Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2015-Nov-18 01:27:26 |
Detected languages |
English - United States
|
CompanyName | BAE Systems |
FileDescription | JMPS - JMPS |
ProductName | JMPS-Framework |
FileVersion | 1.03.0005 |
ProductVersion | 1.03.0005 |
InternalName | JMPS |
OriginalFilename | JMPS.exe |
OLESelfRegister |
Info | Matching compiler(s): |
Microsoft Visual Basic v5.0 - v6.0
Microsoft Visual Basic v6.0 |
Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
Malicious | VirusTotal score: 9/67 (Scanned on 2018-08-16 23:33:27) |
MicroWorld-eScan:
Gen:Variant.Babar.1912
Arcabit: Trojan.Babar.D778 BitDefender: Gen:Variant.Babar.1912 Ad-Aware: Gen:Variant.Babar.1912 Emsisoft: Gen:Variant.Babar.1912 (B) F-Secure: Gen:Variant.Babar.1912 GData: Gen:Variant.Babar.1912 ALYac: Gen:Variant.Babar.1912 MAX: malware (ai score=81) |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xc0 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 4 |
TimeDateStamp | 2015-Nov-18 01:27:26 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 6.3 |
SizeOfCode | 0x6e000 |
SizeOfInitializedData | 0x13000 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00005904 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x6f000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x1000 |
OperatingSystemVersion | 4.0 |
ImageVersion | 1.3 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x82000 |
SizeOfHeaders | 0x1000 |
Checksum | 0x8a75d |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
MSVBVM60.DLL |
EVENT_SINK_GetIDsOfNames
__vbaVarTstGt __vbaVarSub _CIcos _adj_fptan __vbaStrI4 __vbaVarMove __vbaVarVargNofree __vbaFreeVar __vbaAryMove __vbaLateIdCall __vbaLenBstr __vbaStrVarMove __vbaFreeVarList _adj_fdiv_m64 #698 EVENT_SINK_Invoke __vbaNextEachVar __vbaFreeObjList __vbaStrErrVarCopy _adj_fprem1 __vbaRecAnsiToUni #519 __vbaResume __vbaCopyBytes __vbaVarCmpNe __vbaStrCat __vbaWriteFile __vbaLsetFixstr #660 __vbaRecDestruct __vbaSetSystemError __vbaLenBstrB __vbaHresultCheckObj #556 #558 __vbaLenVar __vbaVargVarCopy _adj_fdiv_m32 __vbaAryVar #666 Zombie_GetTypeInfo __vbaAryDestruct EVENT_SINK2_Release __vbaVarForInit __vbaExitProc __vbaForEachCollObj #300 __vbaOnError __vbaObjSet #595 _adj_fdiv_m16i __vbaObjSetAddref _adj_fdivr_m16i #598 __vbaVarIndexLoad __vbaFpR4 #306 __vbaBoolVar #520 __vbaStrFixstr __vbaVarTstLt __vbaFpR8 __vbaBoolVarNull __vbaRefVarAry _CIsin __vbaErase #709 __vbaVarZero __vbaVargVarMove #632 #525 __vbaNextEachCollObj __vbaChkstk #526 __vbaFileClose EVENT_SINK_AddRef #528 __vbaGenerateBoundsError __vbaExitEachColl __vbaStrCmp __vbaVarTstEq __vbaAryConstruct2 #560 #561 __vbaPrintObj __vbaObjVar __vbaI2I4 #562 DllFunctionCall __vbaVarOr __vbaCastObjVar __vbaLbound _adj_fpatan __vbaAryRebase1Var __vbaR4Var __vbaFixstrConstruct __vbaLateIdCallLd Zombie_GetTypeInfoCount __vbaRedim __vbaRecUniToAnsi EVENT_SINK_Release __vbaNew #601 _CIsqrt __vbaVarAnd __vbaObjIs EVENT_SINK_QueryInterface __vbaExceptHandler __vbaInputFile __vbaStrToUnicode __vbaDateStr #606 _adj_fprem _adj_fdivr_m64 __vbaFailedFriend #716 __vbaFPException __vbaUbound __vbaVarCat __vbaCheckType __vbaDateVar __vbaI2Var #537 #644 __vbaExitEachVar _CIlog __vbaErrorOverflow __vbaFileOpen __vbaInStr __vbaNew2 #571 _adj_fdiv_m32i _adj_fdivr_m32i __vbaStrCopy EVENT_SINK2_AddRef __vbaI4Str __vbaVarNot __vbaFreeStrList __vbaDerefAry1 _adj_fdivr_m32 __vbaR8Var _adj_fdiv_r #685 #100 __vbaVarTstNe __vbaI4Var __vbaVarCmpEq __vbaAryLock __vbaVarAdd __vbaLateMemCall __vbaStrToAnsi __vbaVarDup __vbaFpI2 __vbaCheckTypeVar __vbaUnkVar __vbaFpI4 #616 __vbaVarCopy __vbaVarSetObjAddref __vbaLateMemCallLd __vbaRecDestructAnsi #617 _CIatan __vbaI2ErrVar __vbaAryCopy #618 __vbaStrMove __vbaCastObj __vbaStrVarCopy __vbaForEachVar #619 _allmul __vbaLateIdSt _CItan #546 __vbaAryUnlock __vbaVarForNext _CIexp #656 __vbaFreeStr __vbaFreeObj |
---|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 1.3.0.5 |
ProductVersion | 1.3.0.5 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | English - United States |
CompanyName | BAE Systems |
FileDescription | JMPS - JMPS |
ProductName | JMPS-Framework |
FileVersion (#2) | 1.03.0005 |
ProductVersion (#2) | 1.03.0005 |
InternalName | JMPS |
OriginalFilename | JMPS.exe |
OLESelfRegister |
Resource LangID | English - United States |
---|