0x180002088 0x2320 0x1320
HeapSetInformation 0x0 0x180002090 0x2328 0x1328
GetCurrentProcessId 0x0 0x180002098 0x2330 0x1330
RtlCaptureContext 0x0 0x1800020a0 0x2338 0x1338
MSVCR100.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x1800020b0 0x2348 0x1348
_lock 0x0 0x1800020b8 0x2350 0x1350
__dllonexit 0x0 0x1800020c0 0x2358 0x1358
_unlock 0x0 0x1800020c8 0x2360 0x1360
__clean_type_info_names_internal 0x0 0x1800020d0 0x2368 0x1368
__crt_debugger_hook 0x0 0x1800020d8 0x2370 0x1370
__CppXcptFilter 0x0 0x1800020e0 0x2378 0x1378
__C_specific_handler 0x0 0x1800020e8 0x2380 0x1380
_amsg_exit 0x0 0x1800020f0 0x2388 0x1388
_encoded_null 0x0 0x1800020f8 0x2390 0x1390
free 0x0 0x180002100 0x2398 0x1398
_initterm_e 0x0 0x180002108 0x23a0 0x13a0
_initterm 0x0 0x180002110 0x23a8 0x13a8
_malloc_crt 0x0 0x180002118 0x23b0 0x13b0
Exports (4)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180001000 0xd
DllMain 0x180001008 0xc
DllRegisterServer 0x180001000 0xe
DllUnregisterServer 0x180001000 0xf
Digital Signatures (2)
»
Signature Properties
LegalCopyright © 2010 Microsoft Corporation. All rights reserved.
InternalName MSOSOAPR3
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks Microsoft(R) is a registered trademark of Microsoft Corporation. Windows (R) is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office Soap
ProductVersion 15.0.4420.1017
FileDescription Microsoft Office Soap Resource DLL 3.0
OriginalFilename MSOSOAPR3.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\mssoapr3.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\mssoapr3.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\mssoapr3.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 41.32 KB
Hash Values MD5: a4844d8708a189a4292b02e61e5bf612
SHA1: 68c83a795f703075cdb8d1ee8c995ec58c1ebfba
SHA256: 03f35706da7c33d3096628f62b74297df677d93df5ef1edcde9bdde1669d7058
Actions
c:\program files\common files\microsoft shared\office15\1033\oarpmanr.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\oarpmanr.dll (Modified File)
Size 12.15 KB
Hash Values MD5: ee41c758a8df468da218d32f2f56c217
SHA1: 5bd6328400632b9b839be57f5ffc4412c176b7f7
SHA256: dea82dc2519d94070dc93f6ce0f96268c3f63c200cd5ccad8d42e4ce33bb879e
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x1200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:37:38
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x170 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.7
.rsrc 0x180002000 0xe8c 0x1000 0x600 CNT_INITIALIZED_DATA, MEM_READ 3.81
Digital Signatures (2)
»
Signature Properties
InternalName OARPMANR
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Office OARPMAN resource dll
OriginalFilename OARPMANR.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\oarpmanr.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\oarpmanr.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\oarpmanr.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 12.32 KB
Hash Values MD5: b5518f87053cf19ba6018ceebe450df1
SHA1: 650b95b51ca374cfc2a74153c30d2b1bbccabd51
SHA256: 4af68262225d8c0d637ce2c0dd52dbf27f58efdba6734cb3758022a0d031b537
Actions
c:\program files\common files\microsoft shared\office15\1033\osfintl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osfintl.dll (Modified File)
Size 130.63 KB
Hash Values MD5: 5a7da3333aae47c02c8fba040e3f679c
SHA1: de86dcd417ed56715d1575e54b44fa458d2a6000
SHA256: b0e628007646e79c0d74f3a41a60a9225e042de1edaef5fdc4c1eeb815b83b9f
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x1ec00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:37:45
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x16c 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.71
.rsrc 0x180002000 0x1e8e8 0x1ea00 0x600 CNT_INITIALIZED_DATA, MEM_READ 6.44
Digital Signatures (2)
»
Signature Properties
InternalName osfintl
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Office 2013 component
OriginalFilename osfintl.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\osfintl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osfintl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\osfintl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 130.81 KB
Hash Values MD5: c87b7565588cee387565a6c6ccf422a8
SHA1: 1bf44e86edf8ba912fd5a217a4ff814c3f8fe107
SHA256: 6e86e96a2347996cbfd82e10bff52c96c0ade00d22b04884914bbdc97bc7adb1
Actions
c:\program files\common files\microsoft shared\office15\1033\osmdp32.msi
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmdp32.msi (Modified File)
Size 2.18 MB
Hash Values MD5: 0a2c408dd0ca739f2b3166541dca414e
SHA1: 7e1812d16e16c031f46b4f695993eb7da6512775
SHA256: 1f6bd6b0d9750b1b96933bb4476c3d929ca3022c94338ea327bfcd60b9b0e1e7
Actions
c:\program files\common files\microsoft shared\office15\1033\osmdp32.msi, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmdp32.msi (Modified File)
c:\program files\common files\microsoft shared\office15\1033\osmdp32.msi.[sepsis@protonmail.com].sepsis (Created File)
Size 2.18 MB
Hash Values MD5: 3f0ad0ca2c91a4f1b5a2b9415b31c5ea
SHA1: 62ec23ca63aa2d44da770d752fc9b98c9c1446f9
SHA256: c709d3a80d9f054981f775496ca868e86cb361e946a8c6fd0beba9d5949de682
Actions
c:\program files\common files\microsoft shared\office15\1033\osmdp64.msi
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmdp64.msi (Modified File)
Size 2.30 MB
Hash Values MD5: 8788bb1d89f5c3d1c2ed6fda6e0874a4
SHA1: 461eefdc0da413f929e2780427bc740f6072abcb
SHA256: b4afa4deace1055af1cbf8a24e9a4f581c8213acf6485358f142af44fbc24b08
Actions
c:\program files\common files\microsoft shared\office15\1033\osmdp64.msi, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmdp64.msi (Modified File)
c:\program files\common files\microsoft shared\office15\1033\osmdp64.msi.[sepsis@protonmail.com].sepsis (Created File)
Size 2.30 MB
Hash Values MD5: 3b09458882c91c06db45a8036a963bda
SHA1: 17d33df3defa238d2d6ba933c24c0c648274a32d
SHA256: d1c4d43767cd10ddac2a4ce38db5ce08d28df5f7ca8f123fb7552ddde6d9b89c
Actions
c:\program files\common files\microsoft shared\office15\1033\osmia32.msi
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmia32.msi (Modified File)
Size 1.73 MB
Hash Values MD5: a7bf2a5229e9e7566ac64fd38b60e656
SHA1: 83699c3739b1e7839e81bd123cb3d5234ea9d982
SHA256: 8b073d4ef01d2832d96fa80c8276b5ac6e52191437c9d1a797a4eff3877338b8
Actions
c:\program files\common files\microsoft shared\office15\1033\osmia32.msi, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmia32.msi (Modified File)
c:\program files\common files\microsoft shared\office15\1033\osmia32.msi.[sepsis@protonmail.com].sepsis (Created File)
Size 1.73 MB
Hash Values MD5: 0f299c2a63890deeca9861ff427d1a91
SHA1: ce6d17cf73c38d4abc4dc11a9f75dea67d5eed21
SHA256: 0021b1fff8b2d5358656b6c22c935ce2294ae9f059594a0445feb03ee8517c29
Actions
c:\program files\common files\microsoft shared\office15\1033\osmia64.msi
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmia64.msi (Modified File)
Size 1.77 MB
Hash Values MD5: e07096cb89f2d178a14c5e81e6d12cd9
SHA1: 77a40ed76c814cb34a1da43a9201eb1f39fa84c0
SHA256: ff83e0451a67589c7bacfa8e8d4e10507633962895ab4d5a155165f2c5d559a4
Actions
c:\program files\common files\microsoft shared\office15\1033\osmia64.msi, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\osmia64.msi (Modified File)
c:\program files\common files\microsoft shared\office15\1033\osmia64.msi.[sepsis@protonmail.com].sepsis (Created File)
Size 1.77 MB
Hash Values MD5: 5f94fc6d7000ec07eab968cda69e9c43
SHA1: 3d30076587e78ce20e9a239e35a22db5a3338f5a
SHA256: 7316284f92a7fb4dfefe57f0ce52c76fa2b24f9ad2b7b57a4e7d1c1f18c92e61
Actions
c:\program files\common files\microsoft shared\office15\1033\readme.htm
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\readme.htm (Modified File)
Size 0.42 KB
Hash Values MD5: 8f68496d0f99b37e71c7bc326b0b9cbe
SHA1: 8ae59f5baa99e842653ad9376f308ad60ec1f802
SHA256: 6d021f570226ea01dc30f59f2775cf9fc2332658a3f5cdb2773ffe767b6213fe
Actions
c:\program files\common files\microsoft shared\office15\1033\readme.htm, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\readme.htm (Modified File)
c:\program files\common files\microsoft shared\office15\1033\readme.htm.[sepsis@protonmail.com].sepsis (Created File)
Size 0.59 KB
Hash Values MD5: 2c1a30b17e42db7703d4bf23ef0e7029
SHA1: fc8caa93324e7574d1deb61017689d7bc1ce8955
SHA256: 18e2826bf256d1072d4f933f20b96b2800d2ed359316c99276357e2f23100f01
Actions
c:\program files\common files\microsoft shared\office15\1033\xlsrvintl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\xlsrvintl.dll (Modified File)
Size 256.13 KB
Hash Values MD5: 11d95746f2f93db9ae179d2a70bd0735
SHA1: 6ad0d37baa7ec6bced2ff29bbce6ded79e557cf3
SHA256: b3deddc19fbed73e423af31bfd83d814c26e9f18cc0908ef24c74bd78d1c5482
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point Unknown
Size Of Code 0x0
Size Of Initialized Data 0x3e200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-09-29 18:37:08
Compiler/Packer Unknown
Sections (2)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.rdata 0x180001000 0x134 0x200 0x400 CNT_INITIALIZED_DATA, MEM_READ 1.48
.rsrc 0x180002000 0x3def4 0x3e000 0x600 CNT_INITIALIZED_DATA, MEM_READ 4.98
Digital Signatures (2)
»
Signature Properties
InternalName XLSRVINTL
FileVersion 15.0.4420.1017
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4420.1017
FileDescription Microsoft Office 2013 component
OriginalFilename XLSRVINTL.DLL
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-07-26 20:50
Valid to 2013-10-26 20:50
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 88 59 0E 3C 51 1F E2 6A 67 00 01 00 00 00 88
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\1033\xlsrvintl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\1033\xlsrvintl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\1033\xlsrvintl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 256.31 KB
Hash Values MD5: af238c549f1c5c8c9876e7a2a8c21063
SHA1: 6932821d642411327a3983ad17ed866d8202e7f5
SHA256: 223c21269e7f5b898bd61824b8460222de0ce89c70ffaac94aeb946cb214bd6f
Actions
c:\program files\common files\microsoft shared\office15\acecore.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acecore.dll (Modified File)
Size 2.17 MB
Hash Values MD5: d91ca55ab74783fc4409c6b6fa6b2a7e
SHA1: 421c02567863ed9d3b5aa372f900c65e54e36da3
SHA256: d9f24cc34d30c077c1faa27dce0be711d58ebc67a524136a53e623a9d2d45cee
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001000
Size Of Code 0x1b9c00
Size Of Initialized Data 0x8d200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:29:41
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x1b9bb4 0x1b9c00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.37
.rdata 0x1801bb000 0x518a4 0x51a00 0x1ba000 CNT_INITIALIZED_DATA, MEM_READ 4.44
.data 0x18020d000 0x26cec 0x8e00 0x20ba00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.51
.pdata 0x180234000 0x10bfc 0x10c00 0x214800 CNT_INITIALIZED_DATA, MEM_READ 6.17
.rsrc 0x180245000 0x488 0x600 0x225400 CNT_INITIALIZED_DATA, MEM_READ 2.68
.reloc 0x180246000 0x3744 0x3800 0x225a00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.45
Imports (220)
»
ole32.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoTaskMemFree 0x0 0x1801bb000 0x1ea900 0x1e9900
CLSIDFromString 0x0 0x1801bb008 0x1ea908 0x1e9908
CreateStreamOnHGlobal 0x0 0x1801bb010 0x1ea910 0x1e9910
OleInitialize 0x0 0x1801bb018 0x1ea918 0x1e9918
CoCreateInstance 0x0 0x1801bb020 0x1ea920 0x1e9920
StringFromCLSID 0x0 0x1801bb028 0x1ea928 0x1e9928
IIDFromString 0x0 0x1801bb030 0x1ea930 0x1e9930
CoCreateGuid 0x0 0x1801bb038 0x1ea938 0x1e9938
StringFromGUID2 0x0 0x1801bb040 0x1ea940 0x1e9940
MSVCR100.dll (79)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_lock 0x0 0x1801bb050 0x1ea950 0x1e9950
__dllonexit 0x0 0x1801bb058 0x1ea958 0x1e9958
_unlock 0x0 0x1801bb060 0x1ea960 0x1e9960
__crt_debugger_hook 0x0 0x1801bb068 0x1ea968 0x1e9968
__CppXcptFilter 0x0 0x1801bb070 0x1ea970 0x1e9970
_amsg_exit 0x0 0x1801bb078 0x1ea978 0x1e9978
_encoded_null 0x0 0x1801bb080 0x1ea980 0x1e9980
_initterm_e 0x0 0x1801bb088 0x1ea988 0x1e9988
_initterm 0x0 0x1801bb090 0x1ea990 0x1e9990
_malloc_crt 0x0 0x1801bb098 0x1ea998 0x1e9998
vswprintf_s 0x0 0x1801bb0a0 0x1ea9a0 0x1e99a0
wcsncat_s 0x0 0x1801bb0a8 0x1ea9a8 0x1e99a8
_endthreadex 0x0 0x1801bb0b0 0x1ea9b0 0x1e99b0
_beginthreadex 0x0 0x1801bb0b8 0x1ea9b8 0x1e99b8
modf 0x0 0x1801bb0c0 0x1ea9c0 0x1e99c0
_localtime64_s 0x0 0x1801bb0c8 0x1ea9c8 0x1e99c8
_ecvt_s 0x0 0x1801bb0d0 0x1ea9d0 0x1e99d0
strtod 0x0 0x1801bb0d8 0x1ea9d8 0x1e99d8
_errno 0x0 0x1801bb0e0 0x1ea9e0 0x1e99e0
strchr 0x0 0x1801bb0e8 0x1ea9e8 0x1e99e8
isxdigit 0x0 0x1801bb0f0 0x1ea9f0 0x1e99f0
_wtol 0x0 0x1801bb0f8 0x1ea9f8 0x1e99f8
tolower 0x0 0x1801bb100 0x1eaa00 0x1e9a00
_wcsnicmp 0x0 0x1801bb108 0x1eaa08 0x1e9a08
toupper 0x0 0x1801bb110 0x1eaa10 0x1e9a10
srand 0x0 0x1801bb118 0x1eaa18 0x1e9a18
_vsnprintf_s 0x0 0x1801bb120 0x1eaa20 0x1e9a20
isdigit 0x0 0x1801bb128 0x1eaa28 0x1e9a28
_wtoi 0x0 0x1801bb130 0x1eaa30 0x1e9a30
fputs 0x0 0x1801bb138 0x1eaa38 0x1e9a38
fopen_s 0x0 0x1801bb140 0x1eaa40 0x1e9a40
fclose 0x0 0x1801bb148 0x1eaa48 0x1e9a48
fputws 0x0 0x1801bb150 0x1eaa50 0x1e9a50
_wcsupr_s 0x0 0x1801bb158 0x1eaa58 0x1e9a58
_wcslwr_s 0x0 0x1801bb160 0x1eaa60 0x1e9a60
wcsrchr 0x0 0x1801bb168 0x1eaa68 0x1e9a68
_setjmp 0x0 0x1801bb170 0x1eaa70 0x1e9a70
__C_specific_handler 0x0 0x1801bb178 0x1eaa78 0x1e9a78
_onexit 0x0 0x1801bb180 0x1eaa80 0x1e9a80
rand 0x0 0x1801bb188 0x1eaa88 0x1e9a88
longjmp 0x0 0x1801bb190 0x1eaa90 0x1e9a90
ldiv 0x0 0x1801bb198 0x1eaa98 0x1e9a98
atoi 0x0 0x1801bb1a0 0x1eaaa0 0x1e9aa0
wcsnlen 0x0 0x1801bb1a8 0x1eaaa8 0x1e9aa8
_stricmp 0x0 0x1801bb1b0 0x1eaab0 0x1e9ab0
?what@exception@std@@UEBAPEBDXZ 0x0 0x1801bb1b8 0x1eaab8 0x1e9ab8
??0exception@std@@QEAA@AEBQEBD@Z 0x0 0x1801bb1c0 0x1eaac0 0x1e9ac0
wcscspn 0x0 0x1801bb1c8 0x1eaac8 0x1e9ac8
_invalid_parameter_noinfo_noreturn 0x0 0x1801bb1d0 0x1eaad0 0x1e9ad0
__RTDynamicCast 0x0 0x1801bb1d8 0x1eaad8 0x1e9ad8
??1exception@std@@UEAA@XZ 0x0 0x1801bb1e0 0x1eaae0 0x1e9ae0
??0exception@std@@QEAA@AEBV01@@Z 0x0 0x1801bb1e8 0x1eaae8 0x1e9ae8
memcpy_s 0x0 0x1801bb1f0 0x1eaaf0 0x1e9af0
__CxxFrameHandler3 0x0 0x1801bb1f8 0x1eaaf8 0x1e9af8
_CxxThrowException 0x0 0x1801bb200 0x1eab00 0x1e9b00
?terminate@@YAXXZ 0x0 0x1801bb208 0x1eab08 0x1e9b08
ceil 0x0 0x1801bb210 0x1eab10 0x1e9b10
_snprintf_s 0x0 0x1801bb218 0x1eab18 0x1e9b18
_time64 0x0 0x1801bb220 0x1eab20 0x1e9b20
strncpy_s 0x0 0x1801bb228 0x1eab28 0x1e9b28
malloc 0x0 0x1801bb230 0x1eab30 0x1e9b30
_snwprintf_s 0x0 0x1801bb238 0x1eab38 0x1e9b38
memmove 0x0 0x1801bb240 0x1eab40 0x1e9b40
memmove_s 0x0 0x1801bb248 0x1eab48 0x1e9b48
free 0x0 0x1801bb250 0x1eab50 0x1e9b50
memcmp 0x0 0x1801bb258 0x1eab58 0x1e9b58
wcsncmp 0x0 0x1801bb260 0x1eab60 0x1e9b60
wcschr 0x0 0x1801bb268 0x1eab68 0x1e9b68
_wsplitpath_s 0x0 0x1801bb270 0x1eab70 0x1e9b70
towupper 0x0 0x1801bb278 0x1eab78 0x1e9b78
wcsstr 0x0 0x1801bb280 0x1eab80 0x1e9b80
memset 0x0 0x1801bb288 0x1eab88 0x1e9b88
memcpy 0x0 0x1801bb290 0x1eab90 0x1e9b90
wcsncpy_s 0x0 0x1801bb298 0x1eab98 0x1e9b98
wcstol 0x0 0x1801bb2a0 0x1eaba0 0x1e9ba0
iswctype 0x0 0x1801bb2a8 0x1eaba8 0x1e9ba8
__clean_type_info_names_internal 0x0 0x1801bb2b0 0x1eabb0 0x1e9bb0
_wcsicmp 0x0 0x1801bb2b8 0x1eabb8 0x1e9bb8
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1801bb2c0 0x1eabc0 0x1e9bc0
ADVAPI32.dll (16)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
EventWrite 0x0 0x1801bb2d0 0x1eabd0 0x1e9bd0
EventUnregister 0x0 0x1801bb2d8 0x1eabd8 0x1e9bd8
EventRegister 0x0 0x1801bb2e0 0x1eabe0 0x1e9be0
RegisterEventSourceW 0x0 0x1801bb2e8 0x1eabe8 0x1e9be8
DeregisterEventSource 0x0 0x1801bb2f0 0x1eabf0 0x1e9bf0
RegGetValueW 0x0 0x1801bb2f8 0x1eabf8 0x1e9bf8
RegQueryValueExW 0x0 0x1801bb300 0x1eac00 0x1e9c00
RegQueryValueExA 0x0 0x1801bb308 0x1eac08 0x1e9c08
RegOpenKeyExW 0x0 0x1801bb310 0x1eac10 0x1e9c10
RegEnumKeyExW 0x0 0x1801bb318 0x1eac18 0x1e9c18
GetUserNameW 0x0 0x1801bb320 0x1eac20 0x1e9c20
OpenThreadToken 0x0 0x1801bb328 0x1eac28 0x1e9c28
SetThreadToken 0x0 0x1801bb330 0x1eac30 0x1e9c30
RegOpenKeyExA 0x0 0x1801bb338 0x1eac38 0x1e9c38
RegCloseKey 0x0 0x1801bb340 0x1eac40 0x1e9c40
ReportEventW 0x0 0x1801bb348 0x1eac48 0x1e9c48
KERNEL32.dll (92)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LoadLibraryExW 0x0 0x1801bb358 0x1eac58 0x1e9c58
GetModuleHandleW 0x0 0x1801bb360 0x1eac60 0x1e9c60
GetModuleFileNameW 0x0 0x1801bb368 0x1eac68 0x1e9c68
GetTempPathW 0x0 0x1801bb370 0x1eac70 0x1e9c70
GetTempFileNameW 0x0 0x1801bb378 0x1eac78 0x1e9c78
GetShortPathNameW 0x0 0x1801bb380 0x1eac80 0x1e9c80
GetFullPathNameW 0x0 0x1801bb388 0x1eac88 0x1e9c88
FindFirstFileW 0x0 0x1801bb390 0x1eac90 0x1e9c90
DeleteFileW 0x0 0x1801bb398 0x1eac98 0x1e9c98
ExpandEnvironmentStringsW 0x0 0x1801bb3a0 0x1eaca0 0x1e9ca0
GetModuleHandleA 0x0 0x1801bb3a8 0x1eaca8 0x1e9ca8
GetCurrentThread 0x0 0x1801bb3b0 0x1eacb0 0x1e9cb0
RaiseException 0x0 0x1801bb3b8 0x1eacb8 0x1e9cb8
GetCurrencyFormatA 0x0 0x1801bb3c0 0x1eacc0 0x1e9cc0
GetNumberFormatA 0x0 0x1801bb3c8 0x1eacc8 0x1e9cc8
GetTimeFormatA 0x0 0x1801bb3d0 0x1eacd0 0x1e9cd0
GetDateFormatA 0x0 0x1801bb3d8 0x1eacd8 0x1e9cd8
GetDateFormatW 0x0 0x1801bb3e0 0x1eace0 0x1e9ce0
GetSystemTimeAsFileTime 0x0 0x1801bb3e8 0x1eace8 0x1e9ce8
GetCurrentThreadId 0x0 0x1801bb3f0 0x1eacf0 0x1e9cf0
CreateEventA 0x0 0x1801bb3f8 0x1eacf8 0x1e9cf8
WaitForSingleObject 0x0 0x1801bb400 0x1ead00 0x1e9d00
ResetEvent 0x0 0x1801bb408 0x1ead08 0x1e9d08
SetEvent 0x0 0x1801bb410 0x1ead10 0x1e9d10
GetComputerNameA 0x0 0x1801bb418 0x1ead18 0x1e9d18
GlobalMemoryStatus 0x0 0x1801bb420 0x1ead20 0x1e9d20
GetSystemInfo 0x0 0x1801bb428 0x1ead28 0x1e9d28
ResumeThread 0x0 0x1801bb430 0x1ead30 0x1e9d30
SetThreadPriority 0x0 0x1801bb438 0x1ead38 0x1e9d38
GetProcessHeap 0x0 0x1801bb440 0x1ead40 0x1e9d40
HeapFree 0x0 0x1801bb448 0x1ead48 0x1e9d48
HeapAlloc 0x0 0x1801bb450 0x1ead50 0x1e9d50
WriteFile 0x0 0x1801bb458 0x1ead58 0x1e9d58
UnlockFile 0x0 0x1801bb460 0x1ead60 0x1e9d60
SetFilePointer 0x0 0x1801bb468 0x1ead68 0x1e9d68
LockFile 0x0 0x1801bb470 0x1ead70 0x1e9d70
GetFileType 0x0 0x1801bb478 0x1ead78 0x1e9d78
GetFileSize 0x0 0x1801bb480 0x1ead80 0x1e9d80
GetFileInformationByHandle 0x0 0x1801bb488 0x1ead88 0x1e9d88
FlushFileBuffers 0x0 0x1801bb490 0x1ead90 0x1e9d90
FindClose 0x0 0x1801bb498 0x1ead98 0x1e9d98
GetLocaleInfoA 0x0 0x1801bb4a0 0x1eada0 0x1e9da0
Sleep 0x0 0x1801bb4a8 0x1eada8 0x1e9da8
ReadFile 0x0 0x1801bb4b0 0x1eadb0 0x1e9db0
GetFileSizeEx 0x0 0x1801bb4b8 0x1eadb8 0x1e9db8
LocalFree 0x0 0x1801bb4c0 0x1eadc0 0x1e9dc0
LocalAlloc 0x0 0x1801bb4c8 0x1eadc8 0x1e9dc8
TlsFree 0x0 0x1801bb4d0 0x1eadd0 0x1e9dd0
TlsSetValue 0x0 0x1801bb4d8 0x1eadd8 0x1e9dd8
TlsGetValue 0x0 0x1801bb4e0 0x1eade0 0x1e9de0
TlsAlloc 0x0 0x1801bb4e8 0x1eade8 0x1e9de8
lstrlenW 0x0 0x1801bb4f0 0x1eadf0 0x1e9df0
GetUserDefaultLangID 0x0 0x1801bb4f8 0x1eadf8 0x1e9df8
GetLocaleInfoW 0x0 0x1801bb500 0x1eae00 0x1e9e00
QueryPerformanceCounter 0x0 0x1801bb508 0x1eae08 0x1e9e08
HeapSetInformation 0x0 0x1801bb510 0x1eae10 0x1e9e10
GetCurrentProcessId 0x0 0x1801bb518 0x1eae18 0x1e9e18
VirtualProtect 0x0 0x1801bb520 0x1eae20 0x1e9e20
WerRegisterMemoryBlock 0x0 0x1801bb528 0x1eae28 0x1e9e28
EncodePointer 0x0 0x1801bb530 0x1eae30 0x1e9e30
DecodePointer 0x0 0x1801bb538 0x1eae38 0x1e9e38
TerminateProcess 0x0 0x1801bb540 0x1eae40 0x1e9e40
GetCurrentProcess 0x0 0x1801bb548 0x1eae48 0x1e9e48
UnhandledExceptionFilter 0x0 0x1801bb550 0x1eae50 0x1e9e50
SetUnhandledExceptionFilter 0x0 0x1801bb558 0x1eae58 0x1e9e58
IsDebuggerPresent 0x0 0x1801bb560 0x1eae60 0x1e9e60
RtlVirtualUnwind 0x0 0x1801bb568 0x1eae68 0x1e9e68
RtlLookupFunctionEntry 0x0 0x1801bb570 0x1eae70 0x1e9e70
RtlCaptureContext 0x0 0x1801bb578 0x1eae78 0x1e9e78
CreateThread 0x0 0x1801bb580 0x1eae80 0x1e9e80
DisableThreadLibraryCalls 0x0 0x1801bb588 0x1eae88 0x1e9e88
DeleteFileA 0x0 0x1801bb590 0x1eae90 0x1e9e90
CloseHandle 0x0 0x1801bb598 0x1eae98 0x1e9e98
GetLastError 0x0 0x1801bb5a0 0x1eaea0 0x1e9ea0
InitializeCriticalSection 0x0 0x1801bb5a8 0x1eaea8 0x1e9ea8
EnterCriticalSection 0x0 0x1801bb5b0 0x1eaeb0 0x1e9eb0
LeaveCriticalSection 0x0 0x1801bb5b8 0x1eaeb8 0x1e9eb8
DeleteCriticalSection 0x0 0x1801bb5c0 0x1eaec0 0x1e9ec0
GetLocalTime 0x0 0x1801bb5c8 0x1eaec8 0x1e9ec8
GetTickCount 0x0 0x1801bb5d0 0x1eaed0 0x1e9ed0
GetVersionExA 0x0 0x1801bb5d8 0x1eaed8 0x1e9ed8
VirtualAlloc 0x0 0x1801bb5e0 0x1eaee0 0x1e9ee0
VirtualFree 0x0 0x1801bb5e8 0x1eaee8 0x1e9ee8
VirtualQuery 0x0 0x1801bb5f0 0x1eaef0 0x1e9ef0
LoadLibraryA 0x0 0x1801bb5f8 0x1eaef8 0x1e9ef8
FreeLibrary 0x0 0x1801bb600 0x1eaf00 0x1e9f00
GetProcAddress 0x0 0x1801bb608 0x1eaf08 0x1e9f08
GetUserDefaultLCID 0x0 0x1801bb610 0x1eaf10 0x1e9f10
MultiByteToWideChar 0x0 0x1801bb618 0x1eaf18 0x1e9f18
WideCharToMultiByte 0x0 0x1801bb620 0x1eaf20 0x1e9f20
GetCPInfo 0x0 0x1801bb628 0x1eaf28 0x1e9f28
IsDBCSLeadByte 0x0 0x1801bb630 0x1eaf30 0x1e9f30
OLEAUT32.dll (21)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VariantInit 0x8 0x1801bb640 0x1eaf40 0x1e9f40
SysAllocString 0x2 0x1801bb648 0x1eaf48 0x1e9f48
SafeArrayDestroy 0x10 0x1801bb650 0x1eaf50 0x1e9f50
SafeArrayPutElement 0x1a 0x1801bb658 0x1eaf58 0x1e9f58
SafeArrayCreateVector 0x19b 0x1801bb660 0x1eaf60 0x1e9f60
VariantClear 0x9 0x1801bb668 0x1eaf68 0x1e9f68
SysAllocStringLen 0x4 0x1801bb670 0x1eaf70 0x1e9f70
SysFreeString 0x6 0x1801bb678 0x1eaf78 0x1e9f78
SysStringLen 0x7 0x1801bb680 0x1eaf80 0x1e9f80
SysStringByteLen 0x95 0x1801bb688 0x1eaf88 0x1e9f88
SysAllocStringByteLen 0x96 0x1801bb690 0x1eaf90 0x1e9f90
VarBstrCmp 0x13a 0x1801bb698 0x1eaf98 0x1e9f98
VarBstrCat 0x139 0x1801bb6a0 0x1eafa0 0x1e9fa0
VariantChangeTypeEx 0x93 0x1801bb6a8 0x1eafa8 0x1e9fa8
VariantCopy 0xa 0x1801bb6b0 0x1eafb0 0x1e9fb0
SafeArrayCreate 0xf 0x1801bb6b8 0x1eafb8 0x1e9fb8
SafeArrayLock 0x15 0x1801bb6c0 0x1eafc0 0x1e9fc0
SafeArrayUnlock 0x16 0x1801bb6c8 0x1eafc8 0x1e9fc8
SafeArrayAccessData 0x17 0x1801bb6d0 0x1eafd0 0x1e9fd0
SafeArrayUnaccessData 0x18 0x1801bb6d8 0x1eafd8 0x1e9fd8
VariantChangeType 0xc 0x1801bb6e0 0x1eafe0 0x1e9fe0
MSVCP100.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Orphan_all@_Container_base0@std@@QEAAXXZ 0x0 0x1801bb6f0 0x1eaff0 0x1e9ff0
?_Xout_of_range@std@@YAXPEBD@Z 0x0 0x1801bb6f8 0x1eaff8 0x1e9ff8
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x1801bb700 0x1eb000 0x1ea000
Exports (170)
»
Api name EAT Address Ordinal
None 0x1801062fc 0x32
None 0x180106344 0x33
None 0x180106360 0x34
None 0x180106a40 0x35
None 0x180106ad8 0x36
None 0x180106af8 0x37
None 0x1800e3c44 0x38
None 0x1800f983c 0x39
None 0x1800af8b4 0x65
None 0x1801010ac 0x66
None 0x18003ee50 0x67
None 0x1800ae5f0 0x68
None 0x1800f745c 0x69
None 0x180100624 0x6a
None 0x18009c1e0 0x6b
None 0x180044cb0 0x6c
None 0x1800ae9ac 0x6d
None 0x1800e587c 0x6e
None 0x1800f8640 0x6f
None 0x1800f74e8 0x70
None 0x180100dd4 0x71
None 0x1800b4744 0x72
None 0x1800edc3c 0x73
None 0x1800e4854 0x74
None 0x1800f8128 0x75
None 0x1800aebac 0x76
None 0x180100328 0x77
None 0x180079d8c 0x78
None 0x1800dbff4 0x79
None 0x180101998 0x7a
None 0x1800f7e34 0x7b
None 0x1800f24e4 0x7c
None 0x1800f833c 0x7d
None 0x1800ac544 0x7e
None 0x180100b30 0x7f
None 0x180085a10 0x80
None 0x18007fde0 0x81
None 0x1800b51f8 0x82
None 0x1800c4acc 0x83
None 0x1800863a0 0x84
None 0x180046f94 0x85
None 0x1800f5d7c 0x86
None 0x1800abc90 0x87
None 0x180044d14 0x88
None 0x1800945e8 0x89
None 0x1800477f0 0x8a
None 0x1800c109c 0x8b
None 0x180044e60 0x8c
None 0x180101fec 0x8d
None 0x1800f5c70 0x8e
None 0x1800f7ba4 0x8f
None 0x180100118 0x90
None 0x180008164 0x91
None 0x180046a58 0x92
None 0x1800bb40c 0x93
None 0x1800843cc 0x94
None 0x1800f7ab4 0x95
None 0x1800f7440 0x96
None 0x18008b4a8 0x97
None 0x1800f5cf4 0x98
None 0x1800938d4 0x99
None 0x1800023c4 0x9a
None 0x180046cd4 0x9b
None 0x180044910 0x9c
None 0x18004341c 0x9d
None 0x18004531c 0x9e
None 0x18007e398 0x9f
None 0x1801014b4 0xa0
None 0x1800dd2ec 0xa1
None 0x1800f7d48 0xa2
None 0x1800f5a50 0xa3
None 0x1800f8248 0xa4
None 0x1800f2954 0xa5
None 0x1800f84ac 0xa6
None 0x1800449e4 0xa7
None 0x1800f5fa0 0xa8
None 0x1800f5c0c 0xa9
None 0x180046da8 0xaa
None 0x1800c42e8 0xab
None 0x18007e988 0xac
None 0x180046c60 0xad
None 0x1800f8b70 0xae
None 0x180101c34 0xaf
None 0x18003e33c 0xb0
None 0x1800942d4 0xb1
None 0x18003da1c 0xb2
None 0x18007ef38 0xb3
None 0x18004a690 0xb4
None 0x1800f8be4 0xb5
None 0x1800f8c68 0xb6
None 0x1800f8c68 0xb7
None 0x1800e3128 0xb8
None 0x1800094b0 0xb9
None 0x1800f790c 0xba
None 0x1800f8b08 0xbb
None 0x1800f8b44 0xbc
None 0x1800f8c68 0xbd
None 0x18008b3ec 0xbe
None 0x1800f728c 0xbf
None 0x180044cb0 0xc0
None 0x180089ce0 0xc1
None 0x1800f7300 0xc2
None 0x1800e4218 0xc3
None 0x1800898d8 0xc4
None 0x1800b0820 0xc7
None 0x18008583c 0xc8
None 0x1800f6700 0xc9
None 0x1800f6ae8 0xca
None 0x1800f69e8 0xcb
None 0x18009ba7c 0xcc
None 0x1800f3d20 0x12d
None 0x180089540 0x12e
None 0x1800f86dc 0x12f
None 0x180090e9c 0x130
None 0x1800922a8 0x131
None 0x1801532f0 0x132
None 0x18015337c 0x133
None 0x1800db090 0x134
None 0x1801541cc 0x135
None 0x1801540f4 0x136
None 0x1800b9540 0x137
None 0x18008b760 0x138
None 0x180153e5c 0x139
None 0x1800f49ec 0x13a
None 0x18009444c 0x13b
None 0x1800d4e20 0x13c
None 0x1800b5ca4 0x13d
None 0x1800865a8 0x13e
None 0x18002c71c 0x13f
None 0x1800e23cc 0x140
None 0x1800d69e8 0x141
None 0x1801940a0 0x145
None 0x1800f581c 0x146
None 0x18015353c 0x147
None 0x180153604 0x148
None 0x180153854 0x149
None 0x180153918 0x14a
None 0x1800cdb28 0x14b
None 0x1800cb3ec 0x14c
None 0x180153798 0x14d
None 0x180153a5c 0x14e
None 0x1800bb618 0x14f
None 0x1800f3330 0x151
None 0x1800f5e00 0x153
None 0x180153b08 0x155
None 0x180153b48 0x156
None 0x180153bc0 0x157
None 0x180153c10 0x158
None 0x180153c80 0x159
None 0x180153cf0 0x15a
None 0x1801533e0 0x15b
None 0x18015342c 0x15c
None 0x18015346c 0x15d
None 0x1801534cc 0x15e
None 0x1800dae64 0x15f
None 0x180153d30 0x160
None 0x1800fce80 0x161
None 0x1800ce678 0x162
None 0x1800ce39c 0x163
None 0x1801536cc 0x164
None 0x1800f7834 0x191
None 0x1800f8c68 0x192
None 0x1800f78a8 0x193
None 0x1800f8c68 0x194
None 0x1800f8c68 0x195
None 0x1800f8c68 0x196
None 0x1800f8c68 0x197
None 0x1800f8c68 0x198
None 0x1800f8c68 0x199
None 0x1800f8c68 0x19a
Digital Signatures (2)
»
Signature Properties
InternalName acecore
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4569.1503
FileDescription Microsoft Access database engine DLL
OriginalFilename acecore.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-11-11 22:11
Valid to 2015-02-11 22:11
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 4C A1 E8 4D CC B4 74 7B 3B 00 00 00 00 00 4C
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\acecore.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acecore.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acecore.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 2.17 MB
Hash Values MD5: c38c8e56896e4b6f62ba80600da2b576
SHA1: 70bc45e9f8c74b0dab7bed3c6480b7803c33833b
SHA256: 16a27ed87324a63e5f07bce00d5e1c65c77952a93ad956dacac865798c8a344f
Actions
c:\program files\common files\microsoft shared\office15\acedao.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acedao.dll (Modified File)
Size 602.75 KB
Hash Values MD5: 007d0774541f6a407ab2ab423809a589
SHA1: 5e9ffb67ebeec13ef1b105fd72822ac6214e4f77
SHA256: c692d04a55a7e6b8867a6537ab503cb115fa006121c1bfb9b243bbef7f3a2a36
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001000
Size Of Code 0x62800
Size Of Initialized Data 0x33000
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:14:21
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x6263c 0x62800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.31
.rdata 0x180064000 0x199e4 0x19a00 0x62c00 CNT_INITIALIZED_DATA, MEM_READ 3.8
.data 0x18007e000 0x3018 0x2600 0x7c600 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.96
.pdata 0x180082000 0x4f74 0x5000 0x7ec00 CNT_INITIALIZED_DATA, MEM_READ 5.62
.rsrc 0x180087000 0xf0a8 0xf200 0x83c00 CNT_INITIALIZED_DATA, MEM_READ 4.76
.reloc 0x180097000 0x21b8 0x2200 0x92e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.44
Imports (129)
»
ole32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoGetMalloc 0x0 0x180064000 0x7aa48 0x79648
StringFromGUID2 0x0 0x180064008 0x7aa50 0x79650
MSVCR100.dll (36)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x180064018 0x7aa60 0x79660
?terminate@@YAXXZ 0x0 0x180064020 0x7aa68 0x79668
__clean_type_info_names_internal 0x0 0x180064028 0x7aa70 0x79670
_onexit 0x0 0x180064030 0x7aa78 0x79678
_lock 0x0 0x180064038 0x7aa80 0x79680
__dllonexit 0x0 0x180064040 0x7aa88 0x79688
_unlock 0x0 0x180064048 0x7aa90 0x79690
__crt_debugger_hook 0x0 0x180064050 0x7aa98 0x79698
__CppXcptFilter 0x0 0x180064058 0x7aaa0 0x796a0
_amsg_exit 0x0 0x180064060 0x7aaa8 0x796a8
_encoded_null 0x0 0x180064068 0x7aab0 0x796b0
_initterm_e 0x0 0x180064070 0x7aab8 0x796b8
_initterm 0x0 0x180064078 0x7aac0 0x796c0
_malloc_crt 0x0 0x180064080 0x7aac8 0x796c8
wcsrchr 0x0 0x180064088 0x7aad0 0x796d0
wcsncat_s 0x0 0x180064090 0x7aad8 0x796d8
_stricmp 0x0 0x180064098 0x7aae0 0x796e0
__C_specific_handler 0x0 0x1800640a0 0x7aae8 0x796e8
_wcsicmp 0x0 0x1800640a8 0x7aaf0 0x796f0
_vsnwprintf_s 0x0 0x1800640b0 0x7aaf8 0x796f8
wcscspn 0x0 0x1800640b8 0x7ab00 0x79700
_wtoi 0x0 0x1800640c0 0x7ab08 0x79708
atol 0x0 0x1800640c8 0x7ab10 0x79710
atoi 0x0 0x1800640d0 0x7ab18 0x79718
_wcsnicmp 0x0 0x1800640d8 0x7ab20 0x79720
wcsstr 0x0 0x1800640e0 0x7ab28 0x79728
wcschr 0x0 0x1800640e8 0x7ab30 0x79730
_snwprintf_s 0x0 0x1800640f0 0x7ab38 0x79738
malloc 0x0 0x1800640f8 0x7ab40 0x79740
free 0x0 0x180064100 0x7ab48 0x79748
memmove 0x0 0x180064108 0x7ab50 0x79750
memchr 0x0 0x180064110 0x7ab58 0x79758
memset 0x0 0x180064118 0x7ab60 0x79760
toupper 0x0 0x180064120 0x7ab68 0x79768
wcsncpy_s 0x0 0x180064128 0x7ab70 0x79770
memcpy 0x0 0x180064130 0x7ab78 0x79778
KERNEL32.dll (55)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LocalAlloc 0x0 0x180064140 0x7ab88 0x79788
RtlCaptureContext 0x0 0x180064148 0x7ab90 0x79790
RtlLookupFunctionEntry 0x0 0x180064150 0x7ab98 0x79798
RtlVirtualUnwind 0x0 0x180064158 0x7aba0 0x797a0
IsDebuggerPresent 0x0 0x180064160 0x7aba8 0x797a8
SetUnhandledExceptionFilter 0x0 0x180064168 0x7abb0 0x797b0
UnhandledExceptionFilter 0x0 0x180064170 0x7abb8 0x797b8
GetCurrentProcess 0x0 0x180064178 0x7abc0 0x797c0
TerminateProcess 0x0 0x180064180 0x7abc8 0x797c8
DecodePointer 0x0 0x180064188 0x7abd0 0x797d0
EncodePointer 0x0 0x180064190 0x7abd8 0x797d8
WerRegisterMemoryBlock 0x0 0x180064198 0x7abe0 0x797e0
VirtualProtect 0x0 0x1800641a0 0x7abe8 0x797e8
GetTickCount 0x0 0x1800641a8 0x7abf0 0x797f0
GetSystemTimeAsFileTime 0x0 0x1800641b0 0x7abf8 0x797f8
HeapSetInformation 0x0 0x1800641b8 0x7ac00 0x79800
GetProcessHeap 0x0 0x1800641c0 0x7ac08 0x79808
QueryPerformanceCounter 0x0 0x1800641c8 0x7ac10 0x79810
TlsGetValue 0x0 0x1800641d0 0x7ac18 0x79818
lstrlenW 0x0 0x1800641d8 0x7ac20 0x79820
GetProcAddress 0x0 0x1800641e0 0x7ac28 0x79828
CompareStringW 0x0 0x1800641e8 0x7ac30 0x79830
WideCharToMultiByte 0x0 0x1800641f0 0x7ac38 0x79838
GetCPInfo 0x0 0x1800641f8 0x7ac40 0x79840
CompareStringA 0x0 0x180064200 0x7ac48 0x79848
GetSystemDefaultLCID 0x0 0x180064208 0x7ac50 0x79850
FreeLibrary 0x0 0x180064210 0x7ac58 0x79858
GlobalAlloc 0x0 0x180064218 0x7ac60 0x79860
GlobalReAlloc 0x0 0x180064220 0x7ac68 0x79868
GlobalLock 0x0 0x180064228 0x7ac70 0x79870
GlobalUnlock 0x0 0x180064230 0x7ac78 0x79878
GlobalFree 0x0 0x180064238 0x7ac80 0x79880
lstrlenA 0x0 0x180064240 0x7ac88 0x79888
MultiByteToWideChar 0x0 0x180064248 0x7ac90 0x79890
InitializeCriticalSection 0x0 0x180064250 0x7ac98 0x79898
DeleteCriticalSection 0x0 0x180064258 0x7aca0 0x798a0
TlsSetValue 0x0 0x180064260 0x7aca8 0x798a8
Sleep 0x0 0x180064268 0x7acb0 0x798b0
TlsAlloc 0x0 0x180064270 0x7acb8 0x798b8
TlsFree 0x0 0x180064278 0x7acc0 0x798c0
EnterCriticalSection 0x0 0x180064280 0x7acc8 0x798c8
LeaveCriticalSection 0x0 0x180064288 0x7acd0 0x798d0
GetCurrentProcessId 0x0 0x180064290 0x7acd8 0x798d8
GetCurrentThreadId 0x0 0x180064298 0x7ace0 0x798e0
CreateFileW 0x0 0x1800642a0 0x7ace8 0x798e8
DeleteFileW 0x0 0x1800642a8 0x7acf0 0x798f0
GetFileAttributesW 0x0 0x1800642b0 0x7acf8 0x798f8
GetFullPathNameW 0x0 0x1800642b8 0x7ad00 0x79900
WriteFile 0x0 0x1800642c0 0x7ad08 0x79908
CloseHandle 0x0 0x1800642c8 0x7ad10 0x79910
GetLastError 0x0 0x1800642d0 0x7ad18 0x79918
RaiseException 0x0 0x1800642d8 0x7ad20 0x79920
LoadLibraryA 0x0 0x1800642e0 0x7ad28 0x79928
GetModuleHandleW 0x0 0x1800642e8 0x7ad30 0x79930
LoadLibraryExW 0x0 0x1800642f0 0x7ad38 0x79938
ADVAPI32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
EventWrite 0x0 0x180064300 0x7ad48 0x79948
EventUnregister 0x0 0x180064308 0x7ad50 0x79950
EventRegister 0x0 0x180064310 0x7ad58 0x79958
RegOpenKeyExA 0x0 0x180064318 0x7ad60 0x79960
RegCloseKey 0x0 0x180064320 0x7ad68 0x79968
RegGetValueW 0x0 0x180064328 0x7ad70 0x79970
RegQueryValueExW 0x0 0x180064330 0x7ad78 0x79978
OLEAUT32.dll (29)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysStringLen 0x7 0x180064340 0x7ad88 0x79988
SysStringByteLen 0x95 0x180064348 0x7ad90 0x79990
SysFreeString 0x6 0x180064350 0x7ad98 0x79998
SysAllocStringLen 0x4 0x180064358 0x7ada0 0x799a0
SysAllocString 0x2 0x180064360 0x7ada8 0x799a8
SetErrorInfo 0xc9 0x180064368 0x7adb0 0x799b0
CreateErrorInfo 0xca 0x180064370 0x7adb8 0x799b8
SysAllocStringByteLen 0x96 0x180064378 0x7adc0 0x799c0
LoadTypeLib 0xa1 0x180064380 0x7adc8 0x799c8
LoadRegTypeLib 0xa2 0x180064388 0x7add0 0x799d0
DispGetIDsOfNames 0x1d 0x180064390 0x7add8 0x799d8
DispInvoke 0x1e 0x180064398 0x7ade0 0x799e0
VariantInit 0x8 0x1800643a0 0x7ade8 0x799e8
GetErrorInfo 0xc8 0x1800643a8 0x7adf0 0x799f0
VariantClear 0x9 0x1800643b0 0x7adf8 0x799f8
SysReAllocString 0x3 0x1800643b8 0x7ae00 0x79a00
SafeArrayCreate 0xf 0x1800643c0 0x7ae08 0x79a08
SafeArrayDestroy 0x10 0x1800643c8 0x7ae10 0x79a10
SafeArrayRedim 0x28 0x1800643d0 0x7ae18 0x79a18
SafeArrayLock 0x15 0x1800643d8 0x7ae20 0x79a20
SafeArrayUnlock 0x16 0x1800643e0 0x7ae28 0x79a28
VariantCopy 0xa 0x1800643e8 0x7ae30 0x79a30
VariantChangeType 0xc 0x1800643f0 0x7ae38 0x79a38
VariantChangeTypeEx 0x93 0x1800643f8 0x7ae40 0x79a40
SafeArrayGetUBound 0x13 0x180064400 0x7ae48 0x79a48
SafeArrayAccessData 0x17 0x180064408 0x7ae50 0x79a50
SafeArrayUnaccessData 0x18 0x180064410 0x7ae58 0x79a58
SafeArrayGetElement 0x19 0x180064418 0x7ae60 0x79a60
SafeArrayPutElement 0x1a 0x180064420 0x7ae68 0x79a68
Exports (2)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x1800302e4 0x1
DllGetClassObject 0x180001ed4 0x2
Digital Signatures (2)
»
Signature Properties
InternalName acedao
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4569.1503
FileDescription Microsoft Access database engine Data Access Object Library
OriginalFilename acedao.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 34 24 31 40 C9 A0 C1 79 8D 00 00 00 00 00 34
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\acedao.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acedao.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acedao.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 602.93 KB
Hash Values MD5: b49efe9ba26919fdc25b2d725bf9ca5d
SHA1: 3753cbeacc00511bc63d961e0f711a2885acf12d
SHA256: 316aee7c9032c96299e0de908ccada5dd238b85dfd6f98aaf386e051c962d0ad
Actions
c:\program files\common files\microsoft shared\office15\aceerr.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceerr.dll (Modified File)
Size 39.71 KB
Hash Values MD5: 832df455a6e9126b8215ab7837212808
SHA1: 253aebdb6ce8e3bb19ce52ad5fef1a3c50f38f74
SHA256: 8e7c6603fdc9f5a7da643c99202a6568492ad840a8d833382f4887dbd038859a
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001a74
Size Of Code 0x2800
Size Of Initialized Data 0x6600
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-08-08 07:46:09
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x265c 0x2800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.1
.rdata 0x180004000 0x4678 0x4800 0x2c00 CNT_INITIALIZED_DATA, MEM_READ 4.2
.data 0x180009000 0x1028 0x400 0x7400 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 2.03
.pdata 0x18000b000 0x360 0x400 0x7800 CNT_INITIALIZED_DATA, MEM_READ 3.64
.rsrc 0x18000c000 0x498 0x600 0x7c00 CNT_INITIALIZED_DATA, MEM_READ 2.67
.reloc 0x18000d000 0xa8 0x200 0x8200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 2.22
Imports (52)
»
MSVCR100.dll (21)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x180004000 0x7e28 0x6a28
?terminate@@YAXXZ 0x0 0x180004008 0x7e30 0x6a30
_onexit 0x0 0x180004010 0x7e38 0x6a38
_lock 0x0 0x180004018 0x7e40 0x6a40
__dllonexit 0x0 0x180004020 0x7e48 0x6a48
_unlock 0x0 0x180004028 0x7e50 0x6a50
__clean_type_info_names_internal 0x0 0x180004030 0x7e58 0x6a58
__crt_debugger_hook 0x0 0x180004038 0x7e60 0x6a60
__CppXcptFilter 0x0 0x180004040 0x7e68 0x6a68
__C_specific_handler 0x0 0x180004048 0x7e70 0x6a70
_amsg_exit 0x0 0x180004050 0x7e78 0x6a78
_encoded_null 0x0 0x180004058 0x7e80 0x6a80
free 0x0 0x180004060 0x7e88 0x6a88
_initterm_e 0x0 0x180004068 0x7e90 0x6a90
_initterm 0x0 0x180004070 0x7e98 0x6a98
_malloc_crt 0x0 0x180004078 0x7ea0 0x6aa0
wcsrchr 0x0 0x180004080 0x7ea8 0x6aa8
wcsncpy_s 0x0 0x180004088 0x7eb0 0x6ab0
_stricmp 0x0 0x180004090 0x7eb8 0x6ab8
wcsncat_s 0x0 0x180004098 0x7ec0 0x6ac0
wcschr 0x0 0x1800040a0 0x7ec8 0x6ac8
ADVAPI32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegGetValueW 0x0 0x1800040b0 0x7ed8 0x6ad8
KERNEL32.dll (29)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LocalAlloc 0x0 0x1800040c0 0x7ee8 0x6ae8
DisableThreadLibraryCalls 0x0 0x1800040c8 0x7ef0 0x6af0
RtlCaptureContext 0x0 0x1800040d0 0x7ef8 0x6af8
RtlLookupFunctionEntry 0x0 0x1800040d8 0x7f00 0x6b00
RtlVirtualUnwind 0x0 0x1800040e0 0x7f08 0x6b08
IsDebuggerPresent 0x0 0x1800040e8 0x7f10 0x6b10
SetUnhandledExceptionFilter 0x0 0x1800040f0 0x7f18 0x6b18
UnhandledExceptionFilter 0x0 0x1800040f8 0x7f20 0x6b20
LoadLibraryA 0x0 0x180004100 0x7f28 0x6b28
TerminateProcess 0x0 0x180004108 0x7f30 0x6b30
Sleep 0x0 0x180004110 0x7f38 0x6b38
DecodePointer 0x0 0x180004118 0x7f40 0x6b40
EncodePointer 0x0 0x180004120 0x7f48 0x6b48
WerRegisterMemoryBlock 0x0 0x180004128 0x7f50 0x6b50
VirtualProtect 0x0 0x180004130 0x7f58 0x6b58
GetTickCount 0x0 0x180004138 0x7f60 0x6b60
GetSystemTimeAsFileTime 0x0 0x180004140 0x7f68 0x6b68
GetCurrentThreadId 0x0 0x180004148 0x7f70 0x6b70
GetCurrentProcessId 0x0 0x180004150 0x7f78 0x6b78
GetCurrentProcess 0x0 0x180004158 0x7f80 0x6b80
FreeLibrary 0x0 0x180004160 0x7f88 0x6b88
GetProcAddress 0x0 0x180004168 0x7f90 0x6b90
GetLastError 0x0 0x180004170 0x7f98 0x6b98
GetModuleHandleW 0x0 0x180004178 0x7fa0 0x6ba0
RaiseException 0x0 0x180004180 0x7fa8 0x6ba8
LoadLibraryExW 0x0 0x180004188 0x7fb0 0x6bb0
QueryPerformanceCounter 0x0 0x180004190 0x7fb8 0x6bb8
GetProcessHeap 0x0 0x180004198 0x7fc0 0x6bc0
HeapSetInformation 0x0 0x1800041a0 0x7fc8 0x6bc8
ole32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromGUID2 0x0 0x1800041b0 0x7fd8 0x6bd8
Exports (4)
»
Api name EAT Address Ordinal
JetErrFormattedMessage 0x1800010f4 0x5
JetErrIDAForError 0x180001000 0x2
JetErrIDARawMessage 0x1800024b0 0x3
JetErrRawMessage 0x180002504 0x4
Digital Signatures (2)
»
Signature Properties
InternalName aceerr
FileVersion 15.0.4543.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4543.1000
FileDescription Microsoft Access database engine Error DLL
OriginalFilename aceerr.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 34 24 31 40 C9 A0 C1 79 8D 00 00 00 00 00 34
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\aceerr.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceerr.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceerr.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 39.89 KB
Hash Values MD5: 52faa02dc4f12dde07bcbb65b69b8dad
SHA1: 70d60aa3a92822afbca25fe3f351e20ac5b70379
SHA256: 81249bd83a227142303d2a7830d7518ed14f6a4635f49314c30374784968d736
Actions
c:\program files\common files\microsoft shared\office15\acees.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acees.dll (Modified File)
Size 857.23 KB
Hash Values MD5: f68ef9775a6957488c4654d22a067d67
SHA1: 56655e71291cc8710508eb3c59addaa49a07028d
SHA256: 547242feec7968e975e82519f7e1ada389bd4fd79257f1767b3c289ae28c4efa
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001000
Size Of Code 0x8a200
Size Of Initialized Data 0x4ac00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:25:56
Compiler/Packer Unknown
Sections (7)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x8a19c 0x8a200 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.4
.rdata 0x18008c000 0x289b4 0x28a00 0x8a600 CNT_INITIALIZED_DATA, MEM_READ 4.06
.data 0x1800b5000 0x162e4 0x15c00 0xb3000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 1.22
.pdata 0x1800cc000 0x7fd4 0x8000 0xc8c00 CNT_INITIALIZED_DATA, MEM_READ 5.7
.rtext 0x1800d4000 0x98 0x200 0xd0c00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 1.29
.rsrc 0x1800d5000 0x4a0 0x600 0xd0e00 CNT_INITIALIZED_DATA, MEM_READ 2.73
.reloc 0x1800d6000 0x35cc 0x3600 0xd1400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.45
Imports (199)
»
ole32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoGetMalloc 0x0 0x18008c000 0xabbf8 0xaa1f8
CoCreateInstance 0x0 0x18008c008 0xabc00 0xaa200
StringFromGUID2 0x0 0x18008c010 0xabc08 0xaa208
CoTaskMemFree 0x0 0x18008c018 0xabc10 0xaa210
CoTaskMemRealloc 0x0 0x18008c020 0xabc18 0xaa218
CoTaskMemAlloc 0x0 0x18008c028 0xabc20 0xaa220
CoCreateGuid 0x0 0x18008c030 0xabc28 0xaa228
IIDFromString 0x0 0x18008c038 0xabc30 0xaa230
MSVCR100.dll (55)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
__clean_type_info_names_internal 0x0 0x18008c048 0xabc40 0xaa240
_onexit 0x0 0x18008c050 0xabc48 0xaa248
_lock 0x0 0x18008c058 0xabc50 0xaa250
__dllonexit 0x0 0x18008c060 0xabc58 0xaa258
_unlock 0x0 0x18008c068 0xabc60 0xaa260
__crt_debugger_hook 0x0 0x18008c070 0xabc68 0xaa268
__CppXcptFilter 0x0 0x18008c078 0xabc70 0xaa270
_amsg_exit 0x0 0x18008c080 0xabc78 0xaa278
_encoded_null 0x0 0x18008c088 0xabc80 0xaa280
_initterm_e 0x0 0x18008c090 0xabc88 0xaa288
_initterm 0x0 0x18008c098 0xabc90 0xaa290
_malloc_crt 0x0 0x18008c0a0 0xabc98 0xaa298
vswprintf_s 0x0 0x18008c0a8 0xabca0 0xaa2a0
_controlfp_s 0x0 0x18008c0b0 0xabca8 0xaa2a8
wcschr 0x0 0x18008c0b8 0xabcb0 0xaa2b0
_finite 0x0 0x18008c0c0 0xabcb8 0xaa2b8
_wtoi 0x0 0x18008c0c8 0xabcc0 0xaa2c0
_vsnprintf_s 0x0 0x18008c0d0 0xabcc8 0xaa2c8
_mbsinc 0x0 0x18008c0d8 0xabcd0 0xaa2d0
wcsrchr 0x0 0x18008c0e0 0xabcd8 0xaa2d8
pow 0x0 0x18008c0e8 0xabce0 0xaa2e0
floor 0x0 0x18008c0f0 0xabce8 0xaa2e8
ceil 0x0 0x18008c0f8 0xabcf0 0xaa2f0
sqrt 0x0 0x18008c100 0xabcf8 0xaa2f8
strnlen 0x0 0x18008c108 0xabd00 0xaa300
_stricmp 0x0 0x18008c110 0xabd08 0xaa308
__C_specific_handler 0x0 0x18008c118 0xabd10 0xaa310
?terminate@@YAXXZ 0x0 0x18008c120 0xabd18 0xaa318
wcscspn 0x0 0x18008c128 0xabd20 0xaa320
_CxxThrowException 0x0 0x18008c130 0xabd28 0xaa328
_recalloc 0x0 0x18008c138 0xabd30 0xaa330
memcpy_s 0x0 0x18008c140 0xabd38 0xaa338
wcsstr 0x0 0x18008c148 0xabd40 0xaa340
memcmp 0x0 0x18008c150 0xabd48 0xaa348
_snprintf_s 0x0 0x18008c158 0xabd50 0xaa350
memmove 0x0 0x18008c160 0xabd58 0xaa358
wcsncmp 0x0 0x18008c168 0xabd60 0xaa360
malloc 0x0 0x18008c170 0xabd68 0xaa368
free 0x0 0x18008c178 0xabd70 0xaa370
_memicmp 0x0 0x18008c180 0xabd78 0xaa378
_wcsnicmp 0x0 0x18008c188 0xabd80 0xaa380
_wcsicmp 0x0 0x18008c190 0xabd88 0xaa388
towlower 0x0 0x18008c198 0xabd90 0xaa390
towupper 0x0 0x18008c1a0 0xabd98 0xaa398
__CxxFrameHandler3 0x0 0x18008c1a8 0xabda0 0xaa3a0
iswcntrl 0x0 0x18008c1b0 0xabda8 0xaa3a8
iswalnum 0x0 0x18008c1b8 0xabdb0 0xaa3b0
iswpunct 0x0 0x18008c1c0 0xabdb8 0xaa3b8
iswspace 0x0 0x18008c1c8 0xabdc0 0xaa3c0
iswdigit 0x0 0x18008c1d0 0xabdc8 0xaa3c8
memset 0x0 0x18008c1d8 0xabdd0 0xaa3d0
memcpy 0x0 0x18008c1e0 0xabdd8 0xaa3d8
wcsncpy_s 0x0 0x18008c1e8 0xabde0 0xaa3e0
wcsncat_s 0x0 0x18008c1f0 0xabde8 0xaa3e8
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18008c1f8 0xabdf0 0xaa3f0
ADVAPI32.dll (16)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
ReportEventW 0x0 0x18008c208 0xabe00 0xaa400
EventWrite 0x0 0x18008c210 0xabe08 0xaa408
RegisterEventSourceW 0x0 0x18008c218 0xabe10 0xaa410
DeregisterEventSource 0x0 0x18008c220 0xabe18 0xaa418
RegQueryValueExW 0x0 0x18008c228 0xabe20 0xaa420
RegQueryValueExA 0x0 0x18008c230 0xabe28 0xaa428
RegOpenKeyExA 0x0 0x18008c238 0xabe30 0xaa430
RegSetValueExW 0x0 0x18008c240 0xabe38 0xaa438
RegQueryInfoKeyW 0x0 0x18008c248 0xabe40 0xaa440
RegOpenKeyExW 0x0 0x18008c250 0xabe48 0xaa448
RegEnumKeyExW 0x0 0x18008c258 0xabe50 0xaa450
RegDeleteValueW 0x0 0x18008c260 0xabe58 0xaa458
RegDeleteKeyW 0x0 0x18008c268 0xabe60 0xaa460
RegCreateKeyExW 0x0 0x18008c270 0xabe68 0xaa468
RegCloseKey 0x0 0x18008c278 0xabe70 0xaa470
RegGetValueW 0x0 0x18008c280 0xabe78 0xaa478
KERNEL32.dll (67)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VirtualProtect 0x0 0x18008c290 0xabe88 0xaa488
GetSystemTimeAsFileTime 0x0 0x18008c298 0xabe90 0xaa490
GetCurrentThreadId 0x0 0x18008c2a0 0xabe98 0xaa498
GetCurrentProcessId 0x0 0x18008c2a8 0xabea0 0xaa4a0
HeapSetInformation 0x0 0x18008c2b0 0xabea8 0xaa4a8
GetProcessHeap 0x0 0x18008c2b8 0xabeb0 0xaa4b0
HeapSize 0x0 0x18008c2c0 0xabeb8 0xaa4b8
HeapReAlloc 0x0 0x18008c2c8 0xabec0 0xaa4c0
HeapFree 0x0 0x18008c2d0 0xabec8 0xaa4c8
HeapAlloc 0x0 0x18008c2d8 0xabed0 0xaa4d0
HeapDestroy 0x0 0x18008c2e0 0xabed8 0xaa4d8
QueryPerformanceCounter 0x0 0x18008c2e8 0xabee0 0xaa4e0
GetCurrencyFormatW 0x0 0x18008c2f0 0xabee8 0xaa4e8
GetNumberFormatW 0x0 0x18008c2f8 0xabef0 0xaa4f0
GetTimeFormatW 0x0 0x18008c300 0xabef8 0xaa4f8
GetStringTypeExW 0x0 0x18008c308 0xabf00 0xaa500
LCMapStringW 0x0 0x18008c310 0xabf08 0xaa508
GetACP 0x0 0x18008c318 0xabf10 0xaa510
GetLocalTime 0x0 0x18008c320 0xabf18 0xaa518
GetSystemDefaultLCID 0x0 0x18008c328 0xabf20 0xaa520
GetDateFormatW 0x0 0x18008c330 0xabf28 0xaa528
WerRegisterMemoryBlock 0x0 0x18008c338 0xabf30 0xaa530
GetTickCount 0x0 0x18008c340 0xabf38 0xaa538
LockResource 0x0 0x18008c348 0xabf40 0xaa540
FindResourceExW 0x0 0x18008c350 0xabf48 0xaa548
GetLocaleInfoW 0x0 0x18008c358 0xabf50 0xaa550
LoadLibraryA 0x0 0x18008c360 0xabf58 0xaa558
EncodePointer 0x0 0x18008c368 0xabf60 0xaa560
DecodePointer 0x0 0x18008c370 0xabf68 0xaa568
Sleep 0x0 0x18008c378 0xabf70 0xaa570
TerminateProcess 0x0 0x18008c380 0xabf78 0xaa578
GetCurrentProcess 0x0 0x18008c388 0xabf80 0xaa580
UnhandledExceptionFilter 0x0 0x18008c390 0xabf88 0xaa588
SetUnhandledExceptionFilter 0x0 0x18008c398 0xabf90 0xaa590
IsDebuggerPresent 0x0 0x18008c3a0 0xabf98 0xaa598
RtlVirtualUnwind 0x0 0x18008c3a8 0xabfa0 0xaa5a0
RtlLookupFunctionEntry 0x0 0x18008c3b0 0xabfa8 0xaa5a8
RtlCaptureContext 0x0 0x18008c3b8 0xabfb0 0xaa5b0
LocalAlloc 0x0 0x18008c3c0 0xabfb8 0xaa5b8
RaiseException 0x0 0x18008c3c8 0xabfc0 0xaa5c0
GetUserDefaultLangID 0x0 0x18008c3d0 0xabfc8 0xaa5c8
lstrcmpiA 0x0 0x18008c3d8 0xabfd0 0xaa5d0
GetLastError 0x0 0x18008c3e0 0xabfd8 0xaa5d8
MultiByteToWideChar 0x0 0x18008c3e8 0xabfe0 0xaa5e0
WideCharToMultiByte 0x0 0x18008c3f0 0xabfe8 0xaa5e8
GetLocaleInfoA 0x0 0x18008c3f8 0xabff0 0xaa5f0
EnterCriticalSection 0x0 0x18008c400 0xabff8 0xaa5f8
LeaveCriticalSection 0x0 0x18008c408 0xac000 0xaa600
GetVersionExA 0x0 0x18008c410 0xac008 0xaa608
GetUserDefaultLCID 0x0 0x18008c418 0xac010 0xaa610
IsDBCSLeadByte 0x0 0x18008c420 0xac018 0xaa618
InitializeCriticalSectionAndSpinCount 0x0 0x18008c428 0xac020 0xaa620
DeleteCriticalSection 0x0 0x18008c430 0xac028 0xaa628
FreeLibrary 0x0 0x18008c438 0xac030 0xaa630
GetModuleFileNameW 0x0 0x18008c440 0xac038 0xaa638
GetModuleHandleW 0x0 0x18008c448 0xac040 0xaa640
GetProcAddress 0x0 0x18008c450 0xac048 0xaa648
LoadLibraryExW 0x0 0x18008c458 0xac050 0xaa650
LoadResource 0x0 0x18008c460 0xac058 0xaa658
SizeofResource 0x0 0x18008c468 0xac060 0xaa660
lstrcmpiW 0x0 0x18008c470 0xac068 0xaa668
lstrlenW 0x0 0x18008c478 0xac070 0xaa670
FindResourceW 0x0 0x18008c480 0xac078 0xaa678
GetModuleHandleA 0x0 0x18008c488 0xac080 0xaa680
CompareStringW 0x0 0x18008c490 0xac088 0xaa688
CompareStringA 0x0 0x18008c498 0xac090 0xaa690
InitializeCriticalSection 0x0 0x18008c4a0 0xac098 0xaa698
OLEAUT32.dll (49)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysAllocString 0x2 0x18008c4b0 0xac0a8 0xaa6a8
SysAllocStringLen 0x4 0x18008c4b8 0xac0b0 0xaa6b0
SysReAllocStringLen 0x5 0x18008c4c0 0xac0b8 0xaa6b8
SysFreeString 0x6 0x18008c4c8 0xac0c0 0xaa6c0
SysStringLen 0x7 0x18008c4d0 0xac0c8 0xaa6c8
SysStringByteLen 0x95 0x18008c4d8 0xac0d0 0xaa6d0
SysAllocStringByteLen 0x96 0x18008c4e0 0xac0d8 0xaa6d8
VariantInit 0x8 0x18008c4e8 0xac0e0 0xaa6e0
VariantClear 0x9 0x18008c4f0 0xac0e8 0xaa6e8
VariantCopy 0xa 0x18008c4f8 0xac0f0 0xaa6f0
VariantChangeType 0xc 0x18008c500 0xac0f8 0xaa6f8
VarI2FromStr 0x36 0x18008c508 0xac100 0xaa700
VarI4FromStr 0x40 0x18008c510 0xac108 0xaa708
VarR4FromStr 0x4a 0x18008c518 0xac110 0xaa710
VarR8FromStr 0x54 0x18008c520 0xac118 0xaa718
VarDateFromStr 0x5e 0x18008c528 0xac120 0xaa720
VarCyFromStr 0x68 0x18008c530 0xac128 0xaa728
VarBstrFromI2 0x6d 0x18008c538 0xac130 0xaa730
VarBstrFromI4 0x6e 0x18008c540 0xac138 0xaa738
VarBstrFromR4 0x6f 0x18008c548 0xac140 0xaa740
VarBstrFromR8 0x70 0x18008c550 0xac148 0xaa748
VarBstrFromCy 0x71 0x18008c558 0xac150 0xaa750
VarBstrFromDate 0x72 0x18008c560 0xac158 0xaa758
VarBstrFromDec 0xe8 0x18008c568 0xac160 0xaa760
VarDecFromStr 0xc5 0x18008c570 0xac168 0xaa768
LHashValOfNameSys 0xa5 0x18008c578 0xac170 0xaa770
SafeArrayCreate 0xf 0x18008c580 0xac178 0xaa778
SafeArrayDestroy 0x10 0x18008c588 0xac180 0xaa780
SafeArrayGetElemsize 0x12 0x18008c590 0xac188 0xaa788
SafeArrayGetUBound 0x13 0x18008c598 0xac190 0xaa790
SafeArrayGetLBound 0x14 0x18008c5a0 0xac198 0xaa798
SafeArrayAccessData 0x17 0x18008c5a8 0xac1a0 0xaa7a0
SafeArrayUnaccessData 0x18 0x18008c5b0 0xac1a8 0xaa7a8
SafeArrayPutElement 0x1a 0x18008c5b8 0xac1b0 0xaa7b0
VarUI4FromStr 0x115 0x18008c5c0 0xac1b8 0xaa7b8
LoadRegTypeLib 0xa2 0x18008c5c8 0xac1c0 0xaa7c0
CreateStdDispatch 0x20 0x18008c5d0 0xac1c8 0xaa7c8
SystemTimeToVariantTime 0xb8 0x18008c5d8 0xac1d0 0xaa7d0
VariantChangeTypeEx 0x93 0x18008c5e0 0xac1d8 0xaa7d8
LoadTypeLib 0xa1 0x18008c5e8 0xac1e0 0xaa7e0
SafeArrayGetDim 0x11 0x18008c5f0 0xac1e8 0xaa7e8
SafeArrayLock 0x15 0x18008c5f8 0xac1f0 0xaa7f0
SafeArrayUnlock 0x16 0x18008c600 0xac1f8 0xaa7f8
SafeArrayGetElement 0x19 0x18008c608 0xac200 0xaa800
SafeArrayCreateVector 0x19b 0x18008c610 0xac208 0xaa808
GetAltMonthNames 0x14c 0x18008c618 0xac210 0xaa810
VarDateFromUdate 0x14a 0x18008c620 0xac218 0xaa818
VarUdateFromDate 0x14b 0x18008c628 0xac220 0xaa820
VariantTimeToSystemTime 0xb9 0x18008c630 0xac228 0xaa828
