× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5803e1d7b5c5e4116dccffd7ec8cc3877a087aa6e8900a0a33c215e6cda2d261
Detection ratio: 1 / 68
Analysis date: 2018-01-11 04:39:06 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
eGambit Unsafe.AI_Score_97% 20180111
Ad-Aware 20180111
AegisLab 20180111
AhnLab-V3 20180111
Alibaba 20180111
ALYac 20180111
Antiy-AVL 20180111
Arcabit 20180111
Avast 20180111
Avast-Mobile 20180111
AVG 20180111
Avira (no cloud) 20180110
AVware 20180103
Baidu 20180110
BitDefender 20180111
Bkav 20180106
CAT-QuickHeal 20180110
ClamAV 20180110
CMC 20180111
Comodo 20180111
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180111
Cyren 20180111
DrWeb 20180111
Emsisoft 20180111
Endgame 20171130
ESET-NOD32 20180111
F-Prot 20180111
F-Secure 20180111
Fortinet 20180111
GData 20180111
Ikarus 20180110
Sophos ML 20170914
Jiangmin 20180111
K7AntiVirus 20180110
K7GW 20180111
Kaspersky 20180111
Kingsoft 20180111
Malwarebytes 20180111
MAX 20180111
McAfee 20180110
McAfee-GW-Edition 20180111
Microsoft 20180110
eScan 20180111
NANO-Antivirus 20180111
nProtect 20180111
Palo Alto Networks (Known Signatures) 20180111
Panda 20180110
Qihoo-360 20180111
Rising 20180111
SentinelOne (Static ML) 20171224
Sophos AV 20180111
SUPERAntiSpyware 20180111
Symantec 20180111
Symantec Mobile Insight 20180110
Tencent 20180111
TheHacker 20180108
TotalDefense 20180110
TrendMicro 20180111
TrendMicro-HouseCall 20180111
Trustlook 20180111
VBA32 20180110
VIPRE 20180111
ViRobot 20180111
Webroot 20180111
WhiteArmor 20180110
Yandex 20180109
Zillya 20180110
ZoneAlarm by Check Point 20180111
Zoner 20180111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright ⓒ2016 POLARIS OFFICE Corp. All Rights Reserved.

Product Polaris Office
Original name PolarisOfficeInstaller.exe
Internal name PolarisOfficeInstaller.exe
File version 8, 1, 12, 11225
Description Polaris Office Installer
Signature verification Signed file, verified signature
Signing date 2:27 AM 11/14/2016
Signers
[+] POLARIS OFFICE Corp
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 2/3/2016
Valid to 12:59 AM 2/3/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint D2D0CA79E7F78F93397B4075440A8EC4C655E8CC
Serial number 51 25 AB 0B 27 08 12 81 CA 60 5F F9 59 FD 49 0F
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-11-14 01:23:58
Entry Point 0x0013C350
Number of sections 5
PE sections
Overlays
MD5 5551819b02c282e6be2bd6e519f6b872
File type data
Offset 3929088
Size 6072
Entropy 7.35
PE imports
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
InitCommonControlsEx
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
DeleteObject
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
Escape
ScaleViewportExtEx
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
FrameRgn
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
CreateFontIndirectW
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
RoundRect
SetWindowOrgEx
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
Ellipse
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetAdaptersInfo
GetStdHandle
FileTimeToSystemTime
WaitForSingleObject
EncodePointer
GetFileAttributesW
lstrcmpW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
EnumSystemLocalesW
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
InterlockedExchange
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
GetProfileIntW
ResumeThread
CreateEventW
OutputDebugStringW
GlobalHandle
FindClose
TlsGetValue
GetFullPathNameW
OutputDebugStringA
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
GetSystemTime
InterlockedDecrement
GlobalFindAtomW
LoadResource
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
LoadLibraryA
VerSetConditionMask
SetThreadPriority
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
GetModuleHandleA
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
GetModuleHandleExW
VirtualQuery
SetEndOfFile
GetVersion
LeaveCriticalSection
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
CopyFileW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
GetModuleHandleW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
WriteFile
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindFirstFileW
IsValidLocale
DuplicateHandle
GetProcAddress
GlobalAlloc
ReadConsoleW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
InterlockedIncrement
GlobalGetAtomNameW
InitializeCriticalSection
LocalReAlloc
LCMapStringW
GetSystemInfo
GlobalFree
GetConsoleCP
FindResourceW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
Process32NextW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
Process32FirstW
WritePrivateProfileStringW
SuspendThread
RaiseException
UnhandledExceptionFilter
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GlobalLock
GetCurrentThreadId
FreeResource
GetFileAttributesExW
IsValidCodePage
GetTempPathW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
SHGetFolderPathW
SHBrowseForFolderW
DragQueryFileW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHGetMalloc
DragFinish
PathFindFileNameW
PathRemoveFileSpecW
PathIsUNCW
PathFindExtensionW
StrFormatKBSizeW
PathStripToRootW
PathRemoveExtensionW
MapWindowPoints
GetForegroundWindow
SetWindowRgn
RedrawWindow
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
TrackMouseEvent
GetMessagePos
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
GetMessageTime
SetMenuItemInfoW
SendMessageW
SetActiveWindow
DispatchMessageW
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
GetMenuStringW
UnregisterClassW
GetClassInfoW
CreateAcceleratorTableW
DefMDIChildProcW
DrawTextW
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
GetKeyboardState
ClientToScreen
GetTopWindow
CopyAcceleratorTableW
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
GetKeyState
PtInRect
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
GetMenuState
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetDesktopWindow
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
GetDC
CharUpperW
GetSystemMenu
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetMenuDefaultItem
GetIconInfo
TranslateAcceleratorW
SetClipboardData
IsZoomed
GetWindowPlacement
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
DrawFocusRect
GetScrollRange
CreateMenu
GetActiveWindow
IsDialogMessageW
FillRect
GetMenuItemInfoW
MonitorFromPoint
CopyRect
DeferWindowPos
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
DestroyWindow
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
ReleaseCapture
IsIconic
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
GetComboBoxInfo
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
DrawIcon
IntersectRect
PostMessageW
InvalidateRect
CheckDlgButton
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ScreenToClient
RegisterClassW
GetAsyncKeyState
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
SetParent
DestroyAcceleratorTable
ValidateRect
ShowOwnedPopups
LoadCursorW
LoadIconW
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
NotifyWinEvent
OpenClipboard
EmptyClipboard
CreateDialogIndirectParamW
MapDialogRect
DrawTextExW
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
HideCaret
GetKeyboardLayout
SetWindowContextHelpId
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
MessageBoxW
DefFrameProcW
SetMenu
SetRectEmpty
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
EnumDisplayMonitors
BeginDeferWindowPos
WinHelpW
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CharNextW
CallWindowProcW
GetClassNameW
TranslateMDISysAccel
GetClientRect
IsRectEmpty
IsMenu
GetFocus
InsertMenuItemW
CloseClipboard
IsWindowVisible
SetCursor
UnhookWindowsHookEx
RemovePropW
IsAppThemed
GetThemeSysColor
GetWindowTheme
GetCurrentThemeName
DrawThemeText
OpenThemeData
DrawThemeParentBackground
CloseThemeData
DrawThemeBackground
GetThemeColor
IsThemeBackgroundPartiallyTransparent
GetThemePartSize
SetWindowTheme
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
InternetSetOptionExW
HttpQueryInfoW
InternetSetStatusCallbackW
InternetQueryDataAvailable
InternetConnectW
InternetWriteFile
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetGetConnectedStateExW
InternetReadFileExW
HttpSendRequestW
InternetOpenUrlW
InternetSetFilePointer
InternetGetLastResponseInfoW
HttpOpenRequestW
PlaySoundW
timeGetTime
ClosePrinter
DocumentPropertiesW
OpenPrinterW
WSAStartup
gethostbyname
inet_ntoa
gethostname
WSACleanup
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImagePaletteSize
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImageWidth
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleUninitialize
CoUninitialize
OleTranslateAccelerator
OleLockRunning
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
CreateStreamOnHGlobal
OleFlushClipboard
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
RevokeDragDrop
CoRegisterMessageFilter
OleGetClipboard
OleDuplicateData
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoInitializeEx
OleCreateMenuDescriptor
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
IsAccelerator
OleIsCurrentClipboard
CoTaskMemFree
OleUIBusyW
Number of PE resources by type
PNG 554
RT_STRING 59
RT_BITMAP 46
RT_DIALOG 37
RT_CURSOR 28
RT_GROUP_CURSOR 27
RT_ICON 21
STYLE_XML 5
RT_GROUP_ICON 5
Struct(241) 2
RT_VERSION 2
RT_MANIFEST 1
RT_MENU 1
Number of PE resources by language
KOREAN 744
ENGLISH US 5
PORTUGUESE 3
PORTUGUESE BRAZILIAN 3
GERMAN 3
CHINESE TRADITIONAL 3
FRENCH 3
CHINESE SIMPLIFIED 3
INDONESIAN DEFAULT 3
ARABIC SAUDI ARABIA 3
JAPANESE DEFAULT 3
SPANISH MODERN 3
POLISH DEFAULT 3
RUSSIAN 3
ITALIAN 3
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

