0647122beb8b82de726944d16b000e19

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2014-Sep-17 04:50:51
Detected languages English - United States
ProductVersion 1,0,2,0
ProductName OfflineBay
LegalCopyright Copyright (c) 2018
SpecialBuild 1, 0, 2, 0
PrivateBuild
OriginalFilename
FileVersion 1,0,2,0
FileDescription Offline torrent seach for thePirateBay
LegalTrademarks TechTac
InternalName 1, 0, 2, 0
CompanyName TechTac
Comments

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++
Microsoft Visual C++ v6.0
Microsoft Visual C++ v5.0/v6.0 (MFC)
Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA256
Suspicious The PE is possibly packed. Unusual section name found: .SHMMESS
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Can access the registry:
  • RegQueryValueExA
  • RegCreateKeyExA
  • RegCloseKey
  • RegSetValueExA
  • RegDeleteValueA
  • RegOpenKeyExA
Possibly launches other programs:
  • CreateProcessA
Functions related to the privilege level:
  • OpenProcessToken
Enumerates local disk drives:
  • GetDriveTypeA
Manipulates other processes:
  • OpenProcess
Can take screenshots:
  • BitBlt
  • CreateCompatibleDC
Suspicious The PE is possibly a dropper. Resource 128 is possibly compressed or encrypted.
Resources amount for 95.4902% of the executable.
Suspicious The file contains overlay data. 6754 bytes of data starting at offset 0x662000.
The overlay data has an entropy of 7.75397 and is possibly compressed or encrypted.
Suspicious VirusTotal score: 2/73 (Scanned on 2019-12-25 11:07:29) Trapmine: malicious.high.ml.score
VBA32: BScope.Adware.Presenoker

Hashes

MD5 0647122beb8b82de726944d16b000e19
SHA1 3a715c2f036ea901c197a1c8c998e5ab0c456c16
SHA256 cc95c3074a58c643334aa68bbe165dfb9686950e07ab763d62d9212f2fd28b7c
SHA3 d50618d6c3baab8d0d4199d96bdd3f55c54ab9c05d980ed542fca598f4f1f4cd
SSDeep 98304:B43y8zgw/A/q4azBfDy+j6D0EXxh81K7S/sSKfySfgIiFrSNWHgMW0/4ab8ikcza:BYDxR8K6D5XP81KG/XK1ipAMW0HMP
Imports Hash 1bab463046d72d07064760e4ec7da612

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2014-Sep-17 04:50:51
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 6.0
SizeOfCode 0x37000
SizeOfInitializedData 0x12000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00017FEB (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x38000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x664000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 b8eacada1a3fbf5ce00f35251b8caa91
SHA1 d56c768a898b5db4c81b3b226de8c2fab1314b49
SHA256 f5434d7c190495786f57ae0b0c48740dc155d012dfe18a6952a3704d0d7fe9f8
SHA3 16293d363c17e449882936b90df4339c9cc8ac76304ee466a505ffae17aed7c0
VirtualSize 0x36ce2
VirtualAddress 0x1000
SizeOfRawData 0x37000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.63008

.rdata

MD5 c425b975fb341b677f3470560ee4a5f4
SHA1 7ef143c1bb9b2496cb6e38e39de16c35f36cb0b2
SHA256 5eb94b7323a02357ea65eb4507cc3870b061601fc8504bc79d98170de564da5b
SHA3 ff3ee7e6d59e57351de5ac431546cca138206a308fb6dacadeb89af773ca2d75
VirtualSize 0x8eb1
VirtualAddress 0x38000
SizeOfRawData 0x9000
PointerToRawData 0x38000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.86607

.data

MD5 7c1e350cfb123c148e03a21a978e6fae
SHA1 8e5fd4613ac9c5d0b5b4107c4570b4977fb24099
SHA256 fdc56135785916f4b047000dd22bcd9f5c8bb62a0baa0bae9dfd92da442bfeaa
SHA3 7559302b3ed8ddc8c1556f5f5d4edcb001d6cc2934804312473b46bdeb3ede41
VirtualSize 0x65e8
VirtualAddress 0x41000
SizeOfRawData 0x5000
PointerToRawData 0x41000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.71031

.SHMMESS

MD5 620f0b67a91f7f74151bc5be745b7110
SHA1 1ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256 ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA3 a99f9ed58079237f7f0275887f0c03a0c9d7d8de4443842297fceea67e423563
VirtualSize 0xc00
VirtualAddress 0x48000
SizeOfRawData 0x1000
PointerToRawData 0x46000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
IMAGE_SCN_MEM_WRITE
Entropy 0

.rsrc

MD5 6c51bb1bc6f7b63e35c1503a2ecc6219
SHA1 c9a42c2e7ef7b60c57be46681a554ac956210d7a
SHA256 3c1a83e24deb16006c55ba7542f2a50228c05e4974d54507ebd1160ae973641c
SHA3 9d6afebc887ea8517f44f347b84f91f2dd9905875840491ecd75ff709f88cd44
VirtualSize 0x61a070
VirtualAddress 0x49000
SizeOfRawData 0x61b000
PointerToRawData 0x47000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.99972

Imports

KERNEL32.dll CreateMutexA
GetFullPathNameA
SetCurrentDirectoryA
GetModuleFileNameA
lstrlenA
CloseHandle
GetExitCodeThread
ReadFile
GetFileSize
CreateFileA
GetCurrentDirectoryA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetThreadPriority
GetCurrentThread
SetEvent
Sleep
CreateEventA
GetVersionExA
GetCurrentProcess
SetStdHandle
SetFilePointer
GetStdHandle
GetExitCodeProcess
OpenProcess
DuplicateHandle
WaitForMultipleObjects
PulseEvent
GetCommandLineA
GetVersion
ExitProcess
HeapFree
RtlUnwind
HeapReAlloc
HeapAlloc
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
SetConsoleCtrlHandler
GetTimeZoneInformation
GetSystemTime
GetLocalTime
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
RaiseException
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ResumeThread
EnterCriticalSection
UnhandledExceptionFilter
WaitForSingleObject
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
TlsAlloc
SetLastError
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapSize
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetUnhandledExceptionFilter
CreatePipe
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
GetLocaleInfoW
GetFileAttributesA
CreateProcessA
SetEnvironmentVariableW
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetCurrentProcessId
MoveFileA
DeleteFileA
SetVolumeLabelA
GetDriveTypeA
SetFileAttributesA
GetDiskFreeSpaceA
ReleaseMutex
GetLastError
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
FormatMessageA
LocalFree
SetErrorMode
LoadLibraryA
GetProcAddress
FreeEnvironmentStringsA
FreeLibrary
LeaveCriticalSection
DeleteCriticalSection
GetFileType
InitializeCriticalSection
SetEndOfFile
USER32.dll KillTimer
SetTimer
GetClassInfoA
LoadCursorA
RegisterClassA
GetSystemMetrics
CreateWindowExA
ShowWindow
UpdateWindow
GetClientRect
BeginPaint
EndPaint
PostQuitMessage
PostMessageA
DefWindowProcA
GetMessageA
TranslateMessage
DispatchMessageA
LoadBitmapA
MessageBoxA
GDI32.dll BitBlt
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
ADVAPI32.dll RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
GetTokenInformation
OpenProcessToken
RegOpenKeyExA
COMCTL32.dll InitCommonControlsEx

Delayed Imports

_Java_com_regexlab_j2e_Handler_loadResourceData@12

Ordinal 1
Address 0x2700

_Java_com_regexlab_j2e_Instances_flush@8

Ordinal 2
Address 0x17030

_Java_com_regexlab_j2e_Instances_getCurrentInstance@8

Ordinal 3
Address 0x16de0

_Java_com_regexlab_j2e_Instances_getFirstInstance@8

Ordinal 4
Address 0x16db0

_Java_com_regexlab_j2e_Instances_getInstances@8

Ordinal 5
Address 0x16e10

_Java_com_regexlab_j2e_Instances_sendObject@16

Ordinal 6
Address 0x16f20

_Java_com_regexlab_j2e_Instances_setReceiver@12

Ordinal 7
Address 0x17070

_Java_com_regexlab_j2e_Jar2ExeClassLoader_defineClass@12

Ordinal 8
Address 0x14b0

_Java_com_regexlab_j2e_Jar2ExeClassLoader_findClass@12

Ordinal 9
Address 0x10c0

_Java_com_regexlab_j2e_Jar2ExeClassLoader_findResource@12

Ordinal 10
Address 0x21d0

_Java_com_regexlab_j2e_Jar2ExeClassLoader_findResources@12

Ordinal 11
Address 0x2d30

_Java_com_regexlab_j2e_SplashScreen_nativeAutoClose@12

Ordinal 12
Address 0x15300

_Java_com_regexlab_j2e_SplashScreen_nativeClose@8

Ordinal 13
Address 0x15320

_Java_com_regexlab_j2e_SplashScreen_nativeGetSplashScreen@8

Ordinal 14
Address 0x152a0

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.39487
MD5 bfa959188fcf316487097b229effb772
SHA1 bbd0dd5d77a8cbabd3fc21a142532dd0e2c0899c
SHA256 7d716a2e5ea5cf51df68142bde2874dc4509e6d2aae7d708dfeba7cbf5469334
SHA3 b9461a09fa77b9f538a4f95e396401e2b01f3ea88aa3f072c6446904ec3799c4

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.38695
MD5 3d1f31b29a9b7c3dae47b455afeb0cbe
SHA1 9f04c339ae5cd5d846505649a4fd61f3e69c1ad6
SHA256 95b55c9484d83ece8cc2dd801cc9801c94b86b4eba734945b8a8409c2110cdb5
SHA3 868dd90a8b742a4ffaddde36e5446aca1d2bf90637699ee041889c6b564da8ba

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.31784
MD5 62c0d295ccbb6e0d85533197783530cc
SHA1 acb769cbe733b457fa45bffe4b9488ba38b575bc
SHA256 f54d69d7e491133a30f3f6a2eeb75cd48b1a1b9b10c03624603762122869f216
SHA3 7314373b97a0539e2f61b60bdefc87c61eb25f052672c2fd30faf95c0fb5aef4

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.03937
MD5 bf9a86b93bbf1f0d5f2658bc7d962d5d
SHA1 2b9f1f4d4559bb8e038797ec140e07218f2b82e5
SHA256 62f399f1c8e694565b671320419aa7483f764b8f683947121bbf77f5e3f96138
SHA3 b0e0b33fc340a916dcab53450a86a11381084d7826f712f3fcdc141e841ae8b7

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xb733
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.98231
Detected Filetype PNG graphic file
MD5 1a4c415a2a6101941681deaa9be0effa
SHA1 078268eef9a771c6c5e1d400fd8a13c327a198d4
SHA256 af72565680a093e3830847570e5523b096fe28fcc67c016358fb2135a8ec6993
SHA3 372695543de81c401f7883dc050c17b25fd0da08145a68d87e62847f0e54cb7d

1 (#2)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x502
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2343
MD5 57ab99465e1b801bb7f3b986c837d920
SHA1 112d80b9eba878595528f9e74e80f26f23be2dbe
SHA256 0f9c55cbddceedc7d8782bdc20d8a4bc45f9b3c71ac36b62d643e3c39f9f2319
SHA3 ac53a383722e3c9366e036cc7d679eef0a0e567d68716441a053207253b921ea

128

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x6099e3
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.99997
MD5 4c8568613845c183fcc27c3fb7ab8d2c
SHA1 cc63fc9c20ab5556833e0dc77339b20cb8f5075e
SHA256 ead2e0d16ddd2cd1703d051380d77965924d959aafbb476d0ef8a6ee8e3beca1
SHA3 ca08c30cdb08a0b421f2354b2e542840f9f62ea71e25e4f514b8c77568e2df68

1 (#3)

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.64638
Detected Filetype Icon file
MD5 74a4dde50dfec19f2b537e22c31928b3
SHA1 d0a67aaa12104b46375109be1a281a308802f253
SHA256 4fb33086dc9cfd2cfde1545bb051a91df8060b81a80db0baca5e246241d956b4
SHA3 0f52d20571138f7e6a38798d736e63fdaddd9c3b86b8b03078aa2680b99b917f

1 (#4)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x380
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.25429
MD5 96252c6a80f504d4bb45f99841e60065
SHA1 6fdd3775abd9ef82f9302378a9b07900821c4888
SHA256 33cc90fbabd228cc721f7cf597a28e7f23156f19077f36bd69f22d53186bbb5f
SHA3 42280e069b532564d2f3c175adc4e606893bd1bbd11dbd4d4d17e99c4cd95bea

String Table contents

Java Runtime Environment not found.
Java Runtime Environment not valid.
Java Virtual Machine initialize failed.
Java Virtual Machine starts failed.
Can not get the virtual machine version.
Java virtual machine version %s is too low, require %s or higher.
The main startup class could not be found.
The main startup class is not valid, main method missing.
The exe can not be modified after it generated.
Error
This program is generated by unregistered Jar2Exe and it has expired to run for DEMO use.
Java virtual machine version %s is too high, version between %s and %s is required.
There is already an instance of this program running.

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.2.0
ProductVersion 1.0.2.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language UNKNOWN
ProductVersion (#2) 1,0,2,0
ProductName OfflineBay
LegalCopyright Copyright (c) 2018
SpecialBuild 1, 0, 2, 0
PrivateBuild
OriginalFilename
FileVersion (#2) 1,0,2,0
FileDescription Offline torrent seach for thePirateBay
LegalTrademarks TechTac
InternalName 1, 0, 2, 0
CompanyName TechTac
Comments
Resource LangID English - United States

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0xbd575291
Unmarked objects 0
Unmarked objects (#2) 3
19 (8034) 9
Total imports 167
12 (7291) 6
14 (7299) 23
C++ objects (8047) 1
C objects (VS98 SP6 build 8804) 160
C++ objects (VS98 SP6 build 8804) 46
Resource objects (VS98 SP6 cvtres build 1736) 1
Linker (VC++ 6.0 SP5 imp/exp build 8447) 1

Errors

<-- -->