Automated Malware Analysis Report for Zphoenixminer.Exe

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Zphoenixminer.Exe ID: 333796 Sample Name: zphoenixminer.exe Cookbook: default.jbs Time: 23:37:39 Date: 23/12/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report zphoenixminer.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Memory Dumps 4 Unpacked PEs 5 Sigma Overview 6 Signature Overview 6 AV Detection: 6 Networking: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 E-Banking Fraud: 7 Spam, unwanted Advertisements and Ransom Demands: 7 System Summary: 7 Persistence and Installation Behavior: 7 Hooking and other Techniques for Hiding and Protection: 7 HIPS / PFW / Operating System Protection Evasion: 7 Stealing of Sensitive Information: 7 Remote Access Functionality: 7 Mitre Att&ck Matrix 7 Behavior Graph 8 Screenshots 9 Thumbnails 9 Antivirus, Machine Learning and Genetic Malware Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 10 Domains 10 URLs 10 Domains and IPs 10 Contacted Domains 10 URLs from Memory and Binaries 10 Contacted IPs 12 Public 12 General Information 12 Simulations 13 Behavior and APIs 13 Joe Sandbox View / Context 13 IPs 13 Domains 13 ASN 14 JA3 Fingerprints 14 Dropped Files 14 Created / dropped Files 14 Static File Info 19 General 20 File Icon 20 Static PE Info 20 General 20 Entrypoint Preview 20 Copyright null 2020 Page 2 of 34 Data Directories 21 Sections 22 Resources 22 Imports 24 Exports 24 Version Infos 25 Possible Origin 25 Network Behavior 25 TCP Packets 25 Code Manipulations 26 Statistics 26 Behavior 26 System Behavior 26 Analysis Process: zphoenixminer.exe PID: 5740 Parent PID: 5532 26 General 26 Analysis Process: nslookup.exe PID: 240 Parent PID: 5740 27 General 27 File Activities 27 File Read 27 Analysis Process: conhost.exe PID: 1000 Parent PID: 240 27 General 27 Analysis Process: cmd.exe PID: 4196 Parent PID: 240 28 General 28 Analysis Process: cmd.exe PID: 1740 Parent PID: 240 28 General 28 Analysis Process: cmd.exe PID: 404 Parent PID: 240 28 General 28 Analysis Process: cmd.exe PID: 3492 Parent PID: 240 29 General 29 Analysis Process: cmd.exe PID: 620 Parent PID: 240 29 General 29 Analysis Process: notepad.exe PID: 4260 Parent PID: 240 29 General 29 File Activities 30 File Created 30 File Written 31 Registry Activities 33 Key Created 33 Key Value Created 33 Disassembly 33 Code Analysis 33 Copyright null 2020 Page 3 of 34 Analysis Report zphoenixminer.exe Overview General Information Detection Signatures Classification Sample zphoenixminer.exe Name: DDeettteeccttteedd RReemccooss RRAATT Analysis ID: 333796 MDeaatlllieiiccciiiotoeuudss Rssaeampcpllolees d dReeAttteeTccttteedd (((ttthhrrroouugghh … MD5: fb0b58548f18718… SMSyyassltittceeimou pspr rrosoaccemesspssl e cc odonenntneeeccctttetssd ttt oo(t hnnreeotttwuwgoohrrr… SHA1: Ransomware 03e68d10cbe6dfc… System process connects to networ YSYayarsrraate ddmee tttpeerccottteceedds RRs eecmonccnooess c RRtsAA tTTo networ Miner Spreading SHA256: 891c233cff0f39e… AYAlalllooracca adtteestse mcteemd oRorreyym iinnc offoosr reReiigAgnTn pprroocceessss mmaallliiiccciiioouusss AAllllllooccaattteess meemoorrryy iiinn fffoorrreeiiiggnn pprrroocceessss… malicious Tags: exe RemcosRAT Evader Phishing sssuusssppiiiccciiioouusss CACololonnctttaaiitinness fffmuunneccmtttiiioonrnyaa lilliniittty yf o tttoroe ccigaanpp tttpuurrrroeec aeansndsd… suspicious Most interesting Screenshot: cccllleeaann clean CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo iicinnajjjepectcuttt rcceoo dadene d … Exploiter Banker CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrirneejggeiiicssttt eecrrro ada e llloo … Spyware Trojan / Bot Remcos CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo srsettteegaaislll t CeCrhh rarroo lmo… Adware Score: 100 CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ssttteeaalll FCFiiihrrreerofffoom… Range: 0 - 100 CCoonntttaaiiinnss fffuunncctttiiioonnaalllttitytyy t ttotoo c cshhtaeananglg Fee i rttthehefeo … Whitelisted: false DCDrroroonpptsas i enexsxe efcucunuttctaatbibolllene a tttoloty aa t occ oocmhamnoognne ttthhiiierrrdd … Confidence: 100% HDHiirijjjoaapccksks se ttxthheeec uccotoannbtttrlrreoo lllt offflllo oaww c iioinnm aamnnoottnthh etehrrr i prpdrrr… MHiaajappcssk asa DtDhLeLL Lc oorrnr mtroeelm floowrrryy i anar rreaeana o iiintnhtttoeo r a apnnr… Startup OMvaveeprrrsww arrrii itttDeesLs L cc ooddr eem wweiimittthho uruynn cacoorennadd iiitittniiiootnona aalll n jjj… UOUsvseesrsw nnrssitllleoosoo kkcuuoppd...ee xxweei t thttoo u qqnuuceeorrrnyy d dditooiomnaaiiilnn jss System is w10x64 WUsrrrieiittteses sn ttstoolo fffookrrreueiipigg.nne xmee etmo oqorruryye rrreyeg gdiiioonmnssains zphoenixminer.exe (PID: 5740 cmdline: 'C:\Users\user\Desktop\zphoenixminer.exe' MD5: FB0B58548F18718F51BB0A189064B9DA) AWAbbrnintoeorsrrm toaa lll f hohiriigeghihg CnC PPmUUe mUUsosaraygg ereegions nslookup.exe (PID: 240 cmdline: C:\Windows\system32\nslookup.exe MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForcAAenbnVttnti1iivov iiMirrrmuuDssa 5 olo :hrr r E iMgAhaa7 cCc7hh7PiiinDnUeeE U LELeseAaa7grrr8nne2iiinnEgg8 dBdee4tttDeec7c…C7C33BBF8A4496) cmd.exe (PID: 4196 cmdline: C:\Windows\system32\cmd.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) CAChnheteivccikkrsus s iiif ff o ttthrh eMe cacuucrrhrrrreiennnettt Lpperrrooaccrenesisnssg i iisds ebbteeiiicnn… cmd.exe (PID: 1740 cmdline: C:\Windows\system32\cmd.exe MD5: F3BDBE3BB6CCFh7he3ec4ckEkss3 i5iff 7 tth2he3e 5 ccFuu4rrrrDeen5nt8t p9pr8roo5cc8ee2ssDss) iiss bbeeiinn… cmd.exe (PID: 404 cmdline: C:\Windows\system32\cmd.exe MD5: F3BDBE3BB6FCC7oh3one4nttcEtaak3iiinsn5 ssi7f f2fftuuh3nne5cc Ftcttii4iouoDnrnra5eall8nliiittt9tyy 8 p fff5oroo8rrr c 2rrreeDsaa)sdd i dsd aabttteaai nfff… cmd.exe (PID: 3492 cmdline: C:\Windows\system32\cmd.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tftoo r c craaelllal ndna adttiaivvteea ff cmd.exe (PID: 620 cmdline: C:\Windows\system32\cmd.exe MD5: F3BDBE3BB6FCC7o3on4nttEtaa3iiinn5ss7 f2ffuu3nn5ccFtttii4iooDnna5all8liiittt9yy8 ttt5oo8 cc2aaDllllll ) nnaatttiiivvee fff… notepad.exe (PID: 4260 cmdline: C:\Windows\system32\notepad.exe MD5: D693FCC1o3onFnttEtaa3iiinnAssA fffu2un0nc1ct0ttiiioBonn8aa5llli4iitttyCy t4ttooC dcd6oao0wlw6l n7nl1allooBtaiav8ddeE aaf2…) cleanup CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ddyoynwnaanmloiiicacadal llllalyy… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo edenynunumameerirrcaaatttelel y … CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo eennuumeerrraatttee … Malware Configuration CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo llelaanuuunnmcchhe raa tcceoo … CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo qlqauuueenrrrcyyh CC aPP cUUo … No configs have been found CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo qquueerrryy llCloocPcaaUllle e… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrqreeuaaeddr y ttth hloeec PPaElEeBB CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrreeaadd ttthhee cPcllliEii…B Yara Overview CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo srsehhauudtttdd toohwwen nc l///i … CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ssiihimuutudlllaaotttwee n m /… Memory Dumps CCrroreenaattatteeinss s aa f uDDniiirrcreetcicotttInIInnappliuutyttt otoobb jjsjeeicmcttt u (((oloafffttteen nm fffoo… CCrrreeaattteess aa pDprrrioroeccceetssInss p iiinun t s souubssjpepecentn d(doeefdtde mn ofoo… Source Rule Description Author Strings 00000010.00000002.701587054.000000000040 JoeSecurity_Remcos Yara detecCCterrrdeea attteess ffafiiilJl leepossre o ii incSnseseiisidcdseue ir nttithth yseeu ssyypssetttenemde ddi iirrmreecoc… 0000.00000040.00000001.sdmp Remcos RAT CCrrreeaattteess jjfjoiolbeb s fff iiililleness i d(((aaeuu tttthooess tttsaayrrrttst)))tem direc 00000010.00000002.701587054.000000000040 Remcos_1 Remcos Payload kevoreilly 0x16498:$name: Remcos 0000.00000040.00000001.sdmp DCDereettteaectcettteesd dj o TTbCC fPiPle oosrr r ( UaUuDDtPoPs tttrrraaarffftfff)iiicc oonn nnoo0nnx…16810:$name: Remcos 0x16d5c:$name: Remcos DDeettteeccttteedd pTpoCotttePen notttiiriaa Ulll ccDrrryPypp tttrooa fffufuicnn ccotttniiioo nno0nx16daf:$name: Remcos 0x15674:$time: %02i:%02i:%02i:%03i DDrrerootpeppcpteedd fffpiiillleoe t seseneeteinan l i iincn r cycopontnonn efeuccntttiiciootnino wnwiiittthh… DDrrooppppeedd ffiillee sseeeenn iinn ccoonnnneeccttiioonn wwii0tthhx…156fc:$time: %02i:%02i:%02i:%03i 0x16b60:$time: %02i:%02i:%02i:%03i DDrrrooppsps e PPdEE f ifflfiieilllee sseen in connection with 0x3074:$crypto: 0F B6 D0 8B 45 08 89 16 8D 34 07 8B EDExrxottteepnnsss PiiivvEee ufuilsseees oofff GeetttPPrrrooccAAddddrrreessss 0(((oo1… 03 C2 8B CB 99 F7 F9 8A 84 95 F8 FB FF FF 30 06 47 3B 7D ... FEFoxoutuennndds didvrrreoo puppspeed do PfP GEE e fffiitillPlee r wowchhAiiiccdhhd hrheaassss n n(oo… Found dropped PE file which has no Copyright null 2020 Page 4 of 34 Source Rule Description Author Strings 00000010.00000002.701587054.000000000040 REMCOS_RAT_variants unknown unknown 0x16680:$str_a1: C:\Windows\System32\cmd.exe 0000.00000040.00000001.sdmp 0x1669c:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ Policies\System /v EnableLUA /t REG_DWOR 0x1669c:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ Policies\System /v EnableLUA /t REG_DWOR 0x15d80:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login
Recommended publications
  • The GNU Linker
    The GNU linker ld (GNU Binutils) Version 2.37 Steve Chamberlain Ian Lance Taylor Red Hat Inc [email protected], [email protected] The GNU linker Edited by Jeffrey Osier ([email protected]) Copyright c 1991-2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Overview :::::::::::::::::::::::::::::::::::::::: 1 2 Invocation ::::::::::::::::::::::::::::::::::::::: 3 2.1 Command-line Options ::::::::::::::::::::::::::::::::::::::::: 3 2.1.1 Options Specific to i386 PE Targets :::::::::::::::::::::: 40 2.1.2 Options specific to C6X uClinux targets :::::::::::::::::: 47 2.1.3 Options specific to C-SKY targets :::::::::::::::::::::::: 48 2.1.4 Options specific to Motorola 68HC11 and 68HC12 targets :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 48 2.1.5 Options specific to Motorola 68K target :::::::::::::::::: 48 2.1.6 Options specific to MIPS targets ::::::::::::::::::::::::: 49 2.1.7 Options specific to PDP11 targets :::::::::::::::::::::::: 49 2.2 Environment Variables :::::::::::::::::::::::::::::::::::::::: 50 3 Linker Scripts:::::::::::::::::::::::::::::::::: 51 3.1 Basic Linker Script Concepts :::::::::::::::::::::::::::::::::: 51 3.2 Linker Script
    [Show full text]
  • The “Stabs” Debug Format
    The \stabs" debug format Julia Menapace, Jim Kingdon, David MacKenzie Cygnus Support Cygnus Support Revision TEXinfo 2017-08-23.19 Copyright c 1992{2021 Free Software Foundation, Inc. Contributed by Cygnus Support. Written by Julia Menapace, Jim Kingdon, and David MacKenzie. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Overview of Stabs ::::::::::::::::::::::::::::::: 1 1.1 Overview of Debugging Information Flow ::::::::::::::::::::::: 1 1.2 Overview of Stab Format ::::::::::::::::::::::::::::::::::::::: 1 1.3 The String Field :::::::::::::::::::::::::::::::::::::::::::::::: 2 1.4 A Simple Example in C Source ::::::::::::::::::::::::::::::::: 3 1.5 The Simple Example at the Assembly Level ::::::::::::::::::::: 4 2 Encoding the Structure of the Program ::::::: 7 2.1 Main Program :::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.2 Paths and Names of the Source Files :::::::::::::::::::::::::::: 7 2.3 Names of Include Files:::::::::::::::::::::::::::::::::::::::::: 8 2.4 Line Numbers :::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.5 Procedures ::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.6 Nested Procedures::::::::::::::::::::::::::::::::::::::::::::: 11 2.7 Block Structure
    [Show full text]
  • Using Ld the GNU Linker
    Using ld The GNU linker ld version 2 January 1994 Steve Chamberlain Cygnus Support Cygnus Support [email protected], [email protected] Using LD, the GNU linker Edited by Jeffrey Osier (jeff[email protected]) Copyright c 1991, 92, 93, 94, 95, 96, 97, 1998 Free Software Foundation, Inc. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another lan- guage, under the above conditions for modified versions. Chapter 1: Overview 1 1 Overview ld combines a number of object and archive files, relocates their data and ties up symbol references. Usually the last step in compiling a program is to run ld. ld accepts Linker Command Language files written in a superset of AT&T’s Link Editor Command Language syntax, to provide explicit and total control over the linking process. This version of ld uses the general purpose BFD libraries to operate on object files. This allows ld to read, combine, and write object files in many different formats—for example, COFF or a.out. Different formats may be linked together to produce any available kind of object file. See Chapter 5 [BFD], page 47, for more information. Aside from its flexibility, the gnu linker is more helpful than other linkers in providing diagnostic information.
    [Show full text]
  • Linker Script Guide Emprog
    Linker Script Guide Emprog Emprog ThunderBench™ Linker Script Guide Version 1.2 ©May 2013 Page | 1 Linker Script Guide Emprog 1 - Linker Script guide 2 -Arm Specific Options Page | 2 Linker Script Guide Emprog 1 The Linker Scripts Every link is controlled by a linker script. This script is written in the linker command language. The main purpose of the linker script is to describe how the sections in the input files should be mapped into the output file, and to control the memory layout of the output file. Most linker scripts do nothing more than this. However, when necessary, the linker script can also direct the linker to perform many other operations, using the commands described below. The linker always uses a linker script. If you do not supply one yourself, the linker will use a default script that is compiled into the linker executable. You can use the ‘--verbose’ command line option to display the default linker script. Certain command line options, such as ‘-r’ or ‘-N’, will affect the default linker script. You may supply your own linker script by using the ‘-T’ command line option. When you do this, your linker script will replace the default linker script. You may also use linker scripts implicitly by naming them as input files to the linker, as though they were files to be linked. 1.1 Basic Linker Script Concepts We need to define some basic concepts and vocabulary in order to describe the linker script language. The linker combines input files into a single output file. The output file and each input file are in a special data format known as an object file format.
    [Show full text]
  • Linkers and Loaders Do?
    Linkers & Loaders by John R. Levine Table of Contents 1 Table of Contents Chapter 0: Front Matter ........................................................ 1 Dedication .............................................................................................. 1 Introduction ............................................................................................ 1 Who is this book for? ......................................................................... 2 Chapter summaries ............................................................................. 3 The project ......................................................................................... 4 Acknowledgements ............................................................................ 5 Contact us ........................................................................................... 6 Chapter 1: Linking and Loading ........................................... 7 What do linkers and loaders do? ............................................................ 7 Address binding: a historical perspective .............................................. 7 Linking vs. loading .............................................................................. 10 Tw o-pass linking .............................................................................. 12 Object code libraries ........................................................................ 15 Relocation and code modification .................................................... 17 Compiler Drivers .................................................................................
    [Show full text]
  • Interaktívny Disassembler Prohlášení
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ ÚSTAV INFORMAČNÝCH SYSTÉMŮ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS INTERAKTÍVNY DISASSEMBLER BAKALÁŘSKÁ PRÁCE BACHELOR'S THESIS AUTOR PRÁCE Milan Mrva AUTHOR BRNO 2011 VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ ÚSTAV INFORMAČNÝCH SYSTÉMŮ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS INTERAKTIVNÍ ZPĚTNÝ ASSEMBLER INTERACTIVE DISASSEMBLER BAKALÁŘSKÁ PRÁCE BACHELOR'S THESIS AUTOR PRÁCE Milan Mrva AUTHOR VEDOUCÍ PRÁCE Ing. Jakub Křoustek SUPERVISOR BRNO 2011 Abstrakt V práci jsou popsané postupy a nástroje zpětného inženýrství v rámci softwaru. Uvedené jsou techniky ochrany před rozkladem či zkoumáním obsahu spustitelného souboru. Představené jsou příklady programů zabývajících se zpětným překladem. Dále se práce zaobírá architekturou procesoru s důrazem na mikroprocesory Intel a Motorola. Jsou ukázané rozdílné formáty spustitelných souborů. Byl implementovaný generický modulovatelný zpětný assembler.V tomto textu je představená jak jeho struktura, tak zásuvné moduly, které prezentují tři různé techniky disassemblovaní. Jeden z modulů používa vícevláknový parser, který je vlastním návrhem autora. Tyto přístupy jsou v závěru porovnané a je nastíněn další vývoj. Abstract This thesis describes procedures and tools of reverse engineering in terms of software development. There are introduces different techniques of protection against decomposition of executables. The work also mentions some programs used for decomposition analysis. Furthermore it contains information about architecture of processing units, with emphasis on microprocessors Intel and Motorola. Variety of executable formats is shown. Generic retargetable disassembler was implemented. There is a description of its structure and plugins. These plugins represents three algorithms used for disassembling a program.
    [Show full text]
  • Using As the Gnu Assembler
    Using as The gnu Assembler Version 2.14.90.0.7 The Free Software Foundation Inc. thanks The Nice Computer Company of Australia for loaning Dean Elsner to write the first (Vax) version of as for Project gnu. The proprietors, management and staff of TNCCA thank FSF for distracting the boss while they got some work done. Dean Elsner, Jay Fenlason & friends Using as Edited by Cygnus Support Copyright c 1991, 92, 93, 94, 95, 96, 97, 98, 99, 2000, 2001, 2002 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". Chapter 1: Overview 1 1 Overview This manual is a user guide to the gnu assembler as. Here is a brief summary of how to invoke as. For details, see Chapter 2 [Command-Line Options], page 15. as [-a[cdhlns][=file]] [-D][{defsym sym=val] [-f][{gstabs][{gstabs+] [{gdwarf2][{help] [-I dir][-J][-K][-L] [{listing-lhs-width=NUM][{listing-lhs-width2=NUM] [{listing-rhs-width=NUM][{listing-cont-lines=NUM] [{keep-locals][-o objfile][-R][{statistics][-v] [-version][{version][-W][{warn][{fatal-warnings] [-w][-x][-Z][{target-help][target-options] [{|files ...] Target Alpha options: [-mcpu] [-mdebug | -no-mdebug] [-relax][-g][-Gsize] [-F][-32addr] Target ARC options: [-marc[5|6|7|8]] [-EB|-EL] Target ARM
    [Show full text]
  • Net Yaroze for Linux Setting up GCC for Net Yaroze Development Under Linux 16 February 2000
    Net Yaroze For Linux Setting Up GCC For Net Yaroze Development Under Linux 16 February 2000 Christian Bauer Copyright c 1999, 2000 Christian Bauer Permission is granted to make and distribute verbatim copies of this manual provided the copy- right notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the condi- tions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. i Table of Contents Net Yaroze For Linux ............................ 1 1 Introduction.................................. 2 2 Downloading the necessary software ........... 3 3 Preparing for the installation .................. 4 4 Setting up binutils ............................ 6 4.1 Unpacking binutils .......................................... 6 4.2 Configuring binutils ......................................... 6 4.3 Compiling binutils ........................................... 6 4.4 Installing binutils............................................ 6 5 Setting up GCC .............................. 8 5.1 Unpacking GCC............................................. 8 5.2 Configuring GCC............................................ 8 5.3 Compiling GCC ............................................. 9 5.4 Installing GCC .............................................. 9 5.5 Final touches .............................................. 10 6 A little example ............................. 11 6.1 Setting up
    [Show full text]
  • Why Does My Program Not Link Or Not Execute Global Constructors
    Ns-3 Application Note Why Don’t Those #@(%!~& Libraries Work? Craig Dowell [email protected] Background Consider the following program int main(int argc, char **argv) { myprintf("Hello World\n"); } When you compile this program, the compiler determines that there is no function called myprintf in the compilation unit (the source file) and marks the function as an unresolved reference. When the executable is linked, the linker looks through its list of libraries looking for an implementation of the function myprintf. The linker handles providing an implementation in one of two ways depending on the kind of file providing the implementation. • If the implementation is found in a static library (e.g., libcore.a), the linker copies the implementation of myprintf into the executable. The linker must then recursively search for further unresolved references in the myprintf function and resolve them by (possibly) looking in other libraries. This continues until the executable contains all of the code required to execute myprintf (there are no unresolved references). • If the implementation of myprintf is found in a dynamic library (e.g., libcore.so), the linker adds a note to itself that the unresolved reference can be resolved by loading the dynamic library. The linker recursively searches for further unresolved references and continues until all references are resolved. What happens when you run the resulting program depends on the kind of library to which you linked. • If you linked to static libraries, your program is self-contained. It will be loaded into memory and executed, starting at a system-dependent entry point.
    [Show full text]
  • Gnu Assembler
    Using as The gnu Assembler (Sourcery G++ Lite 2010q1-188) Version 2.19.51 The Free Software Foundation Inc. thanks The Nice Computer Company of Australia for loaning Dean Elsner to write the first (Vax) version of as for Project gnu. The proprietors, management and staff of TNCCA thank FSF for distracting the boss while they gotsome work done. Dean Elsner, Jay Fenlason & friends Using as Edited by Cygnus Support Copyright c 1991, 92, 93, 94, 95, 96, 97, 98, 99, 2000, 2001, 2002, 2006, 2007, 2008, 2009 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Overview :::::::::::::::::::::::::::::::::::::::: 1 1.1 Structure of this Manual :::::::::::::::::::::::::::::::::::::: 14 1.2 The GNU Assembler :::::::::::::::::::::::::::::::::::::::::: 15 1.3 Object File Formats::::::::::::::::::::::::::::::::::::::::::: 15 1.4 Command Line ::::::::::::::::::::::::::::::::::::::::::::::: 15 1.5 Input Files :::::::::::::::::::::::::::::::::::::::::::::::::::: 16 1.6 Output (Object) File:::::::::::::::::::::::::::::::::::::::::: 16 1.7 Error and Warning Messages :::::::::::::::::::::::::::::::::: 16 2 Command-Line Options::::::::::::::::::::::: 19 2.1 Enable Listings: `-a[cdghlns]'
    [Show full text]
  • Gdb Internals a Guide to the Internals of the GNU Debugger
    gdb Internals A guide to the internals of the GNU debugger John Gilmore Cygnus Solutions Second Edition: Stan Shebs Cygnus Solutions Cygnus Solutions Revision TEXinfo 2007-09-03.05 Copyright c 1990-2013 Free Software Foundation, Inc. Contributed by Cygnus Solutions. Written by John Gilmore. Second Edition by Stan Shebs. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents Scope of this Document :::::::::::::::::::::::::::: 1 1 Summary :::::::::::::::::::::::::::::::::::::::: 1 1.1 Requirements :::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Contributors ::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 Overall Structure ::::::::::::::::::::::::::::::: 2 2.1 The Symbol Side ::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 The Target Side :::::::::::::::::::::::::::::::::::::::::::::::: 2 2.3 Configurations ::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.4 Source Tree Structure :::::::::::::::::::::::::::::::::::::::::: 3 3 Algorithms :::::::::::::::::::::::::::::::::::::: 4 3.1 Prologue Analysis :::::::::::::::::::::::::::::::::::::::::::::: 4 3.2 Breakpoint Handling ::::::::::::::::::::::::::::::::::::::::::: 6 3.3 Single Stepping ::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • The Gnu Binary Utilities (GNU Binutils) Version 2.37
    The gnu Binary Utilities (GNU Binutils) Version 2.37 July 2021 Roland H. Pesch Jeffrey M. Osier Cygnus Support Cygnus Support Texinfo 2019-09-20.22 Copyright c 1991-2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 ar ::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.1 Controlling ar on the Command Line ::::::::::::::::::::::::::: 2 1.2 Controlling ar with a Script :::::::::::::::::::::::::::::::::::: 6 2 ld ::::::::::::::::::::::::::::::::::::::::::::::::: 9 3 nm::::::::::::::::::::::::::::::::::::::::::::::: 10 4 objcopy ::::::::::::::::::::::::::::::::::::::::: 16 5 objdump :::::::::::::::::::::::::::::::::::::::: 32 6 ranlib:::::::::::::::::::::::::::::::::::::::::::: 47 7 size :::::::::::::::::::::::::::::::::::::::::::::: 48 8 strings::::::::::::::::::::::::::::::::::::::::::: 50 9 strip ::::::::::::::::::::::::::::::::::::::::::::: 52 10 c++filt::::::::::::::::::::::::::::::::::::::::: 57 11 addr2line :::::::::::::::::::::::::::::::::::::: 60 12 windmc :::::::::::::::::::::::::::::::::::::::: 63 13 windres :::::::::::::::::::::::::::::::::::::::: 66 14 dlltool:::::::::::::::::::::::::::::::::::::::::: 69 14.1 The format of the dlltool .def file ::::::::::::::::::::::::::
    [Show full text]