VERSION.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VerQueryValueW 0x0 0x18008c640 0xac238 0xaa838
GetFileVersionInfoSizeW 0x0 0x18008c648 0xac240 0xaa840
GetFileVersionInfoW 0x0 0x18008c650 0xac248 0xaa848
MSVCP100.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x18008c660 0xac258 0xaa858
Exports (3)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x180039110 0xd
DllGetClassObject 0x180001a50 0xe
DllMain 0x1800016ac 0xc
Digital Signatures (2)
»
Signature Properties
InternalName acees
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4569.1503
FileDescription Microsoft Access database engine Expression Service
OriginalFilename acees.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-11-11 22:11
Valid to 2015-02-11 22:11
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 4C A1 E8 4D CC B4 74 7B 3B 00 00 00 00 00 4C
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\acees.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acees.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acees.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 857.41 KB
Hash Values MD5: 5bbf849c53adb02a9b4a3d080a8b640f
SHA1: 9f6cc88a83abacd313ebeb3822fec21f46cc4a06
SHA256: f1e61402c69c706852a9d7628260cc3fc5ed5e570e1cb68a8c70abd8fce7c20a
Actions
c:\program files\common files\microsoft shared\office15\aceexch.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceexch.dll (Modified File)
Size 242.23 KB
Hash Values MD5: 695833a6e9dc213f149bc07ebe131151
SHA1: 7f1f65d609c224fe5be7b4b928f46852e7ee288b
SHA256: 6df83d5a3e673b27aaf17135cbff03245f9d16e22101c95d0b7e4ba51931b901
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x1800198ac
Size Of Code 0x2c800
Size Of Initialized Data 0xee00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-08-08 07:43:40
Compiler/Packer Unknown
Sections (8)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x19c48 0x19e00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.33
CURSORS 0x18001b000 0x5db5 0x5e00 0x1a200 CNT_CODE, MEM_EXECUTE, MEM_READ 6.23
BASE 0x180021000 0xcbfd 0xcc00 0x20000 CNT_CODE, MEM_EXECUTE, MEM_READ 6.25
.rdata 0x18002e000 0x6a60 0x6c00 0x2cc00 CNT_INITIALIZED_DATA, MEM_READ 4.52
.data 0x180035000 0x5ae8 0x5000 0x33800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 2.79
.pdata 0x18003b000 0x1968 0x1a00 0x38800 CNT_INITIALIZED_DATA, MEM_READ 5.23
.rsrc 0x18003d000 0x4a0 0x600 0x3a200 CNT_INITIALIZED_DATA, MEM_READ 2.73
.reloc 0x18003e000 0x500 0x600 0x3a800 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.99
Imports (123)
»
ole32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromGUID2 0x0 0x18002e000 0x30a58 0x2f658
StgCreateDocfile 0x0 0x18002e008 0x30a60 0x2f660
acecore.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x9d 0x18002e018 0x30a70 0x2f670
(by ordinal) 0x6b 0x18002e020 0x30a78 0x2f678
(by ordinal) 0x8c 0x18002e028 0x30a80 0x2f680
(by ordinal) 0x72 0x18002e030 0x30a88 0x2f688
(by ordinal) 0x65 0x18002e038 0x30a90 0x2f690
(by ordinal) 0x92 0x18002e040 0x30a98 0x2f698
(by ordinal) 0x7e 0x18002e048 0x30aa0 0x2f6a0
(by ordinal) 0x76 0x18002e050 0x30aa8 0x2f6a8
(by ordinal) 0x9e 0x18002e058 0x30ab0 0x2f6b0
(by ordinal) 0x6c 0x18002e060 0x30ab8 0x2f6b8
(by ordinal) 0xb3 0x18002e068 0x30ac0 0x2f6c0
(by ordinal) 0xa7 0x18002e070 0x30ac8 0x2f6c8
(by ordinal) 0xac 0x18002e078 0x30ad0 0x2f6d0
(by ordinal) 0x9f 0x18002e080 0x30ad8 0x2f6d8
(by ordinal) 0xad 0x18002e088 0x30ae0 0x2f6e0
(by ordinal) 0x9c 0x18002e090 0x30ae8 0x2f6e8
(by ordinal) 0x9b 0x18002e098 0x30af0 0x2f6f0
(by ordinal) 0xaa 0x18002e0a0 0x30af8 0x2f6f8
(by ordinal) 0x38c 0x18002e0a8 0x30b00 0x2f700
(by ordinal) 0x85 0x18002e0b0 0x30b08 0x2f708
MSVCR100.dll (41)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18002e0c0 0x30b18 0x2f718
__clean_type_info_names_internal 0x0 0x18002e0c8 0x30b20 0x2f720
?terminate@@YAXXZ 0x0 0x18002e0d0 0x30b28 0x2f728
__crt_debugger_hook 0x0 0x18002e0d8 0x30b30 0x2f730
_onexit 0x0 0x18002e0e0 0x30b38 0x2f738
_lock 0x0 0x18002e0e8 0x30b40 0x2f740
__dllonexit 0x0 0x18002e0f0 0x30b48 0x2f748
_unlock 0x0 0x18002e0f8 0x30b50 0x2f750
__CppXcptFilter 0x0 0x18002e100 0x30b58 0x2f758
_amsg_exit 0x0 0x18002e108 0x30b60 0x2f760
_encoded_null 0x0 0x18002e110 0x30b68 0x2f768
_initterm_e 0x0 0x18002e118 0x30b70 0x2f770
_initterm 0x0 0x18002e120 0x30b78 0x2f778
_malloc_crt 0x0 0x18002e128 0x30b80 0x2f780
wcsncat_s 0x0 0x18002e130 0x30b88 0x2f788
_stricmp 0x0 0x18002e138 0x30b90 0x2f790
__C_specific_handler 0x0 0x18002e140 0x30b98 0x2f798
wcstok_s 0x0 0x18002e148 0x30ba0 0x2f7a0
_wtoi 0x0 0x18002e150 0x30ba8 0x2f7a8
_snwprintf_s 0x0 0x18002e158 0x30bb0 0x2f7b0
_CxxThrowException 0x0 0x18002e160 0x30bb8 0x2f7b8
_wcsdup 0x0 0x18002e168 0x30bc0 0x2f7c0
strncpy_s 0x0 0x18002e170 0x30bc8 0x2f7c8
_invalid_parameter_noinfo_noreturn 0x0 0x18002e178 0x30bd0 0x2f7d0
__CxxFrameHandler3 0x0 0x18002e180 0x30bd8 0x2f7d8
malloc 0x0 0x18002e188 0x30be0 0x2f7e0
free 0x0 0x18002e190 0x30be8 0x2f7e8
_wfullpath 0x0 0x18002e198 0x30bf0 0x2f7f0
towlower 0x0 0x18002e1a0 0x30bf8 0x2f7f8
wcsstr 0x0 0x18002e1a8 0x30c00 0x2f800
_wsplitpath_s 0x0 0x18002e1b0 0x30c08 0x2f808
iswctype 0x0 0x18002e1b8 0x30c10 0x2f810
wcsrchr 0x0 0x18002e1c0 0x30c18 0x2f818
wcsncpy_s 0x0 0x18002e1c8 0x30c20 0x2f820
wcschr 0x0 0x18002e1d0 0x30c28 0x2f828
floor 0x0 0x18002e1d8 0x30c30 0x2f830
memcmp 0x0 0x18002e1e0 0x30c38 0x2f838
_mbsicmp 0x0 0x18002e1e8 0x30c40 0x2f840
_vsnwprintf_s 0x0 0x18002e1f0 0x30c48 0x2f848
memset 0x0 0x18002e1f8 0x30c50 0x2f850
memcpy 0x0 0x18002e200 0x30c58 0x2f858
ADVAPI32.dll (6)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegQueryValueExW 0x0 0x18002e210 0x30c68 0x2f868
RegQueryValueExA 0x0 0x18002e218 0x30c70 0x2f870
RegOpenKeyExA 0x0 0x18002e220 0x30c78 0x2f878
RegOpenKeyExW 0x0 0x18002e228 0x30c80 0x2f880
RegCloseKey 0x0 0x18002e230 0x30c88 0x2f888
RegGetValueW 0x0 0x18002e238 0x30c90 0x2f890
KERNEL32.dll (47)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VirtualProtect 0x0 0x18002e248 0x30ca0 0x2f8a0
GetTickCount 0x0 0x18002e250 0x30ca8 0x2f8a8
GetSystemTimeAsFileTime 0x0 0x18002e258 0x30cb0 0x2f8b0
HeapSetInformation 0x0 0x18002e260 0x30cb8 0x2f8b8
GetProcessHeap 0x0 0x18002e268 0x30cc0 0x2f8c0
QueryPerformanceCounter 0x0 0x18002e270 0x30cc8 0x2f8c8
GetPrivateProfileStringW 0x0 0x18002e278 0x30cd0 0x2f8d0
LoadLibraryExW 0x0 0x18002e280 0x30cd8 0x2f8d8
GetModuleHandleW 0x0 0x18002e288 0x30ce0 0x2f8e0
WerRegisterMemoryBlock 0x0 0x18002e290 0x30ce8 0x2f8e8
ExpandEnvironmentStringsW 0x0 0x18002e298 0x30cf0 0x2f8f0
RaiseException 0x0 0x18002e2a0 0x30cf8 0x2f8f8
WritePrivateProfileStringW 0x0 0x18002e2a8 0x30d00 0x2f900
DisableThreadLibraryCalls 0x0 0x18002e2b0 0x30d08 0x2f908
GetFileAttributesW 0x0 0x18002e2b8 0x30d10 0x2f910
GetCurrentDirectoryW 0x0 0x18002e2c0 0x30d18 0x2f918
SetCurrentDirectoryW 0x0 0x18002e2c8 0x30d20 0x2f920
GetProcAddress 0x0 0x18002e2d0 0x30d28 0x2f928
FreeLibrary 0x0 0x18002e2d8 0x30d30 0x2f930
GetCurrentProcessId 0x0 0x18002e2e0 0x30d38 0x2f938
GlobalFree 0x0 0x18002e2e8 0x30d40 0x2f940
GlobalUnlock 0x0 0x18002e2f0 0x30d48 0x2f948
GlobalLock 0x0 0x18002e2f8 0x30d50 0x2f950
EncodePointer 0x0 0x18002e300 0x30d58 0x2f958
DecodePointer 0x0 0x18002e308 0x30d60 0x2f960
Sleep 0x0 0x18002e310 0x30d68 0x2f968
TerminateProcess 0x0 0x18002e318 0x30d70 0x2f970
GetCurrentProcess 0x0 0x18002e320 0x30d78 0x2f978
UnhandledExceptionFilter 0x0 0x18002e328 0x30d80 0x2f980
SetUnhandledExceptionFilter 0x0 0x18002e330 0x30d88 0x2f988
IsDebuggerPresent 0x0 0x18002e338 0x30d90 0x2f990
RtlVirtualUnwind 0x0 0x18002e340 0x30d98 0x2f998
RtlLookupFunctionEntry 0x0 0x18002e348 0x30da0 0x2f9a0
RtlCaptureContext 0x0 0x18002e350 0x30da8 0x2f9a8
LocalAlloc 0x0 0x18002e358 0x30db0 0x2f9b0
FileTimeToSystemTime 0x0 0x18002e360 0x30db8 0x2f9b8
GetCurrentThreadId 0x0 0x18002e368 0x30dc0 0x2f9c0
GetLastError 0x0 0x18002e370 0x30dc8 0x2f9c8
SystemTimeToTzSpecificLocalTime 0x0 0x18002e378 0x30dd0 0x2f9d0
LoadLibraryA 0x0 0x18002e380 0x30dd8 0x2f9d8
SystemTimeToFileTime 0x0 0x18002e388 0x30de0 0x2f9e0
GetTimeZoneInformation 0x0 0x18002e390 0x30de8 0x2f9e8
MultiByteToWideChar 0x0 0x18002e398 0x30df0 0x2f9f0
WideCharToMultiByte 0x0 0x18002e3a0 0x30df8 0x2f9f8
GetCPInfo 0x0 0x18002e3a8 0x30e00 0x2fa00
GetUserDefaultLCID 0x0 0x18002e3b0 0x30e08 0x2fa08
GlobalAlloc 0x0 0x18002e3b8 0x30e10 0x2fa10
OLEAUT32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VarBstrFromR8 0x70 0x18002e3c8 0x30e20 0x2fa20
VarR8FromDec 0xdc 0x18002e3d0 0x30e28 0x2fa28
VarR8FromStr 0x54 0x18002e3d8 0x30e30 0x2fa30
SysFreeString 0x6 0x18002e3e0 0x30e38 0x2fa38
SysAllocStringLen 0x4 0x18002e3e8 0x30e40 0x2fa40
VarI2FromStr 0x36 0x18002e3f0 0x30e48 0x2fa48
VarDecFromR8 0xc2 0x18002e3f8 0x30e50 0x2fa50
Exports (3)
»
Api name EAT Address Ordinal
None 0x1800075a4 0x1
None 0x18000742c 0xa
None 0x18001cf94 0xb
Digital Signatures (2)
»
Signature Properties
InternalName aceexch
FileVersion 15.0.4543.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4543.1000
FileDescription Microsoft Access database engine Exchange ISAM
OriginalFilename aceexch.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-09-04 21:12
Valid to 2013-12-04 21:12
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\aceexch.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceexch.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceexch.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 242.40 KB
Hash Values MD5: 468a7549fd149f275b10d752e0c82e70
SHA1: c0979060ffa7bdd5a3114c3324fd97328b2525b5
SHA256: 0822a586a050383037406804cd4f12acef429c04ac65526178d7e3ce7bab5557
Actions
c:\program files\common files\microsoft shared\office15\aceexcl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceexcl.dll (Modified File)
Size 520.22 KB
Hash Values MD5: cc5126933bdd80ee02e7bbb86900a533
SHA1: 97c119a75e7f20ab0a9f0092d53d42ebf710ca43
SHA256: 6537b1484198d6606ecaf833068cb910d661e20b73cb13fa728ccb80795efe0b
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001000
Size Of Code 0x55e00
Size Of Initialized Data 0x2d200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-11-20 12:46:24
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x55c68 0x55e00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.38
.rdata 0x180057000 0x18e24 0x19000 0x56200 CNT_INITIALIZED_DATA, MEM_READ 4.31
.data 0x180070000 0x9388 0x6600 0x6f200 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.5
.pdata 0x18007a000 0x4fc8 0x5000 0x75800 CNT_INITIALIZED_DATA, MEM_READ 5.67
.rsrc 0x18007f000 0x4b30 0x4c00 0x7a800 CNT_INITIALIZED_DATA, MEM_READ 6.49
.reloc 0x180084000 0x1094 0x1200 0x7f400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.3
Imports (180)
»
ole32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoCreateInstance 0x0 0x180057000 0x63730 0x62930
StringFromGUID2 0x0 0x180057008 0x63738 0x62938
StgOpenStorage 0x0 0x180057010 0x63740 0x62940
StgCreateDocfile 0x0 0x180057018 0x63748 0x62948
CoInitialize 0x0 0x180057020 0x63750 0x62950
CoTaskMemFree 0x0 0x180057028 0x63758 0x62958
CoTaskMemRealloc 0x0 0x180057030 0x63760 0x62960
CoTaskMemAlloc 0x0 0x180057038 0x63768 0x62968
CoUninitialize 0x0 0x180057040 0x63770 0x62970
OleUninitialize 0x0 0x180057048 0x63778 0x62978
OleInitialize 0x0 0x180057050 0x63780 0x62980
ADVAPI32.dll (13)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DeregisterEventSource 0x0 0x180057060 0x63790 0x62990
ReportEventW 0x0 0x180057068 0x63798 0x62998
RegisterEventSourceW 0x0 0x180057070 0x637a0 0x629a0
RegGetValueW 0x0 0x180057078 0x637a8 0x629a8
RegSetValueExW 0x0 0x180057080 0x637b0 0x629b0
RegQueryInfoKeyW 0x0 0x180057088 0x637b8 0x629b8
RegCloseKey 0x0 0x180057090 0x637c0 0x629c0
RegOpenKeyExW 0x0 0x180057098 0x637c8 0x629c8
RegQueryValueExW 0x0 0x1800570a0 0x637d0 0x629d0
RegCreateKeyExW 0x0 0x1800570a8 0x637d8 0x629d8
RegDeleteKeyW 0x0 0x1800570b0 0x637e0 0x629e0
RegDeleteValueW 0x0 0x1800570b8 0x637e8 0x629e8
RegEnumKeyExW 0x0 0x1800570c0 0x637f0 0x629f0
KERNEL32.dll (76)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
TerminateProcess 0x0 0x1800570d0 0x63800 0x62a00
GetCurrentProcess 0x0 0x1800570d8 0x63808 0x62a08
UnhandledExceptionFilter 0x0 0x1800570e0 0x63810 0x62a10
SetUnhandledExceptionFilter 0x0 0x1800570e8 0x63818 0x62a18
IsDebuggerPresent 0x0 0x1800570f0 0x63820 0x62a20
RtlVirtualUnwind 0x0 0x1800570f8 0x63828 0x62a28
RtlLookupFunctionEntry 0x0 0x180057100 0x63830 0x62a30
IsValidCodePage 0x0 0x180057108 0x63838 0x62a38
GetACP 0x0 0x180057110 0x63840 0x62a40
MultiByteToWideChar 0x0 0x180057118 0x63848 0x62a48
WideCharToMultiByte 0x0 0x180057120 0x63850 0x62a50
GetCPInfo 0x0 0x180057128 0x63858 0x62a58
GetLocaleInfoW 0x0 0x180057130 0x63860 0x62a60
GetUserDefaultLCID 0x0 0x180057138 0x63868 0x62a68
GetSystemTimeAsFileTime 0x0 0x180057140 0x63870 0x62a70
GetModuleHandleW 0x0 0x180057148 0x63878 0x62a78
GetProcAddress 0x0 0x180057150 0x63880 0x62a80
lstrlenW 0x0 0x180057158 0x63888 0x62a88
WriteFile 0x0 0x180057160 0x63890 0x62a90
CloseHandle 0x0 0x180057168 0x63898 0x62a98
RaiseException 0x0 0x180057170 0x638a0 0x62aa0
GetLastError 0x0 0x180057178 0x638a8 0x62aa8
EnterCriticalSection 0x0 0x180057180 0x638b0 0x62ab0
LeaveCriticalSection 0x0 0x180057188 0x638b8 0x62ab8
InitializeCriticalSectionAndSpinCount 0x0 0x180057190 0x638c0 0x62ac0
DeleteCriticalSection 0x0 0x180057198 0x638c8 0x62ac8
FreeLibrary 0x0 0x1800571a0 0x638d0 0x62ad0
GetModuleFileNameW 0x0 0x1800571a8 0x638d8 0x62ad8
LoadLibraryExW 0x0 0x1800571b0 0x638e0 0x62ae0
LoadResource 0x0 0x1800571b8 0x638e8 0x62ae8
LockResource 0x0 0x1800571c0 0x638f0 0x62af0
SizeofResource 0x0 0x1800571c8 0x638f8 0x62af8
GlobalSize 0x0 0x1800571d0 0x63900 0x62b00
GlobalLock 0x0 0x1800571d8 0x63908 0x62b08
GlobalUnlock 0x0 0x1800571e0 0x63910 0x62b10
lstrcmpiW 0x0 0x1800571e8 0x63918 0x62b18
FindResourceW 0x0 0x1800571f0 0x63920 0x62b20
RtlCaptureContext 0x0 0x1800571f8 0x63928 0x62b28
GlobalAlloc 0x0 0x180057200 0x63930 0x62b30
GlobalFree 0x0 0x180057208 0x63938 0x62b38
FileTimeToLocalFileTime 0x0 0x180057210 0x63940 0x62b40
FindClose 0x0 0x180057218 0x63948 0x62b48
ReadFile 0x0 0x180057220 0x63950 0x62b50
SetFilePointer 0x0 0x180057228 0x63958 0x62b58
FileTimeToDosDateTime 0x0 0x180057230 0x63960 0x62b60
GetCurrentProcessId 0x0 0x180057238 0x63968 0x62b68
DisableThreadLibraryCalls 0x0 0x180057240 0x63970 0x62b70
GetLocaleInfoA 0x0 0x180057248 0x63978 0x62b78
GetDateFormatW 0x0 0x180057250 0x63980 0x62b80
GetTimeFormatW 0x0 0x180057258 0x63988 0x62b88
ExpandEnvironmentStringsW 0x0 0x180057260 0x63990 0x62b90
SetCurrentDirectoryW 0x0 0x180057268 0x63998 0x62b98
GetCurrentDirectoryW 0x0 0x180057270 0x639a0 0x62ba0
CreateDirectoryW 0x0 0x180057278 0x639a8 0x62ba8
DeleteFileW 0x0 0x180057280 0x639b0 0x62bb0
FindFirstFileW 0x0 0x180057288 0x639b8 0x62bb8
FindNextFileW 0x0 0x180057290 0x639c0 0x62bc0
GetFileAttributesW 0x0 0x180057298 0x639c8 0x62bc8
GetFullPathNameW 0x0 0x1800572a0 0x639d0 0x62bd0
RemoveDirectoryW 0x0 0x1800572a8 0x639d8 0x62bd8
GetTempPathW 0x0 0x1800572b0 0x639e0 0x62be0
HeapAlloc 0x0 0x1800572b8 0x639e8 0x62be8
WerRegisterMemoryBlock 0x0 0x1800572c0 0x639f0 0x62bf0
VirtualProtect 0x0 0x1800572c8 0x639f8 0x62bf8
HeapFree 0x0 0x1800572d0 0x63a00 0x62c00
GetTickCount 0x0 0x1800572d8 0x63a08 0x62c08
GetCurrentThreadId 0x0 0x1800572e0 0x63a10 0x62c10
HeapSetInformation 0x0 0x1800572e8 0x63a18 0x62c18
GetProcessHeap 0x0 0x1800572f0 0x63a20 0x62c20
QueryPerformanceCounter 0x0 0x1800572f8 0x63a28 0x62c28
LocalAlloc 0x0 0x180057300 0x63a30 0x62c30
lstrlenA 0x0 0x180057308 0x63a38 0x62c38
LoadLibraryA 0x0 0x180057310 0x63a40 0x62c40
EncodePointer 0x0 0x180057318 0x63a48 0x62c48
DecodePointer 0x0 0x180057320 0x63a50 0x62c50
Sleep 0x0 0x180057328 0x63a58 0x62c58
OLEAUT32.dll (27)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VarUdateFromDate 0x14b 0x180057338 0x63a68 0x62c68
VarI2FromStr 0x36 0x180057340 0x63a70 0x62c70
VarDecFromR8 0xc2 0x180057348 0x63a78 0x62c78
VarBstrFromR8 0x70 0x180057350 0x63a80 0x62c80
VarR8FromDec 0xdc 0x180057358 0x63a88 0x62c88
VarR8FromStr 0x54 0x180057360 0x63a90 0x62c90
GetActiveObject 0x23 0x180057368 0x63a98 0x62c98
VariantChangeType 0xc 0x180057370 0x63aa0 0x62ca0
VarBstrCat 0x139 0x180057378 0x63aa8 0x62ca8
VarBstrCmp 0x13a 0x180057380 0x63ab0 0x62cb0
VariantCopy 0xa 0x180057388 0x63ab8 0x62cb8
VarUI4FromStr 0x115 0x180057390 0x63ac0 0x62cc0
VariantChangeTypeEx 0x93 0x180057398 0x63ac8 0x62cc8
SysAllocStringByteLen 0x96 0x1800573a0 0x63ad0 0x62cd0
SysStringByteLen 0x95 0x1800573a8 0x63ad8 0x62cd8
SysStringLen 0x7 0x1800573b0 0x63ae0 0x62ce0
SysAllocStringLen 0x4 0x1800573b8 0x63ae8 0x62ce8
VarCyFromR8 0x66 0x1800573c0 0x63af0 0x62cf0
VarR8FromCy 0x52 0x1800573c8 0x63af8 0x62cf8
VariantClear 0x9 0x1800573d0 0x63b00 0x62d00
VariantInit 0x8 0x1800573d8 0x63b08 0x62d08
SafeArrayPutElement 0x1a 0x1800573e0 0x63b10 0x62d10
SafeArrayGetElement 0x19 0x1800573e8 0x63b18 0x62d18
SafeArrayCreate 0xf 0x1800573f0 0x63b20 0x62d20
SysFreeString 0x6 0x1800573f8 0x63b28 0x62d28
SysAllocString 0x2 0x180057400 0x63b30 0x62d30
SafeArrayDestroy 0x10 0x180057408 0x63b38 0x62d38
MSVCR100.dll (51)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x180057418 0x63b48 0x62d48
__clean_type_info_names_internal 0x0 0x180057420 0x63b50 0x62d50
_onexit 0x0 0x180057428 0x63b58 0x62d58
_lock 0x0 0x180057430 0x63b60 0x62d60
__dllonexit 0x0 0x180057438 0x63b68 0x62d68
_unlock 0x0 0x180057440 0x63b70 0x62d70
__crt_debugger_hook 0x0 0x180057448 0x63b78 0x62d78
__CppXcptFilter 0x0 0x180057450 0x63b80 0x62d80
_amsg_exit 0x0 0x180057458 0x63b88 0x62d88
_encoded_null 0x0 0x180057460 0x63b90 0x62d90
_initterm_e 0x0 0x180057468 0x63b98 0x62d98
free 0x0 0x180057470 0x63ba0 0x62da0
malloc 0x0 0x180057478 0x63ba8 0x62da8
_wtoi 0x0 0x180057480 0x63bb0 0x62db0
wcsncpy_s 0x0 0x180057488 0x63bb8 0x62db8
wcstoul 0x0 0x180057490 0x63bc0 0x62dc0
memmove 0x0 0x180057498 0x63bc8 0x62dc8
tolower 0x0 0x1800574a0 0x63bd0 0x62dd0
memcpy 0x0 0x1800574a8 0x63bd8 0x62dd8
memset 0x0 0x1800574b0 0x63be0 0x62de0
memcmp 0x0 0x1800574b8 0x63be8 0x62de8
wcschr 0x0 0x1800574c0 0x63bf0 0x62df0
toupper 0x0 0x1800574c8 0x63bf8 0x62df8
wcsrchr 0x0 0x1800574d0 0x63c00 0x62e00
_CxxThrowException 0x0 0x1800574d8 0x63c08 0x62e08
__CxxFrameHandler3 0x0 0x1800574e0 0x63c10 0x62e10
_wsplitpath_s 0x0 0x1800574e8 0x63c18 0x62e18
memcpy_s 0x0 0x1800574f0 0x63c20 0x62e20
wcsstr 0x0 0x1800574f8 0x63c28 0x62e28
_recalloc 0x0 0x180057500 0x63c30 0x62e30
?terminate@@YAXXZ 0x0 0x180057508 0x63c38 0x62e38
_vsnwprintf_s 0x0 0x180057510 0x63c40 0x62e40
__RTDynamicCast 0x0 0x180057518 0x63c48 0x62e48
iswctype 0x0 0x180057520 0x63c50 0x62e50
towlower 0x0 0x180057528 0x63c58 0x62e58
_snwprintf_s 0x0 0x180057530 0x63c60 0x62e60
wcspbrk 0x0 0x180057538 0x63c68 0x62e68
_wcsnicmp 0x0 0x180057540 0x63c70 0x62e70
wcstok_s 0x0 0x180057548 0x63c78 0x62e78
_initterm 0x0 0x180057550 0x63c80 0x62e80
atoi 0x0 0x180057558 0x63c88 0x62e88
_ecvt_s 0x0 0x180057560 0x63c90 0x62e90
floor 0x0 0x180057568 0x63c98 0x62e98
_wcslwr_s 0x0 0x180057570 0x63ca0 0x62ea0
_wfullpath 0x0 0x180057578 0x63ca8 0x62ea8
__C_specific_handler 0x0 0x180057580 0x63cb0 0x62eb0
_stricmp 0x0 0x180057588 0x63cb8 0x62eb8
wcsncat_s 0x0 0x180057590 0x63cc0 0x62ec0
vswprintf_s 0x0 0x180057598 0x63cc8 0x62ec8
_malloc_crt 0x0 0x1800575a0 0x63cd0 0x62ed0
_invalid_parameter_noinfo_noreturn 0x0 0x1800575a8 0x63cd8 0x62ed8
MSVCP100.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Xout_of_range@std@@YAXPEBD@Z 0x0 0x1800575b8 0x63ce8 0x62ee8
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x1800575c0 0x63cf0 0x62ef0
Exports (2)
»
Api name EAT Address Ordinal
DllGetClassObject 0x180045ab4 0x2
None 0x180001654 0x1
Digital Signatures (2)
»
Signature Properties
InternalName aceexcl
FileVersion 15.0.4569.1501
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4569.1501
FileDescription Microsoft Access database engine Excel ISAM
OriginalFilename aceexcl.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 33 E5 27 86 A3 0E 4A 2A 80 00 00 00 00 00 33
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\aceexcl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceexcl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceexcl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 520.39 KB
Hash Values MD5: 4c7c5981f3c2a5957b45b1776220b4b1
SHA1: 0c2981582c44e8505b9ab0e5a3a5d6d64b466652
SHA256: 03bcc12d0d6ac68d9a5eb22cfdd89024a5db19104487c68191fcab14dcca395f
Actions
c:\program files\common files\microsoft shared\office15\aceodbc.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodbc.dll (Modified File)
Size 329.74 KB
Hash Values MD5: 75e285a458724f1326823c9f7800d000
SHA1: 4df06f0fd7535504d93fb6f6f13aff11cac7daa4
SHA256: b98af348bef74e7cc24368d048e07b5d2b9b5dc210f484f863b728975ee60db7
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180035ca4
Size Of Code 0x37c00
Size Of Initialized Data 0x19600
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-08-08 07:25:59
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x37b28 0x37c00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.36
.rdata 0x180039000 0x7f8c 0x8000 0x38000 CNT_INITIALIZED_DATA, MEM_READ 4.64
.data 0x180041000 0x6e58 0x6600 0x40000 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 2.73
.pdata 0x180048000 0x19bc 0x1a00 0x46600 CNT_INITIALIZED_DATA, MEM_READ 5.46
.rsrc 0x18004a000 0x8520 0x8600 0x48000 CNT_INITIALIZED_DATA, MEM_READ 3.09
.reloc 0x180053000 0x5ec 0x600 0x50600 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.72
Imports (146)
»
MSVCR100.dll (65)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180039000 0x3dfb8 0x3cfb8
_lock 0x0 0x180039008 0x3dfc0 0x3cfc0
__dllonexit 0x0 0x180039010 0x3dfc8 0x3cfc8
_unlock 0x0 0x180039018 0x3dfd0 0x3cfd0
__clean_type_info_names_internal 0x0 0x180039020 0x3dfd8 0x3cfd8
__crt_debugger_hook 0x0 0x180039028 0x3dfe0 0x3cfe0
__CppXcptFilter 0x0 0x180039030 0x3dfe8 0x3cfe8
_amsg_exit 0x0 0x180039038 0x3dff0 0x3cff0
_encoded_null 0x0 0x180039040 0x3dff8 0x3cff8
_initterm_e 0x0 0x180039048 0x3e000 0x3d000
_initterm 0x0 0x180039050 0x3e008 0x3d008
_malloc_crt 0x0 0x180039058 0x3e010 0x3d010
towlower 0x0 0x180039060 0x3e018 0x3d018
_time64 0x0 0x180039068 0x3e020 0x3d020
_localtime64_s 0x0 0x180039070 0x3e028 0x3d028
_snprintf_s 0x0 0x180039078 0x3e030 0x3d030
_ecvt_s 0x0 0x180039080 0x3e038 0x3d038
strtod 0x0 0x180039088 0x3e040 0x3d040
_errno 0x0 0x180039090 0x3e048 0x3d048
strncpy_s 0x0 0x180039098 0x3e050 0x3d050
strchr 0x0 0x1800390a0 0x3e058 0x3d058
isspace 0x0 0x1800390a8 0x3e060 0x3d060
isxdigit 0x0 0x1800390b0 0x3e068 0x3d068
isdigit 0x0 0x1800390b8 0x3e070 0x3d070
wcscspn 0x0 0x1800390c0 0x3e078 0x3d078
wcsrchr 0x0 0x1800390c8 0x3e080 0x3d080
wcstok_s 0x0 0x1800390d0 0x3e088 0x3d088
wcsstr 0x0 0x1800390d8 0x3e090 0x3d090
wcschr 0x0 0x1800390e0 0x3e098 0x3d098
wcstol 0x0 0x1800390e8 0x3e0a0 0x3d0a0
_wchdir 0x0 0x1800390f0 0x3e0a8 0x3d0a8
_wgetcwd 0x0 0x1800390f8 0x3e0b0 0x3d0b0
iswctype 0x0 0x180039100 0x3e0b8 0x3d0b8
_wcsnicmp 0x0 0x180039108 0x3e0c0 0x3d0c0
floor 0x0 0x180039110 0x3e0c8 0x3d0c8
modf 0x0 0x180039118 0x3e0d0 0x3d0d0
memmove 0x0 0x180039120 0x3e0d8 0x3d0d8
_wsplitpath_s 0x0 0x180039128 0x3e0e0 0x3d0e0
memcpy 0x0 0x180039130 0x3e0e8 0x3d0e8
__C_specific_handler 0x0 0x180039138 0x3e0f0 0x3d0f0
bsearch 0x0 0x180039140 0x3e0f8 0x3d0f8
_strnicmp 0x0 0x180039148 0x3e100 0x3d100
_wtol 0x0 0x180039150 0x3e108 0x3d108
towupper 0x0 0x180039158 0x3e110 0x3d110
wcsncmp 0x0 0x180039160 0x3e118 0x3d118
wcspbrk 0x0 0x180039168 0x3e120 0x3d120
swprintf_s 0x0 0x180039170 0x3e128 0x3d128
memset 0x0 0x180039178 0x3e130 0x3d130
_heapmin 0x0 0x180039180 0x3e138 0x3d138
malloc 0x0 0x180039188 0x3e140 0x3d140
free 0x0 0x180039190 0x3e148 0x3d148
_wcsicmp 0x0 0x180039198 0x3e150 0x3d150
wcsncpy_s 0x0 0x1800391a0 0x3e158 0x3d158
_wtoi 0x0 0x1800391a8 0x3e160 0x3d160
swscanf_s 0x0 0x1800391b0 0x3e168 0x3d168
_vsnwprintf_s 0x0 0x1800391b8 0x3e170 0x3d170
calloc 0x0 0x1800391c0 0x3e178 0x3d178
_wfullpath 0x0 0x1800391c8 0x3e180 0x3d180
_wstat64i32 0x0 0x1800391d0 0x3e188 0x3d188
_stricmp 0x0 0x1800391d8 0x3e190 0x3d190
wcsncat_s 0x0 0x1800391e0 0x3e198 0x3d198
?terminate@@YAXXZ 0x0 0x1800391e8 0x3e1a0 0x3d1a0
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1800391f0 0x3e1a8 0x3d1a8
_vswprintf_c_l 0x0 0x1800391f8 0x3e1b0 0x3d1b0
_snwprintf_s 0x0 0x180039200 0x3e1b8 0x3d1b8
GDI32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetTextExtentPointW 0x0 0x180039210 0x3e1c8 0x3d1c8
KERNEL32.dll (66)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LocalAlloc 0x0 0x180039220 0x3e1d8 0x3d1d8
RaiseException 0x0 0x180039228 0x3e1e0 0x3d1e0
CreateFileW 0x0 0x180039230 0x3e1e8 0x3d1e8
WritePrivateProfileStringW 0x0 0x180039238 0x3e1f0 0x3d1f0
GetPrivateProfileStringW 0x0 0x180039240 0x3e1f8 0x3d1f8
GetLastError 0x0 0x180039248 0x3e200 0x3d200
OutputDebugStringW 0x0 0x180039250 0x3e208 0x3d208
ExpandEnvironmentStringsA 0x0 0x180039258 0x3e210 0x3d210
LoadLibraryExA 0x0 0x180039260 0x3e218 0x3d218
LoadLibraryExW 0x0 0x180039268 0x3e220 0x3d220
GetSystemDirectoryW 0x0 0x180039270 0x3e228 0x3d228
GetModuleFileNameW 0x0 0x180039278 0x3e230 0x3d230
RtlCaptureContext 0x0 0x180039280 0x3e238 0x3d238
RtlLookupFunctionEntry 0x0 0x180039288 0x3e240 0x3d240
RtlVirtualUnwind 0x0 0x180039290 0x3e248 0x3d248
IsDebuggerPresent 0x0 0x180039298 0x3e250 0x3d250
GetModuleHandleW 0x0 0x1800392a0 0x3e258 0x3d258
GetTimeFormatA 0x0 0x1800392a8 0x3e260 0x3d260
GetCurrentProcessId 0x0 0x1800392b0 0x3e268 0x3d268
GetProcessVersion 0x0 0x1800392b8 0x3e270 0x3d270
GetCurrentThreadId 0x0 0x1800392c0 0x3e278 0x3d278
MultiByteToWideChar 0x0 0x1800392c8 0x3e280 0x3d280
WideCharToMultiByte 0x0 0x1800392d0 0x3e288 0x3d288
GetCPInfo 0x0 0x1800392d8 0x3e290 0x3d290
InitializeCriticalSection 0x0 0x1800392e0 0x3e298 0x3d298
DeleteCriticalSection 0x0 0x1800392e8 0x3e2a0 0x3d2a0
FreeLibrary 0x0 0x1800392f0 0x3e2a8 0x3d2a8
GetProcAddress 0x0 0x1800392f8 0x3e2b0 0x3d2b0
EnterCriticalSection 0x0 0x180039300 0x3e2b8 0x3d2b8
LeaveCriticalSection 0x0 0x180039308 0x3e2c0 0x3d2c0
GetModuleFileNameA 0x0 0x180039310 0x3e2c8 0x3d2c8
GetSystemDefaultLCID 0x0 0x180039318 0x3e2d0 0x3d2d0
GetUserDefaultLCID 0x0 0x180039320 0x3e2d8 0x3d2d8
FindClose 0x0 0x180039328 0x3e2e0 0x3d2e0
FindFirstFileW 0x0 0x180039330 0x3e2e8 0x3d2e8
FindNextFileW 0x0 0x180039338 0x3e2f0 0x3d2f0
GetCurrentDirectoryW 0x0 0x180039340 0x3e2f8 0x3d2f8
DeleteFileW 0x0 0x180039348 0x3e300 0x3d300
GetDriveTypeW 0x0 0x180039350 0x3e308 0x3d308
GetTempFileNameW 0x0 0x180039358 0x3e310 0x3d310
GetTempPathW 0x0 0x180039360 0x3e318 0x3d318
CloseHandle 0x0 0x180039368 0x3e320 0x3d320
SetErrorMode 0x0 0x180039370 0x3e328 0x3d328
GetWindowsDirectoryW 0x0 0x180039378 0x3e330 0x3d330
MoveFileW 0x0 0x180039380 0x3e338 0x3d338
GetDateFormatA 0x0 0x180039388 0x3e340 0x3d340
LoadLibraryA 0x0 0x180039390 0x3e348 0x3d348
GetNumberFormatA 0x0 0x180039398 0x3e350 0x3d350
GetCurrencyFormatA 0x0 0x1800393a0 0x3e358 0x3d358
LoadResource 0x0 0x1800393a8 0x3e360 0x3d360
LockResource 0x0 0x1800393b0 0x3e368 0x3d368
FindResourceA 0x0 0x1800393b8 0x3e370 0x3d370
QueryPerformanceCounter 0x0 0x1800393c0 0x3e378 0x3d378
GetProcessHeap 0x0 0x1800393c8 0x3e380 0x3d380
HeapSetInformation 0x0 0x1800393d0 0x3e388 0x3d388
GetSystemTimeAsFileTime 0x0 0x1800393d8 0x3e390 0x3d390
GetTickCount 0x0 0x1800393e0 0x3e398 0x3d398
VirtualProtect 0x0 0x1800393e8 0x3e3a0 0x3d3a0
WerRegisterMemoryBlock 0x0 0x1800393f0 0x3e3a8 0x3d3a8
EncodePointer 0x0 0x1800393f8 0x3e3b0 0x3d3b0
DecodePointer 0x0 0x180039400 0x3e3b8 0x3d3b8
Sleep 0x0 0x180039408 0x3e3c0 0x3d3c0
TerminateProcess 0x0 0x180039410 0x3e3c8 0x3d3c8
GetCurrentProcess 0x0 0x180039418 0x3e3d0 0x3d3d0
UnhandledExceptionFilter 0x0 0x180039420 0x3e3d8 0x3d3d8
SetUnhandledExceptionFilter 0x0 0x180039428 0x3e3e0 0x3d3e0
ADVAPI32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegSetValueExW 0x0 0x180039438 0x3e3f0 0x3d3f0
RegQueryValueExA 0x0 0x180039440 0x3e3f8 0x3d3f8
RegOpenKeyExA 0x0 0x180039448 0x3e400 0x3d400
RegOpenKeyExW 0x0 0x180039450 0x3e408 0x3d408
GetUserNameW 0x0 0x180039458 0x3e410 0x3d410
RegCreateKeyExW 0x0 0x180039460 0x3e418 0x3d418
RegDeleteKeyW 0x0 0x180039468 0x3e420 0x3d420
RegGetValueW 0x0 0x180039470 0x3e428 0x3d428
RegCloseKey 0x0 0x180039478 0x3e430 0x3d430
RegQueryValueExW 0x0 0x180039480 0x3e438 0x3d438
RegEnumKeyExW 0x0 0x180039488 0x3e440 0x3d440
COMDLG32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetSaveFileNameW 0x0 0x180039498 0x3e450 0x3d450
GetOpenFileNameW 0x0 0x1800394a0 0x3e458 0x3d458
ole32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromGUID2 0x0 0x1800394b0 0x3e468 0x3d468
Exports (76)
»
Api name EAT Address Ordinal
AdvancedDialogProc 0x180010d44 0x1f7
AssertSzFail 0x18002e188 0x209
ConfigDSN 0x180008730 0x20b
ConfigDSNExW 0x180007b64 0x202
ConfigDSNW 0x180008834 0x204
ConfigDialogProc 0x180012494 0x201
ConfigDriverW 0x18000886c 0x20a
DefTxtFmtDlgProc 0x180030078 0x208
DllMain 0x18000973c 0x1f5
InitDialogAgain 0x180016e6c 0x1fd
InitializeLoginDialog 0x180016f90 0x1ff
InvisibleSelectDb 0x180010874 0x1fc
LoadByOrdinal 0x18002e188 0xc7
LoginDialogProc 0x1800106bc 0x1fe
OpenDirHook 0x180017f10 0x1f8
RepairCompactProc 0x180020fe8 0x1f6
SQLAllocConnect 0x180003220 0x1
SQLAllocEnv 0x180002d78 0x2
SQLAllocHandle 0x18000cf10 0x18
SQLAllocStmt 0x18001c180 0x3
SQLBindCol 0x1800219e8 0x4
SQLBindParameter 0x1800239f0 0x48
SQLBulkOperations 0x18002e668 0x4e
SQLCancel 0x18001c194 0x5
SQLCloseCursor 0x18000ffb0 0x1a
SQLColAttributeW 0x180009f60 0x7f
SQLColumnsW 0x180019e3c 0x8c
SQLConnectW 0x1800033e8 0x6b
SQLCopyDesc 0x180009e18 0x1c
SQLDescribeColW 0x180009fa0 0x6c
SQLDisconnect 0x18000330c 0x9
SQLDriverConnectW 0x180003790 0x8d
SQLEndTran 0x18001c1a8 0x1d
SQLExecDirectW 0x18001c36c 0x6f
SQLExecute 0x18001c1dc 0xc
SQLExtendedFetch 0x180022038 0x3b
SQLFetch 0x180021ed4 0xd
SQLFetchScroll 0x180021f98 0x1e
SQLFreeConnect 0x180003320 0xe
SQLFreeEnv 0x180002f54 0xf
SQLFreeHandle 0x18000cf7c 0x1f
SQLFreeStmt 0x18001c1f0 0x10
SQLGetConnectAttrW 0x180003418 0x84
SQLGetCursorNameW 0x180010020 0x75
SQLGetData 0x180021604 0x2b
SQLGetDescFieldW 0x18000a010 0x85
SQLGetDescRecW 0x18000a038 0x86
SQLGetDiagFieldW 0x180005f18 0x87
SQLGetDiagRecW 0x1800062b0 0x88
SQLGetFunctions 0x18000d1a8 0x2c
SQLGetInfoW 0x18000d3b8 0x91
SQLGetStmtAttrW 0x18001c394 0x8a
SQLGetTypeInfoW 0x18000db30 0x93
SQLMoreResults 0x18001c204 0x3d
SQLNativeSqlW 0x18000db44 0xa2
SQLNumParams 0x180023958 0x3f
SQLNumResultCols 0x180009e2c 0x12
SQLParamData 0x180023930 0x30
SQLPrepareW 0x18001c380 0x77
SQLProcedureColumnsW 0x18003483c 0xa6
SQLProceduresW 0x18003487c 0xa7
SQLPutData 0x180023944 0x31
SQLRowCount 0x180009e74 0x14
SQLSetConnectAttrW 0x1800036b4 0x8b
SQLSetCursorNameW 0x1800101b4 0x79
SQLSetDescFieldW 0x180009ff0 0xad
SQLSetDescRec 0x180009f18 0x4a
SQLSetEnvAttr 0x180002fe0 0x4b
SQLSetPos 0x18002e6b8 0x44
SQLSetScrollOptions 0x18001c218 0x45
SQLSetStmtAttrW 0x18001c3b4 0xb0
SQLSpecialColumnsW 0x180025964 0x98
SQLStatisticsW 0x1800259b0 0x99
SQLTablesW 0x180019e7c 0x9a
SelectIndexDlgProc 0x1800117a0 0x205
SelectUIdxDlgProc 0x180011184 0x200
Digital Signatures (2)
»
Signature Properties
InternalName aceodbc
FileVersion 15.0.4543.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4543.1000
FileDescription Microsoft Access database engine ODBC International DLL
OriginalFilename aceodbc.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 34 24 31 40 C9 A0 C1 79 8D 00 00 00 00 00 34
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\aceodbc.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodbc.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceodbc.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 329.92 KB
Hash Values MD5: ff346c9665b7e9e82af69a53d8b1429c
SHA1: 8055bb69845508584254f90300b0813978a54823
SHA256: 416917c48d2e02048bde833bd94534d068f07ca2140cfd418593894594efa40c
Actions
c:\program files\common files\microsoft shared\office15\aceodexl.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodexl.dll (Modified File)
Size 16.15 KB
Hash Values MD5: ba2cbabb58efb619b742d3594df82fe2
SHA1: 42f2e1488f9baf09bb89a781384981cb31a98d5a
SHA256: 02db11ff0f418de37dc7dea84c7df132b98dded31f404570fd3e3d57ec6526da
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18000162c
Size Of Code 0xe00
Size Of Initialized Data 0x1800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-11-07 13:23:17
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xca0 0xe00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.63
.rdata 0x180002000 0x79c 0x800 0x1200 CNT_INITIALIZED_DATA, MEM_READ 4.29
.data 0x180003000 0x5b8 0x200 0x1a00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.23
.pdata 0x180004000 0x108 0x200 0x1c00 CNT_INITIALIZED_DATA, MEM_READ 2.15
.rsrc 0x180005000 0x4b8 0x600 0x1e00 CNT_INITIALIZED_DATA, MEM_READ 2.77
.reloc 0x180006000 0x10 0x200 0x2400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.15
Imports (37)
»
MSVCR100.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180002000 0x2278 0x1478
_lock 0x0 0x180002008 0x2280 0x1480
__dllonexit 0x0 0x180002010 0x2288 0x1488
_unlock 0x0 0x180002018 0x2290 0x1490
__clean_type_info_names_internal 0x0 0x180002020 0x2298 0x1498
__crt_debugger_hook 0x0 0x180002028 0x22a0 0x14a0
__CppXcptFilter 0x0 0x180002030 0x22a8 0x14a8
_amsg_exit 0x0 0x180002038 0x22b0 0x14b0
_encoded_null 0x0 0x180002040 0x22b8 0x14b8
free 0x0 0x180002048 0x22c0 0x14c0
_initterm_e 0x0 0x180002050 0x22c8 0x14c8
_initterm 0x0 0x180002058 0x22d0 0x14d0
_malloc_crt 0x0 0x180002060 0x22d8 0x14d8
__C_specific_handler 0x0 0x180002068 0x22e0 0x14e0
KERNEL32.dll (22)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetCurrentThreadId 0x0 0x180002078 0x22f0 0x14f0
DisableThreadLibraryCalls 0x0 0x180002080 0x22f8 0x14f8
RtlCaptureContext 0x0 0x180002088 0x2300 0x1500
RtlLookupFunctionEntry 0x0 0x180002090 0x2308 0x1508
RtlVirtualUnwind 0x0 0x180002098 0x2310 0x1510
IsDebuggerPresent 0x0 0x1800020a0 0x2318 0x1518
SetUnhandledExceptionFilter 0x0 0x1800020a8 0x2320 0x1520
UnhandledExceptionFilter 0x0 0x1800020b0 0x2328 0x1528
GetCurrentProcess 0x0 0x1800020b8 0x2330 0x1530
TerminateProcess 0x0 0x1800020c0 0x2338 0x1538
Sleep 0x0 0x1800020c8 0x2340 0x1540
DecodePointer 0x0 0x1800020d0 0x2348 0x1548
EncodePointer 0x0 0x1800020d8 0x2350 0x1550
WerRegisterMemoryBlock 0x0 0x1800020e0 0x2358 0x1558
VirtualProtect 0x0 0x1800020e8 0x2360 0x1560
MultiByteToWideChar 0x0 0x1800020f0 0x2368 0x1568
QueryPerformanceCounter 0x0 0x1800020f8 0x2370 0x1570
GetProcessHeap 0x0 0x180002100 0x2378 0x1578
HeapSetInformation 0x0 0x180002108 0x2380 0x1580
GetCurrentProcessId 0x0 0x180002110 0x2388 0x1588
GetTickCount 0x0 0x180002118 0x2390 0x1590
GetSystemTimeAsFileTime 0x0 0x180002120 0x2398 0x1598
aceodbc.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x202 0x180002130 0x23a8 0x15a8
Exports (1)
»
Api name EAT Address Ordinal
ConfigDSNW 0x1800010e8 0x1
Digital Signatures (2)
»
Signature Properties
InternalName aceodbc
FileVersion 15.0.4454.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4454.1000
FileDescription Microsoft Access database engine Excel IISAM ODBC setup DLL
OriginalFilename aceodbc.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-09-04 21:42
Valid to 2013-03-04 21:42
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 9D 1E 8D 27 AE B8 F3 D8 38 00 01 00 00 00 9D
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 92 4A 00 00 00 00 00 20
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\aceodexl.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodexl.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceodexl.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 16.32 KB
Hash Values MD5: 1f484a44f88da05c7dcce378c509d184
SHA1: 51c76770f274a3e56c4d2901a064d30f3baa6246
SHA256: 17b9a7f50e3df33ea45ffb85e05cc6fc5dff1f69eaf9d7cf963b58c4def23d5e
Actions
c:\program files\common files\microsoft shared\office15\aceodtxt.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodtxt.dll (Modified File)
Size 16.15 KB
Hash Values MD5: 7c322691c216b019273505f78800511a
SHA1: f961a8c90f5c83329460ce5fb10f3d2c213dec4c
SHA256: 26761549cb1e0a3947509ada9781578fabbc61bf83e5486f3ef333acb24ffb01
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18000162c
Size Of Code 0xe00
Size Of Initialized Data 0x1800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-11-07 13:11:16
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0xca0 0xe00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 5.63
.rdata 0x180002000 0x79c 0x800 0x1200 CNT_INITIALIZED_DATA, MEM_READ 4.29
.data 0x180003000 0x5b8 0x200 0x1a00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.23
.pdata 0x180004000 0x108 0x200 0x1c00 CNT_INITIALIZED_DATA, MEM_READ 2.15
.rsrc 0x180005000 0x4b8 0x600 0x1e00 CNT_INITIALIZED_DATA, MEM_READ 2.76
.reloc 0x180006000 0x10 0x200 0x2400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.15
Imports (37)
»
MSVCR100.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180002000 0x2278 0x1478
_lock 0x0 0x180002008 0x2280 0x1480
__dllonexit 0x0 0x180002010 0x2288 0x1488
_unlock 0x0 0x180002018 0x2290 0x1490
__clean_type_info_names_internal 0x0 0x180002020 0x2298 0x1498
__crt_debugger_hook 0x0 0x180002028 0x22a0 0x14a0
__CppXcptFilter 0x0 0x180002030 0x22a8 0x14a8
_amsg_exit 0x0 0x180002038 0x22b0 0x14b0
_encoded_null 0x0 0x180002040 0x22b8 0x14b8
free 0x0 0x180002048 0x22c0 0x14c0
_initterm_e 0x0 0x180002050 0x22c8 0x14c8
_initterm 0x0 0x180002058 0x22d0 0x14d0
_malloc_crt 0x0 0x180002060 0x22d8 0x14d8
__C_specific_handler 0x0 0x180002068 0x22e0 0x14e0
KERNEL32.dll (22)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetCurrentThreadId 0x0 0x180002078 0x22f0 0x14f0
DisableThreadLibraryCalls 0x0 0x180002080 0x22f8 0x14f8
RtlCaptureContext 0x0 0x180002088 0x2300 0x1500
RtlLookupFunctionEntry 0x0 0x180002090 0x2308 0x1508
RtlVirtualUnwind 0x0 0x180002098 0x2310 0x1510
IsDebuggerPresent 0x0 0x1800020a0 0x2318 0x1518
SetUnhandledExceptionFilter 0x0 0x1800020a8 0x2320 0x1520
UnhandledExceptionFilter 0x0 0x1800020b0 0x2328 0x1528
GetCurrentProcess 0x0 0x1800020b8 0x2330 0x1530
TerminateProcess 0x0 0x1800020c0 0x2338 0x1538
Sleep 0x0 0x1800020c8 0x2340 0x1540
DecodePointer 0x0 0x1800020d0 0x2348 0x1548
EncodePointer 0x0 0x1800020d8 0x2350 0x1550
WerRegisterMemoryBlock 0x0 0x1800020e0 0x2358 0x1558
VirtualProtect 0x0 0x1800020e8 0x2360 0x1560
MultiByteToWideChar 0x0 0x1800020f0 0x2368 0x1568
QueryPerformanceCounter 0x0 0x1800020f8 0x2370 0x1570
GetProcessHeap 0x0 0x180002100 0x2378 0x1578
HeapSetInformation 0x0 0x180002108 0x2380 0x1580
GetCurrentProcessId 0x0 0x180002110 0x2388 0x1588
GetTickCount 0x0 0x180002118 0x2390 0x1590
GetSystemTimeAsFileTime 0x0 0x180002120 0x2398 0x1598
aceodbc.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x202 0x180002130 0x23a8 0x15a8
Exports (1)
»
Api name EAT Address Ordinal
ConfigDSNW 0x1800010e8 0x1
Digital Signatures (2)
»
Signature Properties
InternalName aceodbc
FileVersion 15.0.4454.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4454.1000
FileDescription Microsoft Access database engine Text IISAM ODBC setup DLL
OriginalFilename aceodbc.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-09-04 21:42
Valid to 2013-03-04 21:42
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 9D 1E 8D 27 AE B8 F3 D8 38 00 01 00 00 00 9D
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\aceodtxt.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceodtxt.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceodtxt.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 16.32 KB
Hash Values MD5: 29a19ace4b25eee1bfd424e366d47dce
SHA1: 325fcdbe3b92055ab27d9f2f5930a48b44ea2035
SHA256: ef32bcac712cbccd06050f46febc2e1fe0a3b137979983651741c86837ea1499
Actions
c:\program files\common files\microsoft shared\office15\aceoledb.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceoledb.dll (Modified File)
Size 434.23 KB
Hash Values MD5: 4dd6290e2b84dfbe08094f2cd143d201
SHA1: dfffbb59d84cafd02c68b330faa2b1ec995502d6
SHA256: 40eddbb515314a7776d97f2e407f74cf40991b0535af2459e7aad11ab4dccd93
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18000faec
Size Of Code 0x48400
Size Of Initialized Data 0x22c00
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-10-09 11:51:53
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x482c4 0x48400 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.31
.rdata 0x18004a000 0x1a86c 0x1aa00 0x48800 CNT_INITIALIZED_DATA, MEM_READ 3.78
.data 0x180065000 0x3670 0x3200 0x63200 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.14
.pdata 0x180069000 0x3168 0x3200 0x66400 CNT_INITIALIZED_DATA, MEM_READ 5.6
.rsrc 0x18006d000 0x7c0 0x800 0x69600 CNT_INITIALIZED_DATA, MEM_READ 3.36
.reloc 0x18006e000 0xeb0 0x1000 0x69e00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.29
Imports (93)
»
ole32.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromGUID2 0x0 0x18004a000 0x5d1e8 0x5b9e8
CoCreateInstance 0x0 0x18004a008 0x5d1f0 0x5b9f0
CoCreateGuid 0x0 0x18004a010 0x5d1f8 0x5b9f8
CoGetMalloc 0x0 0x18004a018 0x5d200 0x5ba00
MSVCR100.dll (33)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18004a028 0x5d210 0x5ba10
__clean_type_info_names_internal 0x0 0x18004a030 0x5d218 0x5ba18
?terminate@@YAXXZ 0x0 0x18004a038 0x5d220 0x5ba20
__crt_debugger_hook 0x0 0x18004a040 0x5d228 0x5ba28
_onexit 0x0 0x18004a048 0x5d230 0x5ba30
_lock 0x0 0x18004a050 0x5d238 0x5ba38
__dllonexit 0x0 0x18004a058 0x5d240 0x5ba40
_unlock 0x0 0x18004a060 0x5d248 0x5ba48
__CppXcptFilter 0x0 0x18004a068 0x5d250 0x5ba50
_amsg_exit 0x0 0x18004a070 0x5d258 0x5ba58
_encoded_null 0x0 0x18004a078 0x5d260 0x5ba60
_initterm_e 0x0 0x18004a080 0x5d268 0x5ba68
_initterm 0x0 0x18004a088 0x5d270 0x5ba70
_malloc_crt 0x0 0x18004a090 0x5d278 0x5ba78
vswprintf_s 0x0 0x18004a098 0x5d280 0x5ba80
wcsrchr 0x0 0x18004a0a0 0x5d288 0x5ba88
wcsncat_s 0x0 0x18004a0a8 0x5d290 0x5ba90
__C_specific_handler 0x0 0x18004a0b0 0x5d298 0x5ba98
_stricmp 0x0 0x18004a0b8 0x5d2a0 0x5baa0
_snwprintf_s 0x0 0x18004a0c0 0x5d2a8 0x5baa8
rand 0x0 0x18004a0c8 0x5d2b0 0x5bab0
calloc 0x0 0x18004a0d0 0x5d2b8 0x5bab8
memcmp 0x0 0x18004a0d8 0x5d2c0 0x5bac0
_time64 0x0 0x18004a0e0 0x5d2c8 0x5bac8
srand 0x0 0x18004a0e8 0x5d2d0 0x5bad0
_wcsicmp 0x0 0x18004a0f0 0x5d2d8 0x5bad8
memset 0x0 0x18004a0f8 0x5d2e0 0x5bae0
realloc 0x0 0x18004a100 0x5d2e8 0x5bae8
malloc 0x0 0x18004a108 0x5d2f0 0x5baf0
free 0x0 0x18004a110 0x5d2f8 0x5baf8
memcpy 0x0 0x18004a118 0x5d300 0x5bb00
__CxxFrameHandler3 0x0 0x18004a120 0x5d308 0x5bb08
wcsncpy_s 0x0 0x18004a128 0x5d310 0x5bb10
KERNEL32.dll (38)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LocalAlloc 0x0 0x18004a138 0x5d320 0x5bb20
RtlCaptureContext 0x0 0x18004a140 0x5d328 0x5bb28
RtlLookupFunctionEntry 0x0 0x18004a148 0x5d330 0x5bb30
RtlVirtualUnwind 0x0 0x18004a150 0x5d338 0x5bb38
IsDebuggerPresent 0x0 0x18004a158 0x5d340 0x5bb40
SetUnhandledExceptionFilter 0x0 0x18004a160 0x5d348 0x5bb48
UnhandledExceptionFilter 0x0 0x18004a168 0x5d350 0x5bb50
GetCurrentProcess 0x0 0x18004a170 0x5d358 0x5bb58
TerminateProcess 0x0 0x18004a178 0x5d360 0x5bb60
Sleep 0x0 0x18004a180 0x5d368 0x5bb68
DecodePointer 0x0 0x18004a188 0x5d370 0x5bb70
EncodePointer 0x0 0x18004a190 0x5d378 0x5bb78
GetModuleFileNameW 0x0 0x18004a198 0x5d380 0x5bb80
HeapFree 0x0 0x18004a1a0 0x5d388 0x5bb88
HeapAlloc 0x0 0x18004a1a8 0x5d390 0x5bb90
WerRegisterMemoryBlock 0x0 0x18004a1b0 0x5d398 0x5bb98
VirtualProtect 0x0 0x18004a1b8 0x5d3a0 0x5bba0
GetTickCount 0x0 0x18004a1c0 0x5d3a8 0x5bba8
GetSystemTimeAsFileTime 0x0 0x18004a1c8 0x5d3b0 0x5bbb0
GetCurrentThreadId 0x0 0x18004a1d0 0x5d3b8 0x5bbb8
GetCurrentProcessId 0x0 0x18004a1d8 0x5d3c0 0x5bbc0
HeapSetInformation 0x0 0x18004a1e0 0x5d3c8 0x5bbc8
GetProcessHeap 0x0 0x18004a1e8 0x5d3d0 0x5bbd0
QueryPerformanceCounter 0x0 0x18004a1f0 0x5d3d8 0x5bbd8
LoadLibraryA 0x0 0x18004a1f8 0x5d3e0 0x5bbe0
EnterCriticalSection 0x0 0x18004a200 0x5d3e8 0x5bbe8
LeaveCriticalSection 0x0 0x18004a208 0x5d3f0 0x5bbf0
InitializeCriticalSection 0x0 0x18004a210 0x5d3f8 0x5bbf8
DeleteCriticalSection 0x0 0x18004a218 0x5d400 0x5bc00
GetLastError 0x0 0x18004a220 0x5d408 0x5bc08
MultiByteToWideChar 0x0 0x18004a228 0x5d410 0x5bc10
WideCharToMultiByte 0x0 0x18004a230 0x5d418 0x5bc18
GetCPInfo 0x0 0x18004a238 0x5d420 0x5bc20
FreeLibrary 0x0 0x18004a240 0x5d428 0x5bc28
GetProcAddress 0x0 0x18004a248 0x5d430 0x5bc30
RaiseException 0x0 0x18004a250 0x5d438 0x5bc38
GetModuleHandleW 0x0 0x18004a258 0x5d440 0x5bc40
LoadLibraryExW 0x0 0x18004a260 0x5d448 0x5bc48
ADVAPI32.dll (8)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegisterEventSourceW 0x0 0x18004a270 0x5d458 0x5bc58
RegOpenKeyExA 0x0 0x18004a278 0x5d460 0x5bc60
RegQueryValueExW 0x0 0x18004a280 0x5d468 0x5bc68
ReportEventW 0x0 0x18004a288 0x5d470 0x5bc70
RegCloseKey 0x0 0x18004a290 0x5d478 0x5bc78
DeregisterEventSource 0x0 0x18004a298 0x5d480 0x5bc80
RegGetValueW 0x0 0x18004a2a0 0x5d488 0x5bc88
RegOpenKeyExW 0x0 0x18004a2a8 0x5d490 0x5bc90
OLEAUT32.dll (10)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetErrorInfo 0xc8 0x18004a2b8 0x5d4a0 0x5bca0
SysAllocStringLen 0x4 0x18004a2c0 0x5d4a8 0x5bca8
VariantClear 0x9 0x18004a2c8 0x5d4b0 0x5bcb0
SetErrorInfo 0xc9 0x18004a2d0 0x5d4b8 0x5bcb8
SysAllocString 0x2 0x18004a2d8 0x5d4c0 0x5bcc0
SysFreeString 0x6 0x18004a2e0 0x5d4c8 0x5bcc8
VariantCopy 0xa 0x18004a2e8 0x5d4d0 0x5bcd0
VariantInit 0x8 0x18004a2f0 0x5d4d8 0x5bcd8
VarBstrFromDate 0x72 0x18004a2f8 0x5d4e0 0x5bce0
SysStringLen 0x7 0x18004a300 0x5d4e8 0x5bce8
Exports (3)
»
Api name EAT Address Ordinal
DllCanUnloadNow 0x18000667c 0x1
DllGetClassObject 0x18000300c 0x2
DllMain 0x18000fa40 0x3
Digital Signatures (2)
»
Signature Properties
InternalName aceoledb
FileVersion 15.0.4561.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4561.1000
FileDescription Microsoft Access database engine OLE DB Provider
OriginalFilename aceoledb.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 33 E5 27 86 A3 0E 4A 2A 80 00 00 00 00 00 33
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\aceoledb.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\aceoledb.dll (Modified File)
c:\program files\common files\microsoft shared\office15\aceoledb.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 434.40 KB
Hash Values MD5: 5f559f7baa58dc93bc354d3f58765a64
SHA1: 32bca4100aaded3f9ca0a00bc39f72fe64a8c018
SHA256: 46674b4a9c0959840c2cc0bcbda88f46c745863bdc0c08f15c1409f539e60310
Actions
c:\program files\common files\microsoft shared\office15\acetxt.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acetxt.dll (Modified File)
Size 198.71 KB
Hash Values MD5: ab643cc9cfcd2f2da49e6d9e2b075a7c
SHA1: f41fed3ad8a6ed248e36f447954d56aa0553534b
SHA256: b9e48ff742d7b50cd760a11a7746562af25a742ef1acb43ef4ac7818593431c4
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180021e24
Size Of Code 0x22800
Size Of Initialized Data 0x13400
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:09:28
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x226b8 0x22800 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.37
.rdata 0x180024000 0x7abc 0x7c00 0x22c00 CNT_INITIALIZED_DATA, MEM_READ 4.28
.data 0x18002c000 0x918c 0x3200 0x2a800 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.09
.pdata 0x180036000 0x1770 0x1800 0x2da00 CNT_INITIALIZED_DATA, MEM_READ 5.16
.rsrc 0x180038000 0x498 0x600 0x2f200 CNT_INITIALIZED_DATA, MEM_READ 2.7
.reloc 0x180039000 0x6e4 0x800 0x2f800 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.04
Imports (145)
»
acecore.dll (16)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
(by ordinal) 0x38c 0x180024000 0x29198 0x27d98
(by ordinal) 0x9f 0x180024008 0x291a0 0x27da0
(by ordinal) 0xac 0x180024010 0x291a8 0x27da8
(by ordinal) 0xb3 0x180024018 0x291b0 0x27db0
(by ordinal) 0x6c 0x180024020 0x291b8 0x27db8
(by ordinal) 0x9e 0x180024028 0x291c0 0x27dc0
(by ordinal) 0x88 0x180024030 0x291c8 0x27dc8
(by ordinal) 0x65 0x180024038 0x291d0 0x27dd0
(by ordinal) 0x76 0x180024040 0x291d8 0x27dd8
(by ordinal) 0xb0 0x180024048 0x291e0 0x27de0
(by ordinal) 0xaa 0x180024050 0x291e8 0x27de8
(by ordinal) 0x9b 0x180024058 0x291f0 0x27df0
(by ordinal) 0x9c 0x180024060 0x291f8 0x27df8
(by ordinal) 0xad 0x180024068 0x29200 0x27e00
(by ordinal) 0xa7 0x180024070 0x29208 0x27e08
(by ordinal) 0x92 0x180024078 0x29210 0x27e10
MSVCR100.dll (49)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180024088 0x29220 0x27e20
_lock 0x0 0x180024090 0x29228 0x27e28
__dllonexit 0x0 0x180024098 0x29230 0x27e30
_unlock 0x0 0x1800240a0 0x29238 0x27e38
__clean_type_info_names_internal 0x0 0x1800240a8 0x29240 0x27e40
__crt_debugger_hook 0x0 0x1800240b0 0x29248 0x27e48
__CppXcptFilter 0x0 0x1800240b8 0x29250 0x27e50
_amsg_exit 0x0 0x1800240c0 0x29258 0x27e58
_encoded_null 0x0 0x1800240c8 0x29260 0x27e60
_initterm_e 0x0 0x1800240d0 0x29268 0x27e68
_initterm 0x0 0x1800240d8 0x29270 0x27e70
_malloc_crt 0x0 0x1800240e0 0x29278 0x27e78
wcsncat_s 0x0 0x1800240e8 0x29280 0x27e80
_wfullpath 0x0 0x1800240f0 0x29288 0x27e88
malloc 0x0 0x1800240f8 0x29290 0x27e90
free 0x0 0x180024100 0x29298 0x27e98
_stricmp 0x0 0x180024108 0x292a0 0x27ea0
__C_specific_handler 0x0 0x180024110 0x292a8 0x27ea8
strstr 0x0 0x180024118 0x292b0 0x27eb0
_wcsicmp 0x0 0x180024120 0x292b8 0x27eb8
floor 0x0 0x180024128 0x292c0 0x27ec0
_ecvt_s 0x0 0x180024130 0x292c8 0x27ec8
?terminate@@YAXXZ 0x0 0x180024138 0x292d0 0x27ed0
wcsncmp 0x0 0x180024140 0x292d8 0x27ed8
wcstod 0x0 0x180024148 0x292e0 0x27ee0
wcspbrk 0x0 0x180024150 0x292e8 0x27ee8
ldiv 0x0 0x180024158 0x292f0 0x27ef0
toupper 0x0 0x180024160 0x292f8 0x27ef8
_snwprintf_s 0x0 0x180024168 0x29300 0x27f00
atoi 0x0 0x180024170 0x29308 0x27f08
wcstok_s 0x0 0x180024178 0x29310 0x27f10
_wtoi 0x0 0x180024180 0x29318 0x27f18
swscanf_s 0x0 0x180024188 0x29320 0x27f20
_wtol 0x0 0x180024190 0x29328 0x27f28
towlower 0x0 0x180024198 0x29330 0x27f30
memmove 0x0 0x1800241a0 0x29338 0x27f38
wcsstr 0x0 0x1800241a8 0x29340 0x27f40
_wsplitpath_s 0x0 0x1800241b0 0x29348 0x27f48
iswctype 0x0 0x1800241b8 0x29350 0x27f50
wcsrchr 0x0 0x1800241c0 0x29358 0x27f58
wcsncpy_s 0x0 0x1800241c8 0x29360 0x27f60
wcschr 0x0 0x1800241d0 0x29368 0x27f68
memset 0x0 0x1800241d8 0x29370 0x27f70
memcpy 0x0 0x1800241e0 0x29378 0x27f78
memcmp 0x0 0x1800241e8 0x29380 0x27f80
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x1800241f0 0x29388 0x27f88
_errno 0x0 0x1800241f8 0x29390 0x27f90
_CxxThrowException 0x0 0x180024200 0x29398 0x27f98
__CxxFrameHandler3 0x0 0x180024208 0x293a0 0x27fa0
KERNEL32.dll (66)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
LoadLibraryA 0x0 0x180024218 0x293b0 0x27fb0
LocalAlloc 0x0 0x180024220 0x293b8 0x27fb8
RtlCaptureContext 0x0 0x180024228 0x293c0 0x27fc0
RtlLookupFunctionEntry 0x0 0x180024230 0x293c8 0x27fc8
RtlVirtualUnwind 0x0 0x180024238 0x293d0 0x27fd0
IsDebuggerPresent 0x0 0x180024240 0x293d8 0x27fd8
SetUnhandledExceptionFilter 0x0 0x180024248 0x293e0 0x27fe0
UnhandledExceptionFilter 0x0 0x180024250 0x293e8 0x27fe8
GetCurrentProcess 0x0 0x180024258 0x293f0 0x27ff0
TerminateProcess 0x0 0x180024260 0x293f8 0x27ff8
Sleep 0x0 0x180024268 0x29400 0x28000
DecodePointer 0x0 0x180024270 0x29408 0x28008
EncodePointer 0x0 0x180024278 0x29410 0x28010
WerRegisterMemoryBlock 0x0 0x180024280 0x29418 0x28018
VirtualProtect 0x0 0x180024288 0x29420 0x28020
GetTickCount 0x0 0x180024290 0x29428 0x28028
GetSystemTimeAsFileTime 0x0 0x180024298 0x29430 0x28030
GetCurrentThreadId 0x0 0x1800242a0 0x29438 0x28038
HeapSetInformation 0x0 0x1800242a8 0x29440 0x28040
GetProcessHeap 0x0 0x1800242b0 0x29448 0x28048
QueryPerformanceCounter 0x0 0x1800242b8 0x29450 0x28050
GetLocaleInfoW 0x0 0x1800242c0 0x29458 0x28058
LoadLibraryExW 0x0 0x1800242c8 0x29460 0x28060
GetModuleHandleW 0x0 0x1800242d0 0x29468 0x28068
GetTempPathW 0x0 0x1800242d8 0x29470 0x28070
RemoveDirectoryW 0x0 0x1800242e0 0x29478 0x28078
GetFileAttributesW 0x0 0x1800242e8 0x29480 0x28080
FindNextFileW 0x0 0x1800242f0 0x29488 0x28088
FindFirstFileW 0x0 0x1800242f8 0x29490 0x28090
DeleteFileW 0x0 0x180024300 0x29498 0x28098
CreateDirectoryW 0x0 0x180024308 0x294a0 0x280a0
GetCurrentDirectoryW 0x0 0x180024310 0x294a8 0x280a8
SetCurrentDirectoryW 0x0 0x180024318 0x294b0 0x280b0
ExpandEnvironmentStringsW 0x0 0x180024320 0x294b8 0x280b8
MultiByteToWideChar 0x0 0x180024328 0x294c0 0x280c0
WideCharToMultiByte 0x0 0x180024330 0x294c8 0x280c8
GetACP 0x0 0x180024338 0x294d0 0x280d0
GetOEMCP 0x0 0x180024340 0x294d8 0x280d8
GetUserDefaultLCID 0x0 0x180024348 0x294e0 0x280e0
GlobalAlloc 0x0 0x180024350 0x294e8 0x280e8
GlobalLock 0x0 0x180024358 0x294f0 0x280f0
GlobalUnlock 0x0 0x180024360 0x294f8 0x280f8
GlobalFree 0x0 0x180024368 0x29500 0x28100
FileTimeToLocalFileTime 0x0 0x180024370 0x29508 0x28108
FindClose 0x0 0x180024378 0x29510 0x28110
GetFileTime 0x0 0x180024380 0x29518 0x28118
ReadFile 0x0 0x180024388 0x29520 0x28120
SetFilePointer 0x0 0x180024390 0x29528 0x28128
WriteFile 0x0 0x180024398 0x29530 0x28130
CloseHandle 0x0 0x1800243a0 0x29538 0x28138
GetLastError 0x0 0x1800243a8 0x29540 0x28140
FileTimeToDosDateTime 0x0 0x1800243b0 0x29548 0x28148
GetCurrentProcessId 0x0 0x1800243b8 0x29550 0x28150
GetVersionExW 0x0 0x1800243c0 0x29558 0x28158
FreeLibrary 0x0 0x1800243c8 0x29560 0x28160
GetProcAddress 0x0 0x1800243d0 0x29568 0x28168
DisableThreadLibraryCalls 0x0 0x1800243d8 0x29570 0x28170
GetPrivateProfileStringW 0x0 0x1800243e0 0x29578 0x28178
RaiseException 0x0 0x1800243e8 0x29580 0x28180
GetFileSize 0x0 0x1800243f0 0x29588 0x28188
GetStringTypeW 0x0 0x1800243f8 0x29590 0x28190
GetStringTypeA 0x0 0x180024400 0x29598 0x28198
IsValidCodePage 0x0 0x180024408 0x295a0 0x281a0
GetLocaleInfoA 0x0 0x180024410 0x295a8 0x281a8
GetSystemDefaultLangID 0x0 0x180024418 0x295b0 0x281b0
WritePrivateProfileStringA 0x0 0x180024420 0x295b8 0x281b8
ADVAPI32.dll (5)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
EventWrite 0x0 0x180024430 0x295c8 0x281c8
RegGetValueW 0x0 0x180024438 0x295d0 0x281d0
RegQueryValueExW 0x0 0x180024440 0x295d8 0x281d8
RegOpenKeyExW 0x0 0x180024448 0x295e0 0x281e0
RegCloseKey 0x0 0x180024450 0x295e8 0x281e8
OLEAUT32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SysAllocString 0x2 0x180024460 0x295f8 0x281f8
VarI2FromStr 0x36 0x180024468 0x29600 0x28200
SysAllocStringLen 0x4 0x180024470 0x29608 0x28208
VarDecFromStr 0xc5 0x180024478 0x29610 0x28210
SysFreeString 0x6 0x180024480 0x29618 0x28218
SysStringByteLen 0x95 0x180024488 0x29620 0x28220
VarBstrFromDec 0xe8 0x180024490 0x29628 0x28228
ole32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
StringFromGUID2 0x0 0x1800244a0 0x29638 0x28238
MSVCP100.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_Xlength_error@std@@YAXPEBD@Z 0x0 0x1800244b0 0x29648 0x28248
Exports (1)
»
Api name EAT Address Ordinal
None 0x18000d3b8 0x1
Digital Signatures (2)
»
Signature Properties
InternalName acetxt
FileVersion 15.0.4569.1503
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4569.1503
FileDescription Microsoft Access database engine Text ISAM
OriginalFilename acetxt.dll
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 34 24 31 40 C9 A0 C1 79 8D 00 00 00 00 00 34
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\acetxt.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acetxt.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acetxt.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 198.89 KB
Hash Values MD5: a87956a3fae7d10956b7a6f122cfd807
SHA1: a78393563b3626e5247557be3935583320e9d8e2
SHA256: 3bdee139de0d75411cb7cf8e5943384ad903e7a8295481720f15769195f8c715
Actions
c:\program files\common files\microsoft shared\office15\acewdat.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acewdat.dll (Modified File)
Size 2.91 MB
Hash Values MD5: 647805170c08d2494f35f1437c998f6e
SHA1: 533abafbb1fb6ea0d287937f2d59e6e586260adc
SHA256: f0a6819c08a07b7b5b138f92203e201023351a7826e49e8b5990fe364f4a467f
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001c38
Size Of Code 0x1400
Size Of Initialized Data 0x2e6200
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2012-11-07 13:09:25
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x1224 0x1400 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.04
.rdata 0x180003000 0xd78 0xe00 0x1800 CNT_INITIALIZED_DATA, MEM_READ 3.83
.data 0x180004000 0x2e49e8 0x2e4600 0x2600 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE Unknown
.pdata 0x1802e9000 0xf0 0x200 0x2e6c00 CNT_INITIALIZED_DATA, MEM_READ 1.97
.rsrc 0x1802ea000 0x4a0 0x600 0x2e6e00 CNT_INITIALIZED_DATA, MEM_READ 2.71
.reloc 0x1802eb000 0xe4 0x200 0x2e7400 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 2.45
Imports (38)
»
MSVCR100.dll (15)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
_onexit 0x0 0x180003000 0x3870 0x2070
_lock 0x0 0x180003008 0x3878 0x2078
__dllonexit 0x0 0x180003010 0x3880 0x2080
_unlock 0x0 0x180003018 0x3888 0x2088
__clean_type_info_names_internal 0x0 0x180003020 0x3890 0x2090
__crt_debugger_hook 0x0 0x180003028 0x3898 0x2098
__CppXcptFilter 0x0 0x180003030 0x38a0 0x20a0
__C_specific_handler 0x0 0x180003038 0x38a8 0x20a8
_amsg_exit 0x0 0x180003040 0x38b0 0x20b0
_encoded_null 0x0 0x180003048 0x38b8 0x20b8
free 0x0 0x180003050 0x38c0 0x20c0
_initterm_e 0x0 0x180003058 0x38c8 0x20c8
_initterm 0x0 0x180003060 0x38d0 0x20d0
_malloc_crt 0x0 0x180003068 0x38d8 0x20d8
memcpy 0x0 0x180003070 0x38e0 0x20e0
KERNEL32.dll (23)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
HeapSetInformation 0x0 0x180003080 0x38f0 0x20f0
DisableThreadLibraryCalls 0x0 0x180003088 0x38f8 0x20f8
RtlCaptureContext 0x0 0x180003090 0x3900 0x2100
RtlLookupFunctionEntry 0x0 0x180003098 0x3908 0x2108
RtlVirtualUnwind 0x0 0x1800030a0 0x3910 0x2110
IsDebuggerPresent 0x0 0x1800030a8 0x3918 0x2118
SetUnhandledExceptionFilter 0x0 0x1800030b0 0x3920 0x2120
UnhandledExceptionFilter 0x0 0x1800030b8 0x3928 0x2128
GetCurrentProcess 0x0 0x1800030c0 0x3930 0x2130
TerminateProcess 0x0 0x1800030c8 0x3938 0x2138
Sleep 0x0 0x1800030d0 0x3940 0x2140
DecodePointer 0x0 0x1800030d8 0x3948 0x2148
EncodePointer 0x0 0x1800030e0 0x3950 0x2150
WerRegisterMemoryBlock 0x0 0x1800030e8 0x3958 0x2158
VirtualProtect 0x0 0x1800030f0 0x3960 0x2160
GetTickCount 0x0 0x1800030f8 0x3968 0x2168
GlobalAlloc 0x0 0x180003100 0x3970 0x2170
GlobalFree 0x0 0x180003108 0x3978 0x2178
QueryPerformanceCounter 0x0 0x180003110 0x3980 0x2180
GetProcessHeap 0x0 0x180003118 0x3988 0x2188
GetCurrentProcessId 0x0 0x180003120 0x3990 0x2190
GetCurrentThreadId 0x0 0x180003128 0x3998 0x2198
GetSystemTimeAsFileTime 0x0 0x180003130 0x39a0 0x21a0
Exports (1)
»
Api name EAT Address Ordinal
None 0x18000104c 0x1
Digital Signatures (2)
»
Signature Properties
InternalName acewdat
FileVersion 15.0.4454.1000
CompanyName Microsoft Corporation
LegalTrademarks1 Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2 Windows® is a registered trademark of Microsoft Corporation.
ProductName Microsoft Office 2013
ProductVersion 15.0.4454.1000
FileDescription Microsoft Access database engine Sort Tables DLL
OriginalFilename acewdat.dll
Signature verification True
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2012-09-04 21:42
Valid to 2013-03-04 21:42
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 9D 1E 8D 27 AE B8 F3 D8 38 00 01 00 00 00 9D
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2012-01-09 22:25
Valid to 2013-04-09 22:25
Algorithm SHA-1 with RSA Encryption
Serial number 61 02 8E 42 00 00 00 00 00 1F
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
c:\program files\common files\microsoft shared\office15\acewdat.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acewdat.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acewdat.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 2.91 MB
Hash Values MD5: f7e483ce003ef580ee6f7572ee09c914
SHA1: 1fdfb454abfd257e0d0a087d43799f9d667e2ea0
SHA256: 05eb82fdffd6c6ef627b2bdb557cfbba768f6280d79cb65d9f7ec1f4edc23cf8
Actions
c:\program files\common files\microsoft shared\office15\acewss.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acewss.dll (Modified File)
Size 306.73 KB
Hash Values MD5: b9295ce35a64cb40dade608be9ffe6c6
SHA1: 735ee1342a8db6797d461aefb11815513a7bc84b
SHA256: ebe5ca3172453f3793bbf4dd9a4626f08b1c00384b287b6bb0065b19fca449a5
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180001000
Size Of Code 0x39400
Size Of Initialized Data 0x13400
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:25:55
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x39208 0x39400 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.3
.rdata 0x18003b000 0xd208 0xd400 0x39800 CNT_INITIALIZED_DATA, MEM_READ 5.5
.data 0x180049000 0x2e4c 0x1400 0x46c00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 3.45
.pdata 0x18004c000 0x26dc 0x2800 0x48000 CNT_INITIALIZED_DATA, MEM_READ 5.45
.rsrc 0x18004f000 0x3e8 0x400 0x4a800 CNT_INITIALIZED_DATA, MEM_READ 3.31
.reloc 0x180050000 0x34c 0x400 0x4ac00 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.93
Imports (130)
»
MSVCR100.dll (43)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
?_type_info_dtor_internal_method@type_info@@QEAAXXZ 0x0 0x18003b000 0x427e8 0x40fe8
__clean_type_info_names_internal 0x0 0x18003b008 0x427f0 0x40ff0
_onexit 0x0 0x18003b010 0x427f8 0x40ff8
_lock 0x0 0x18003b018 0x42800 0x41000
__dllonexit 0x0 0x18003b020 0x42808 0x41008
_unlock 0x0 0x18003b028 0x42810 0x41010
?terminate@@YAXXZ 0x0 0x18003b030 0x42818 0x41018
__crt_debugger_hook 0x0 0x18003b038 0x42820 0x41020
__CppXcptFilter 0x0 0x18003b040 0x42828 0x41028
__C_specific_handler 0x0 0x18003b048 0x42830 0x41030
_amsg_exit 0x0 0x18003b050 0x42838 0x41038
_encoded_null 0x0 0x18003b058 0x42840 0x41040
_initterm_e 0x0 0x18003b060 0x42848 0x41048
_initterm 0x0 0x18003b068 0x42850 0x41050
_malloc_crt 0x0 0x18003b070 0x42858 0x41058
vswprintf_s 0x0 0x18003b078 0x42860 0x41060
_wtol 0x0 0x18003b080 0x42868 0x41068
??_U@YAPEAX_K@Z 0x0 0x18003b088 0x42870 0x41070
_vsnwprintf_s 0x0 0x18003b090 0x42878 0x41078
wcstoul 0x0 0x18003b098 0x42880 0x41080
_itow_s 0x0 0x18003b0a0 0x42888 0x41088
??2@YAPEAX_K@Z 0x0 0x18003b0a8 0x42890 0x41090
__CxxFrameHandler3 0x0 0x18003b0b0 0x42898 0x41098
wcsncat_s 0x0 0x18003b0b8 0x428a0 0x410a0
wcsncpy_s 0x0 0x18003b0c0 0x428a8 0x410a8
memcpy 0x0 0x18003b0c8 0x428b0 0x410b0
memset 0x0 0x18003b0d0 0x428b8 0x410b8
free 0x0 0x18003b0d8 0x428c0 0x410c0
malloc 0x0 0x18003b0e0 0x428c8 0x410c8
wcstol 0x0 0x18003b0e8 0x428d0 0x410d0
_wtoi 0x0 0x18003b0f0 0x428d8 0x410d8
_wfullpath 0x0 0x18003b0f8 0x428e0 0x410e0
wcsnlen 0x0 0x18003b100 0x428e8 0x410e8
wcsstr 0x0 0x18003b108 0x428f0 0x410f0
_wcsnicmp 0x0 0x18003b110 0x428f8 0x410f8
_snwprintf_s 0x0 0x18003b118 0x42900 0x41100
wcsncmp 0x0 0x18003b120 0x42908 0x41108
memcmp 0x0 0x18003b128 0x42910 0x41110
wcschr 0x0 0x18003b130 0x42918 0x41118
wcsrchr 0x0 0x18003b138 0x42920 0x41120
_wcsicmp 0x0 0x18003b140 0x42928 0x41128
??3@YAXPEAX@Z 0x0 0x18003b148 0x42930 0x41130
??_V@YAXPEAX@Z 0x0 0x18003b150 0x42938 0x41138
ADVAPI32.dll (10)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
RegisterEventSourceW 0x0 0x18003b160 0x42948 0x41148
DeregisterEventSource 0x0 0x18003b168 0x42950 0x41150
RegQueryValueExW 0x0 0x18003b170 0x42958 0x41158
RegOpenKeyExW 0x0 0x18003b178 0x42960 0x41160
RegCloseKey 0x0 0x18003b180 0x42968 0x41168
ReportEventW 0x0 0x18003b188 0x42970 0x41170
RegOpenKeyExA 0x0 0x18003b190 0x42978 0x41178
EventRegister 0x0 0x18003b198 0x42980 0x41180
EventUnregister 0x0 0x18003b1a0 0x42988 0x41188
EventWrite 0x0 0x18003b1a8 0x42990 0x41190
KERNEL32.dll (56)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CreateFileW 0x0 0x18003b1b8 0x429a0 0x411a0
FreeLibrary 0x0 0x18003b1c0 0x429a8 0x411a8
GetFileType 0x0 0x18003b1c8 0x429b0 0x411b0
SetLastError 0x0 0x18003b1d0 0x429b8 0x411b8
RtlCaptureContext 0x0 0x18003b1d8 0x429c0 0x411c0
RtlLookupFunctionEntry 0x0 0x18003b1e0 0x429c8 0x411c8
RtlVirtualUnwind 0x0 0x18003b1e8 0x429d0 0x411d0
IsDebuggerPresent 0x0 0x18003b1f0 0x429d8 0x411d8
UnhandledExceptionFilter 0x0 0x18003b1f8 0x429e0 0x411e0
GetCurrentProcess 0x0 0x18003b200 0x429e8 0x411e8
TerminateProcess 0x0 0x18003b208 0x429f0 0x411f0
Sleep 0x0 0x18003b210 0x429f8 0x411f8
DecodePointer 0x0 0x18003b218 0x42a00 0x41200
EncodePointer 0x0 0x18003b220 0x42a08 0x41208
LoadLibraryExW 0x0 0x18003b228 0x42a10 0x41210
GetModuleFileNameW 0x0 0x18003b230 0x42a18 0x41218
HeapFree 0x0 0x18003b238 0x42a20 0x41220
HeapAlloc 0x0 0x18003b240 0x42a28 0x41228
WerRegisterMemoryBlock 0x0 0x18003b248 0x42a30 0x41230
VirtualProtect 0x0 0x18003b250 0x42a38 0x41238
GetSystemTimeAsFileTime 0x0 0x18003b258 0x42a40 0x41240
GetCurrentThreadId 0x0 0x18003b260 0x42a48 0x41248
HeapSetInformation 0x0 0x18003b268 0x42a50 0x41250
GetProcessHeap 0x0 0x18003b270 0x42a58 0x41258
QueryPerformanceCounter 0x0 0x18003b278 0x42a60 0x41260
GetSystemDefaultLCID 0x0 0x18003b280 0x42a68 0x41268
LocalAlloc 0x0 0x18003b288 0x42a70 0x41270
LoadLibraryA 0x0 0x18003b290 0x42a78 0x41278
SetUnhandledExceptionFilter 0x0 0x18003b298 0x42a80 0x41280
GetLastError 0x0 0x18003b2a0 0x42a88 0x41288
MultiByteToWideChar 0x0 0x18003b2a8 0x42a90 0x41290
WideCharToMultiByte 0x0 0x18003b2b0 0x42a98 0x41298
GetTempPathW 0x0 0x18003b2b8 0x42aa0 0x412a0
GetUserDefaultLCID 0x0 0x18003b2c0 0x42aa8 0x412a8
lstrcmpiW 0x0 0x18003b2c8 0x42ab0 0x412b0
GlobalAlloc 0x0 0x18003b2d0 0x42ab8 0x412b8
GlobalLock 0x0 0x18003b2d8 0x42ac0 0x412c0
GlobalUnlock 0x0 0x18003b2e0 0x42ac8 0x412c8
GlobalFree 0x0 0x18003b2e8 0x42ad0 0x412d0
GetCurrentProcessId 0x0 0x18003b2f0 0x42ad8 0x412d8
GetModuleHandleW 0x0 0x18003b2f8 0x42ae0 0x412e0
GetProcAddress 0x0 0x18003b300 0x42ae8 0x412e8
DeleteFileW 0x0 0x18003b308 0x42af0 0x412f0
GetFileAttributesW 0x0 0x18003b310 0x42af8 0x412f8
ReadFile 0x0 0x18003b318 0x42b00 0x41300
RemoveDirectoryW 0x0 0x18003b320 0x42b08 0x41308
SetFilePointer 0x0 0x18003b328 0x42b10 0x41310
WriteFile 0x0 0x18003b330 0x42b18 0x41318
CloseHandle 0x0 0x18003b338 0x42b20 0x41320
RaiseException 0x0 0x18003b340 0x42b28 0x41328
GetLocalTime 0x0 0x18003b348 0x42b30 0x41330
GetACP 0x0 0x18003b350 0x42b38 0x41338
GetOEMCP 0x0 0x18003b358 0x42b40 0x41340
GetTickCount 0x0 0x18003b360 0x42b48 0x41348
lstrcmpW 0x0 0x18003b368 0x42b50 0x41350
CompareStringW 0x0 0x18003b370 0x42b58 0x41358
ole32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CoCreateInstance 0x0 0x18003b380 0x42b68 0x41368
CoTaskMemRealloc 0x0 0x18003b388 0x42b70 0x41370
CLSIDFromString 0x0 0x18003b390 0x42b78 0x41378
CoTaskMemFree 0x0 0x18003b398 0x42b80 0x41380
CoTaskMemAlloc 0x0 0x18003b3a0 0x42b88 0x41388
CoGetMalloc 0x0 0x18003b3a8 0x42b90 0x41390
StringFromGUID2 0x0 0x18003b3b0 0x42b98 0x41398
OLEAUT32.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
VariantChangeType 0xc 0x18003b3c0 0x42ba8 0x413a8
VariantChangeTypeEx 0x93 0x18003b3c8 0x42bb0 0x413b0
VariantCopy 0xa 0x18003b3d0 0x42bb8 0x413b8
VariantInit 0x8 0x18003b3d8 0x42bc0 0x413c0
SysStringLen 0x7 0x18003b3e0 0x42bc8 0x413c8
GetErrorInfo 0xc8 0x18003b3e8 0x42bd0 0x413d0
SysAllocString 0x2 0x18003b3f0 0x42bd8 0x413d8
VariantClear 0x9 0x18003b3f8 0x42be0 0x413e0
SafeArrayUnaccessData 0x18 0x18003b400 0x42be8 0x413e8
SafeArrayAccessData 0x17 0x18003b408 0x42bf0 0x413f0
SafeArrayGetLBound 0x14 0x18003b410 0x42bf8 0x413f8
SafeArrayGetUBound 0x13 0x18003b418 0x42c00 0x41400
SysFreeString 0x6 0x18003b420 0x42c08 0x41408
SysAllocStringLen 0x4 0x18003b428 0x42c10 0x41410
Exports (1)
»
Api name EAT Address Ordinal
None 0x1800014ec 0x1
Digital Signatures (2)
»
Signature Properties
LegalCopyright © Microsoft Corporation. All rights reserved.