InitializedDataSize
2461696

ImageVersion
0.0

ProductName
Polaris Office

FileVersionNumber
8.1.12.11225

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
11.0

FileTypeExtension
exe

OriginalFileName
PolarisOfficeInstaller.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
8, 1, 12, 11225

TimeStamp
2016:11:14 02:23:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
PolarisOfficeInstaller.exe

ProductVersion
8, 1, 12, 11225

FileDescription
Polaris Office Installer

OSVersion
5.1

FileOS
Windows NT 32-bit

LegalCopyright
Copyright 2016 POLARIS OFFICE Corp. All Rights Reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
POLARIS OFFICE Corp.

CodeSize
1498112

FileSubtype
0

ProductVersionNumber
8.1.12.11225

EntryPoint
0x13c350

ObjectFileType
Executable application

File identification
MD5 2b0f0f5f41434ff3aab859c6a764144d
SHA1 25e45eecef90bcbb29148b35163738261f053a3f
SHA256 5803e1d7b5c5e4116dccffd7ec8cc3877a087aa6e8900a0a33c215e6cda2d261
ssdeep
98304:i8q+xAG1Itl/Nc/Hy/CAdgxslAFLOAkGkzdnEVomFHKnPn:xx6t/c1igxslAFLOyomFHKnPn

authentihash 0f27a2edce2ebb937f89c58ceba19a2a98a8b0726ffab8d9a5bff46ee35de95b
imphash 423966571908628e48a4fd75d75d4474
File size 3.8 MB ( 3935160 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (49.4%)
InstallShield setup (18.2%)
Win32 Executable MS Visual C++ (generic) (13.2%)
Win64 Executable (generic) (11.7%)
Win32 Dynamic Link Library (generic) (2.7%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-11-14 12:02:15 UTC ( 2 years, 4 months ago )
Last submission 2017-12-21 12:45:00 UTC ( 1 year, 3 months ago )
File names PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
5803E1D7B5C5E4116DCCFFD7EC8CC3877A087AA6E8900A0A33C215E6CDA2D261.exe
PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
931253
PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
Polaris Office para Windows (PolarisOfficeInstaller) .exe
PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
PolarisOfficeInstaller_8.1.12.exe
PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
PolarisOfficeInstaller.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications