| File name: | xtool.exe |
| Full analysis: | https://app.any.run/tasks/21b35c1f-ea9e-44dc-a76c-44c762b2f6ac |
| Verdict: | No threats detected |
| Analysis date: | November 08, 2018, 20:12:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | B0EF963BFC53B1EE22805FA28DDC9929 |
| SHA1: | 6FAE171A94D01101229D9DD6B53385AE9DAE11BB |
| SHA256: | 17DBBEA161EC11E96D7EE9FCD63ADA7716A2D27E5C0D8B8CCE5F6DE6B0C94CA9 |
| SSDEEP: | 24576:ZzFKpFowmmm1g70xnVPn0ATcoaS/licvj8XKp9w+xNLj4S5zlmXJuE1dLB:Z3Fn0ATcoamsc78B2jMXJuE1dLB |
| .exe | | | Win32 EXE PECompact compressed (generic) (79.7) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (8.6) |
| .exe | | | Win16/32 Executable Delphi generic (3.9) |
| .exe | | | Generic Win/DOS Executable (3.8) |
| .exe | | | DOS Executable Generic (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:05:31 22:58:54+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 1036800 |
| InitializedDataSize: | 1068544 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xfdeb0 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows command line |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_CUI |
| Compilation Date: | 31-May-2018 20:58:54 |
| Detected languages: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0050 |
| Pages in file: | 0x0002 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x000F |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x001A |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000100 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 11 |
| Time date stamp: | 31-May-2018 20:58:54 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000FBC38 | 0x000FBE00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.48883 |
.itext | 0x000FD000 | 0x00001288 | 0x00001400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.0752 |
.data | 0x000FF000 | 0x0001E3F8 | 0x0001E400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.83618 |
.bss | 0x0011E000 | 0x0000601C | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00125000 | 0x0000154E | 0x00001600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.87902 |
.didata | 0x00127000 | 0x00000216 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.1992 |
.edata | 0x00128000 | 0x00000097 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.84252 |
.tls | 0x00129000 | 0x00000020 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0012A000 | 0x0000005C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.364 |
.reloc | 0x0012B000 | 0x00016B50 | 0x00016C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.71658 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
4083 | 2.99786 | 340 | UNKNOWN | UNKNOWN | RT_STRING |
4084 | 3.33735 | 972 | UNKNOWN | UNKNOWN | RT_STRING |
4085 | 3.50945 | 916 | UNKNOWN | UNKNOWN | RT_STRING |
4086 | 3.24511 | 1172 | UNKNOWN | UNKNOWN | RT_STRING |
4087 | 3.21792 | 1168 | UNKNOWN | UNKNOWN | RT_STRING |
4088 | 3.33094 | 884 | UNKNOWN | UNKNOWN | RT_STRING |
4089 | 3.33286 | 1104 | UNKNOWN | UNKNOWN | RT_STRING |
4090 | 3.32762 | 380 | UNKNOWN | UNKNOWN | RT_STRING |
4091 | 3.34698 | 204 | UNKNOWN | UNKNOWN | RT_STRING |
4092 | 3.38692 | 464 | UNKNOWN | UNKNOWN | RT_STRING |
advapi32.dll |
kernel32.dll |
kernel32.dll (delay-loaded) |
msvcrt.dll |
netapi32.dll |
oleaut32.dll |
user32.dll |
version.dll |
Title | Ordinal | Address |
|---|---|---|
dbkFCallWrapperAddr | 1 | 0x0012162C |
__dbk_fcall_wrapper | 2 | 0x0001128C |
TMethodImplementationIntercept | 3 | 0x0005F8E0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 684 | "C:\Users\admin\AppData\Local\Temp\xtool.exe" | C:\Users\admin\AppData\Local\Temp\xtool.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||