InternalName ACEWSS
FileVersion 15.00.4569.1503
CompanyName Microsoft Corporation
ProductName Microsoft Office System 2007
ProductVersion 15.00.4569.1503
FileDescription Microsoft Access database engine SharePoint ISAM
OriginalFilename ACEWSS.DLL
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-11-11 22:11
Valid to 2015-02-11 22:11
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 4C A1 E8 4D CC B4 74 7B 3B 00 00 00 00 00 4C
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\acewss.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\acewss.dll (Modified File)
c:\program files\common files\microsoft shared\office15\acewss.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 306.90 KB
Hash Values MD5: 7197d73393763191cde8ab7fa429821d
SHA1: 45c7e7c2c69c75f541c67bc90f55aec0035786ff
SHA256: cf74f95a22ff86b23f589a6229c94b59685bfbd2b62c1eaab2cc691f2e0b3f71
Actions
c:\program files\common files\microsoft shared\office15\adal.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\adal.dll (Modified File)
Size 852.66 KB
Hash Values MD5: 212886087460329da2309d9a331d9c6c
SHA1: 48fa1dcf769a7dc8d0e8fbbc0ffe7e9c20315f53
SHA256: f74bda64e3e6709c67dae82968b75a59c1c20d6c5727d70f8aae6f8a9215d79a
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x180054f88
Size Of Code 0x6fc00
Size Of Initialized Data 0x63800
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-10-29 07:26:27
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x6fb3e 0x6fc00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ 6.37
.rdata 0x180071000 0x2dd54 0x2de00 0x70000 CNT_INITIALIZED_DATA, MEM_READ 4.73
.data 0x18009f000 0x7590 0x4a00 0x9de00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 4.15
.pdata 0x1800a7000 0x66cc 0x6800 0xa2800 CNT_INITIALIZED_DATA, MEM_READ 5.84
.rsrc 0x1800ae000 0x28ea4 0x29000 0xa9000 CNT_INITIALIZED_DATA, MEM_READ 7.21
.reloc 0x1800d7000 0x17a0 0x1800 0xd2000 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 4.03
Imports (236)
»
USER32.dll (57)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CallNextHookEx 0x0 0x1800714a0 0x9d488 0x9c488
SetWindowsHookExW 0x0 0x1800714a8 0x9d490 0x9c490
UnhookWindowsHookEx 0x0 0x1800714b0 0x9d498 0x9c498
GetMessageW 0x0 0x1800714b8 0x9d4a0 0x9c4a0
TranslateMessage 0x0 0x1800714c0 0x9d4a8 0x9c4a8
DispatchMessageW 0x0 0x1800714c8 0x9d4b0 0x9c4b0
PostThreadMessageW 0x0 0x1800714d0 0x9d4b8 0x9c4b8
DefWindowProcW 0x0 0x1800714d8 0x9d4c0 0x9c4c0
CallWindowProcW 0x0 0x1800714e0 0x9d4c8 0x9c4c8
RegisterClassExW 0x0 0x1800714e8 0x9d4d0 0x9c4d0
GetClassInfoExW 0x0 0x1800714f0 0x9d4d8 0x9c4d8
CreateWindowExW 0x0 0x1800714f8 0x9d4e0 0x9c4e0
DestroyWindow 0x0 0x180071500 0x9d4e8 0x9c4e8
SetTimer 0x0 0x180071508 0x9d4f0 0x9c4f0
GetWindowLongPtrW 0x0 0x180071510 0x9d4f8 0x9c4f8
SetWindowLongPtrW 0x0 0x180071518 0x9d500 0x9c500
LoadCursorW 0x0 0x180071520 0x9d508 0x9c508
GetParent 0x0 0x180071528 0x9d510 0x9c510
SendMessageW 0x0 0x180071530 0x9d518 0x9c518
IsWindow 0x0 0x180071538 0x9d520 0x9c520
IsChild 0x0 0x180071540 0x9d528 0x9c528
MoveWindow 0x0 0x180071548 0x9d530 0x9c530
SetWindowPos 0x0 0x180071550 0x9d538 0x9c538
GetDlgItem 0x0 0x180071558 0x9d540 0x9c540
CharNextW 0x0 0x180071560 0x9d548 0x9c548
SetFocus 0x0 0x180071568 0x9d550 0x9c550
GetFocus 0x0 0x180071570 0x9d558 0x9c558
SetCapture 0x0 0x180071578 0x9d560 0x9c560
ReleaseCapture 0x0 0x180071580 0x9d568 0x9c568
CreateAcceleratorTableW 0x0 0x180071588 0x9d570 0x9c570
DestroyAcceleratorTable 0x0 0x180071590 0x9d578 0x9c578
GetDC 0x0 0x180071598 0x9d580 0x9c580
ReleaseDC 0x0 0x1800715a0 0x9d588 0x9c588
BeginPaint 0x0 0x1800715a8 0x9d590 0x9c590
EndPaint 0x0 0x1800715b0 0x9d598 0x9c598
RegisterWindowMessageW 0x0 0x1800715b8 0x9d5a0 0x9c5a0
GetDesktopWindow 0x0 0x1800715c0 0x9d5a8 0x9c5a8
UnregisterClassA 0x0 0x1800715c8 0x9d5b0 0x9c5b0
InvalidateRect 0x0 0x1800715d0 0x9d5b8 0x9c5b8
InvalidateRgn 0x0 0x1800715d8 0x9d5c0 0x9c5c0
RedrawWindow 0x0 0x1800715e0 0x9d5c8 0x9c5c8
SetWindowTextW 0x0 0x1800715e8 0x9d5d0 0x9c5d0
GetWindowTextW 0x0 0x1800715f0 0x9d5d8 0x9c5d8
PostQuitMessage 0x0 0x1800715f8 0x9d5e0 0x9c5e0
PostMessageW 0x0 0x180071600 0x9d5e8 0x9c5e8
LoadIconW 0x0 0x180071608 0x9d5f0 0x9c5f0
GetWindow 0x0 0x180071610 0x9d5f8 0x9c5f8
GetClassNameW 0x0 0x180071618 0x9d600 0x9c600
GetKeyState 0x0 0x180071620 0x9d608 0x9c608
SetWindowLongW 0x0 0x180071628 0x9d610 0x9c610
GetWindowLongW 0x0 0x180071630 0x9d618 0x9c618
FillRect 0x0 0x180071638 0x9d620 0x9c620
GetSysColor 0x0 0x180071640 0x9d628 0x9c628
ScreenToClient 0x0 0x180071648 0x9d630 0x9c630
ClientToScreen 0x0 0x180071650 0x9d638 0x9c638
GetClientRect 0x0 0x180071658 0x9d640 0x9c640
GetWindowTextLengthW 0x0 0x180071660 0x9d648 0x9c648
ole32.dll (13)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
OleRun 0x0 0x180071748 0x9d730 0x9c730
CreateStreamOnHGlobal 0x0 0x180071750 0x9d738 0x9c738
OleLockRunning 0x0 0x180071758 0x9d740 0x9c740
OleUninitialize 0x0 0x180071760 0x9d748 0x9c748
OleInitialize 0x0 0x180071768 0x9d750 0x9c750
CoTaskMemAlloc 0x0 0x180071770 0x9d758 0x9c758
CLSIDFromProgID 0x0 0x180071778 0x9d760 0x9c760
CLSIDFromString 0x0 0x180071780 0x9d768 0x9c768
CoGetClassObject 0x0 0x180071788 0x9d770 0x9c770
CoInitializeEx 0x0 0x180071790 0x9d778 0x9c778
CoUninitialize 0x0 0x180071798 0x9d780 0x9c780
CoCreateInstance 0x0 0x1800717a0 0x9d788 0x9c788
StringFromGUID2 0x0 0x1800717a8 0x9d790 0x9c790
OLEAUT32.dll (13)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DispCallFunc 0x92 0x180071410 0x9d3f8 0x9c3f8
VariantChangeType 0xc 0x180071418 0x9d400 0x9c400
VariantCopy 0xa 0x180071420 0x9d408 0x9c408
OleCreateFontIndirect 0x1a4 0x180071428 0x9d410 0x9c410
VariantClear 0x9 0x180071430 0x9d418 0x9c418
VariantInit 0x8 0x180071438 0x9d420 0x9c420
SysAllocStringLen 0x4 0x180071440 0x9d428 0x9c428
LoadRegTypeLib 0xa2 0x180071448 0x9d430 0x9c430
LoadTypeLib 0xa1 0x180071450 0x9d438 0x9c438
SysStringLen 0x7 0x180071458 0x9d440 0x9c440
SysAllocString 0x2 0x180071460 0x9d448 0x9c448
SysFreeString 0x6 0x180071468 0x9d450 0x9c450
GetErrorInfo 0xc8 0x180071470 0x9d458 0x9c458
ADVAPI32.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
DeregisterEventSource 0x0 0x180071000 0x9cfe8 0x9bfe8
CryptReleaseContext 0x0 0x180071008 0x9cff0 0x9bff0
CryptGetHashParam 0x0 0x180071010 0x9cff8 0x9bff8
CryptCreateHash 0x0 0x180071018 0x9d000 0x9c000
ReportEventW 0x0 0x180071020 0x9d008 0x9c008
RegisterEventSourceW 0x0 0x180071028 0x9d010 0x9c010
CryptAcquireContextW 0x0 0x180071030 0x9d018 0x9c018
CryptDestroyHash 0x0 0x180071038 0x9d020 0x9c020
CryptHashData 0x0 0x180071040 0x9d028 0x9c028
WINHTTP.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
WinHttpOpenRequest 0x0 0x180071670 0x9d658 0x9c658
WinHttpQueryHeaders 0x0 0x180071678 0x9d660 0x9c660
WinHttpReceiveResponse 0x0 0x180071680 0x9d668 0x9c668
WinHttpSetCredentials 0x0 0x180071688 0x9d670 0x9c670
WinHttpSendRequest 0x0 0x180071690 0x9d678 0x9c678
WinHttpAddRequestHeaders 0x0 0x180071698 0x9d680 0x9c680
WinHttpSetStatusCallback 0x0 0x1800716a0 0x9d688 0x9c688
WinHttpSetOption 0x0 0x1800716a8 0x9d690 0x9c690
WinHttpQueryDataAvailable 0x0 0x1800716b0 0x9d698 0x9c698
WinHttpReadData 0x0 0x1800716b8 0x9d6a0 0x9c6a0
WinHttpConnect 0x0 0x1800716c0 0x9d6a8 0x9c6a8
WinHttpCloseHandle 0x0 0x1800716c8 0x9d6b0 0x9c6b0
WinHttpOpen 0x0 0x1800716d0 0x9d6b8 0x9c6b8
WinHttpCrackUrl 0x0 0x1800716d8 0x9d6c0 0x9c6c0
WININET.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
InternetOpenW 0x0 0x1800716e8 0x9d6d0 0x9c6d0
InternetCloseHandle 0x0 0x1800716f0 0x9d6d8 0x9c6d8
InternetConnectW 0x0 0x1800716f8 0x9d6e0 0x9c6e0
InternetReadFile 0x0 0x180071700 0x9d6e8 0x9c6e8
InternetQueryDataAvailable 0x0 0x180071708 0x9d6f0 0x9c6f0
InternetSetStatusCallbackW 0x0 0x180071710 0x9d6f8 0x9c6f8
HttpOpenRequestW 0x0 0x180071718 0x9d700 0x9c700
HttpAddRequestHeadersW 0x0 0x180071720 0x9d708 0x9c708
HttpSendRequestW 0x0 0x180071728 0x9d710 0x9c710
HttpQueryInfoW 0x0 0x180071730 0x9d718 0x9c718
InternetSetOptionW 0x0 0x180071738 0x9d720 0x9c720
CRYPT32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
CryptUnprotectData 0x0 0x180071050 0x9d038 0x9c038
CryptProtectData 0x0 0x180071058 0x9d040 0x9c040
RPCRT4.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
UuidCreate 0x0 0x180071480 0x9d468 0x9c468
KERNEL32.dll (105)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
SetHandleCount 0x0 0x1800710c0 0x9d0a8 0x9c0a8
GetTimeZoneInformation 0x0 0x1800710c8 0x9d0b0 0x9c0b0
IsValidCodePage 0x0 0x1800710d0 0x9d0b8 0x9c0b8
GetOEMCP 0x0 0x1800710d8 0x9d0c0 0x9c0c0
GetACP 0x0 0x1800710e0 0x9d0c8 0x9c0c8
ExitProcess 0x0 0x1800710e8 0x9d0d0 0x9c0d0
HeapCreate 0x0 0x1800710f0 0x9d0d8 0x9c0d8
GetVersion 0x0 0x1800710f8 0x9d0e0 0x9c0e0
HeapSetInformation 0x0 0x180071100 0x9d0e8 0x9c0e8
FlsAlloc 0x0 0x180071108 0x9d0f0 0x9c0f0
FlsFree 0x0 0x180071110 0x9d0f8 0x9c0f8
FlsGetValue 0x0 0x180071118 0x9d100 0x9c100
GetLocaleInfoW 0x0 0x180071120 0x9d108 0x9c108
GetStdHandle 0x0 0x180071128 0x9d110 0x9c110
WriteFile 0x0 0x180071130 0x9d118 0x9c118
GetCPInfo 0x0 0x180071138 0x9d120 0x9c120
LCMapStringW 0x0 0x180071140 0x9d128 0x9c128
GetCommandLineA 0x0 0x180071148 0x9d130 0x9c130
FlsSetValue 0x0 0x180071150 0x9d138 0x9c138
RtlCaptureContext 0x0 0x180071158 0x9d140 0x9c140
RtlVirtualUnwind 0x0 0x180071160 0x9d148 0x9c148
IsDebuggerPresent 0x0 0x180071168 0x9d150 0x9c150
SetUnhandledExceptionFilter 0x0 0x180071170 0x9d158 0x9c158
UnhandledExceptionFilter 0x0 0x180071178 0x9d160 0x9c160
TerminateProcess 0x0 0x180071180 0x9d168 0x9c168
GetTimeFormatW 0x0 0x180071188 0x9d170 0x9c170
GetDateFormatW 0x0 0x180071190 0x9d178 0x9c178
CreateThread 0x0 0x180071198 0x9d180 0x9c180
ExitThread 0x0 0x1800711a0 0x9d188 0x9c188
GetSystemTimeAsFileTime 0x0 0x1800711a8 0x9d190 0x9c190
RtlUnwindEx 0x0 0x1800711b0 0x9d198 0x9c198
RtlLookupFunctionEntry 0x0 0x1800711b8 0x9d1a0 0x9c1a0
RtlPcToFileHeader 0x0 0x1800711c0 0x9d1a8 0x9c1a8
TerminateThread 0x0 0x1800711c8 0x9d1b0 0x9c1b0
GetCurrentProcess 0x0 0x1800711d0 0x9d1b8 0x9c1b8
FlushInstructionCache 0x0 0x1800711d8 0x9d1c0 0x9c1c0
GetFileType 0x0 0x1800711e0 0x9d1c8 0x9c1c8
GetStartupInfoW 0x0 0x1800711e8 0x9d1d0 0x9c1d0
GetModuleFileNameA 0x0 0x1800711f0 0x9d1d8 0x9c1d8
FreeEnvironmentStringsW 0x0 0x1800711f8 0x9d1e0 0x9c1e0
GetEnvironmentStringsW 0x0 0x180071200 0x9d1e8 0x9c1e8
QueryPerformanceCounter 0x0 0x180071208 0x9d1f0 0x9c1f0
GetTickCount 0x0 0x180071210 0x9d1f8 0x9c1f8
GetCurrentProcessId 0x0 0x180071218 0x9d200 0x9c200
RaiseException 0x0 0x180071220 0x9d208 0x9c208
FormatMessageW 0x0 0x180071228 0x9d210 0x9c210
LocalAlloc 0x0 0x180071230 0x9d218 0x9c218
DeleteCriticalSection 0x0 0x180071238 0x9d220 0x9c220
InitializeCriticalSectionAndSpinCount 0x0 0x180071240 0x9d228 0x9c228
GetCurrentThreadId 0x0 0x180071248 0x9d230 0x9c230
GetExitCodeThread 0x0 0x180071250 0x9d238 0x9c238
WideCharToMultiByte 0x0 0x180071258 0x9d240 0x9c240
LocalFree 0x0 0x180071260 0x9d248 0x9c248
GetModuleHandleW 0x0 0x180071268 0x9d250 0x9c250
GetModuleFileNameW 0x0 0x180071270 0x9d258 0x9c258
lstrlenW 0x0 0x180071278 0x9d260 0x9c260
LeaveCriticalSection 0x0 0x180071280 0x9d268 0x9c268
EnterCriticalSection 0x0 0x180071288 0x9d270 0x9c270
GetProcAddress 0x0 0x180071290 0x9d278 0x9c278
GetUserDefaultLCID 0x0 0x180071298 0x9d280 0x9c280
GetLocaleInfoA 0x0 0x1800712a0 0x9d288 0x9c288
EnumSystemLocalesA 0x0 0x1800712a8 0x9d290 0x9c290
IsValidLocale 0x0 0x1800712b0 0x9d298 0x9c298
LoadLibraryW 0x0 0x1800712b8 0x9d2a0 0x9c2a0
SetFilePointer 0x0 0x1800712c0 0x9d2a8 0x9c2a8
GetConsoleCP 0x0 0x1800712c8 0x9d2b0 0x9c2b0
GetConsoleMode 0x0 0x1800712d0 0x9d2b8 0x9c2b8
SetStdHandle 0x0 0x1800712d8 0x9d2c0 0x9c2c0
WriteConsoleW 0x0 0x1800712e0 0x9d2c8 0x9c2c8
CreateFileW 0x0 0x1800712e8 0x9d2d0 0x9c2d0
InterlockedPopEntrySList 0x0 0x1800712f0 0x9d2d8 0x9c2d8
VirtualAlloc 0x0 0x1800712f8 0x9d2e0 0x9c2e0
VirtualFree 0x0 0x180071300 0x9d2e8 0x9c2e8
InterlockedPushEntrySList 0x0 0x180071308 0x9d2f0 0x9c2f0
GetProcessHeap 0x0 0x180071310 0x9d2f8 0x9c2f8
HeapSize 0x0 0x180071318 0x9d300 0x9c300
HeapReAlloc 0x0 0x180071320 0x9d308 0x9c308
HeapFree 0x0 0x180071328 0x9d310 0x9c310
HeapAlloc 0x0 0x180071330 0x9d318 0x9c318
HeapDestroy 0x0 0x180071338 0x9d320 0x9c320
DecodePointer 0x0 0x180071340 0x9d328 0x9c328
EncodePointer 0x0 0x180071348 0x9d330 0x9c330
InitializeCriticalSection 0x0 0x180071350 0x9d338 0x9c338
Sleep 0x0 0x180071358 0x9d340 0x9c340
GetStringTypeW 0x0 0x180071360 0x9d348 0x9c348
lstrlenA 0x0 0x180071368 0x9d350 0x9c350
GetTickCount64 0x0 0x180071370 0x9d358 0x9c358
lstrcmpW 0x0 0x180071378 0x9d360 0x9c360
MulDiv 0x0 0x180071380 0x9d368 0x9c368
GlobalUnlock 0x0 0x180071388 0x9d370 0x9c370
GlobalLock 0x0 0x180071390 0x9d378 0x9c378
GlobalAlloc 0x0 0x180071398 0x9d380 0x9c380
CloseHandle 0x0 0x1800713a0 0x9d388 0x9c388
WaitForSingleObject 0x0 0x1800713a8 0x9d390 0x9c390
SetLastError 0x0 0x1800713b0 0x9d398 0x9c398
FlushFileBuffers 0x0 0x1800713b8 0x9d3a0 0x9c3a0
CompareStringW 0x0 0x1800713c0 0x9d3a8 0x9c3a8
SetEnvironmentVariableA 0x0 0x1800713c8 0x9d3b0 0x9c3b0
MultiByteToWideChar 0x0 0x1800713d0 0x9d3b8 0x9c3b8
GetLastError 0x0 0x1800713d8 0x9d3c0 0x9c3c0
LockResource 0x0 0x1800713e0 0x9d3c8 0x9c3c8
LoadResource 0x0 0x1800713e8 0x9d3d0 0x9c3d0
SizeofResource 0x0 0x1800713f0 0x9d3d8 0x9c3d8
FindResourceW 0x0 0x1800713f8 0x9d3e0 0x9c3e0
FindResourceExW 0x0 0x180071400 0x9d3e8 0x9c3e8
GDI32.dll (10)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
BitBlt 0x0 0x180071068 0x9d050 0x9c050
CreateCompatibleBitmap 0x0 0x180071070 0x9d058 0x9c058
CreateCompatibleDC 0x0 0x180071078 0x9d060 0x9c060
CreateSolidBrush 0x0 0x180071080 0x9d068 0x9c068
DeleteDC 0x0 0x180071088 0x9d070 0x9c070
DeleteObject 0x0 0x180071090 0x9d078 0x9c078
GetDeviceCaps 0x0 0x180071098 0x9d080 0x9c080
GetStockObject 0x0 0x1800710a0 0x9d088 0x9c088
SelectObject 0x0 0x1800710a8 0x9d090 0x9c090
GetObjectW 0x0 0x1800710b0 0x9d098 0x9c098
Secur32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset
GetUserNameExW 0x0 0x180071490 0x9d478 0x9c478
Exports (40)
»
Api name EAT Address Ordinal
ADALAcquireToken 0x180034230 0x1
ADALCreateAuthenticationContext 0x180033e80 0x2
ADALCreateAuthenticationContextNoUI 0x180033f30 0x3
ADALDeleteRequest 0x180034580 0x4
ADALDeserializeAuthenticationContext 0x180033fc0 0x5
ADALGetAccessToken 0x1800345e0 0x6
ADALGetAccessTokenExpirationTime 0x1800346c0 0x7
ADALGetAccountType 0x1800360a0 0x8
ADALGetClientSecret 0x180036340 0x9
ADALGetContext 0x180034550 0xa
ADALGetErrorCode 0x180034b50 0xb
ADALGetErrorDescription 0x180034ab0 0xc
ADALGetFamilyName 0x180034950 0xd
ADALGetGivenName 0x1800348a0 0xe
ADALGetOption 0x180035df0 0xf
ADALGetRefreshToken 0x180034bf0 0x10
ADALGetRequestStatus 0x1800345b0 0x11
ADALGetTenantId 0x180034a00 0x12
ADALGetUniqueName 0x1800347f0 0x13
ADALGetUserId 0x180034740 0x14
ADALReleaseAuthenticationContext 0x180034200 0x15
ADALSerializeAuthenticationContext 0x180033ff0 0x16
ADALSetAccountType 0x180035f60 0x17
ADALSetAdditionalHttpHeaders 0x180035940 0x18
ADALSetAdditionalQueryParams 0x1800358b0 0x19
ADALSetClientSecret 0x180036200 0x1a
ADALSetLogOptions 0x1800359b0 0x1b
ADALSetOption 0x180035ca0 0x1c
ADALSetRefreshToken 0x180034d20 0x1d
ADALSetSilentLogonOptions 0x180035a40 0x1e
ADALUICreateHostWindow 0x180035630 0x1f
ADALUIGetHostRequirements 0x180035090 0x20
ADALUIGetHostRequirementsEx 0x1800351b0 0x21
ADALUIGetWebBrowser 0x180035830 0x22
ADALUIUseWebBrowser 0x180034da0 0x23
ADALUseClientCredential 0x180035020 0x24
ADALUseEndpoint 0x180035b50 0x25
ADALUseSAMLAssertion 0x180034f90 0x26
ADALUseUsernamePassword 0x180034e80 0x27
ADALUseWindowsAuthentication 0x180034f10 0x28
Icons (6)
»
Digital Signatures (2)
»
Signature Properties
LegalCopyright © Microsoft Corporation. All rights reserved.
InternalName ADAL
FileVersion 1.0.1867.0
CompanyName Microsoft Corporation
ProductName Microsoft® ADAL
ProductVersion 1.0.1867.0
FileDescription Windows Azure Active Directory Authentication Library
OriginalFilename adal
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-03-27 20:08
Valid to 2014-06-27 20:08
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 37 FE BD ED DC D2 54 01 6B 00 00 00 00 00 37
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\adal.dll, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\adal.dll (Modified File)
c:\program files\common files\microsoft shared\office15\adal.dll.[sepsis@protonmail.com].sepsis (Created File)
Size 852.84 KB
Hash Values MD5: e71420c3b7525406739bcf2b4acf5da1
SHA1: 27c0469956357ac7d4e8d0bf7441dfa281d7a379
SHA256: 759e788d30f00e4ab556b864b337813811eaa0619bd074e81a8d94b658f41aa4
Actions
c:\program files\common files\microsoft shared\office15\cmigrate.exe
»
File Properties
Names c:\program files\common files\microsoft shared\office15\cmigrate.exe (Modified File)
Size 6.78 MB
Hash Values MD5: 86abd59e7c4cf6bfa97651417625dc1d
SHA1: 615b8469602b5353538f0c3dfeb7e36c415fe634
SHA256: e92c7a19b85d4515c9b0257cd7d45eca2ee10449ad01cae25831fb46c4828d86
Actions
PE Information
»
Information Value
Image Base 0x140000000
Entry Point 0x1403490d4
Size Of Code 0x42c400
Size Of Initialized Data 0x29ba00
Size Of Uninitialized Data 0x0
Format x64
Type Executable
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:13:52
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x140001000 0x42c3c8 0x42c400 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ Unknown
.rdata 0x14042e000 0x20c004 0x20c200 0x42c800 CNT_INITIALIZED_DATA, MEM_READ Unknown
.data 0x14063b000 0x46db8 0x45c00 0x638a00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 6.71
.pdata 0x140682000 0x3750c 0x37600 0x67e600 CNT_INITIALIZED_DATA, MEM_READ 6.36
.rsrc 0x1406ba000 0x498 0x600 0x6b5c00 CNT_INITIALIZED_DATA, MEM_READ 2.7
.reloc 0x1406bb000 0x10cf0 0x10e00 0x6b6200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 5.47
Digital Signatures (2)
»
Signature Properties
Signature verification True
Certificate: Microsoft Time-Stamp Service
»
Certificate Properties
Issued by Microsoft Time-Stamp PCA
Valid from 2013-11-11 22:11
Valid to 2015-02-11 22:11
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 4C A1 E8 4D CC B4 74 7B 3B 00 00 00 00 00 4C
Issuer Certificate: Microsoft Time-Stamp PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2007-04-03 12:53
Valid to 2021-04-03 13:03
Algorithm SHA-1 with RSA Encryption
Serial number 61 16 68 34 00 00 00 00 00 1C
Certificate: Microsoft Corporation
»
Certificate Properties
Issued by Microsoft Code Signing PCA
Valid from 2013-01-24 22:33
Valid to 2014-04-24 22:33
Algorithm SHA-1 with RSA Encryption
Serial number 33 00 00 00 B0 11 AF 0A 8B D0 3B 9F DD 00 01 00 00 00 B0
Issuer Certificate: Microsoft Code Signing PCA
»
Certificate Properties
Issued by Microsoft Root Certificate Authority
Valid from 2010-08-31 22:19
Valid to 2020-08-31 22:29
Algorithm SHA-1 with RSA Encryption
Serial number 61 33 26 1A 00 00 00 00 00 31
c:\program files\common files\microsoft shared\office15\cmigrate.exe, ...
»
File Properties
Names c:\program files\common files\microsoft shared\office15\cmigrate.exe (Modified File)
c:\program files\common files\microsoft shared\office15\cmigrate.exe.[sepsis@protonmail.com].sepsis (Created File)
Size 6.78 MB
Hash Values MD5: 9f725b0706fda1c639d4026b5bde2aa0
SHA1: 0cd8377d8a3d74a0a47111938f180aab4731fbc1
SHA256: e1299636ddaf703af48d75620110a84467a024e97886f034e82eabfcf45070e5
Actions
c:\program files\common files\microsoft shared\office15\csi.dll
»
File Properties
Names c:\program files\common files\microsoft shared\office15\csi.dll (Modified File)
Size 5.30 MB
Hash Values MD5: 0b148a75bbcef7dfd2e0dbf1d36c6c69
SHA1: a34e172145ec418af791a16bb9e589edb84cebe0
SHA256: 5f0b6860a34a25f30e93d4cbd6dcaa601bd6edd89347886627016c10d5f849a2
Actions
PE Information
»
Information Value
Image Base 0x180000000
Entry Point 0x18012ecd8
Size Of Code 0x3fdc00
Size Of Initialized Data 0x28a400
Size Of Uninitialized Data 0x0
Format x64
Type Dll
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Machine Type IMAGE_FILE_MACHINE_AMD64
Compile Timestamp 2013-12-17 22:25:21
Compiler/Packer Unknown
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x180001000 0x3fdb90 0x3fdc00 0x400 CNT_CODE, MEM_EXECUTE, MEM_READ Unknown
.rdata 0x1803ff000 0x1f1a78 0x1f1c00 0x3fe000 CNT_INITIALIZED_DATA, MEM_READ 4.76
.data 0x1805f1000 0x43bd8 0x43600 0x5efc00 CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE 0.0
.pdata 0x180635000 0x449dc 0x44a00 0x633200 CNT_INITIALIZED_DATA, MEM_READ 0.0
.rsrc 0x18067a000 0x488 0x600 0x677c00 CNT_INITIALIZED_DATA, MEM_READ 0.0
.reloc 0x18067b000 0xfa90 0xfc00 0x678200 CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ 0.0
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image