Downloader Injector
SmokeLoader Mal/HTMLGen-A
Created on 2022-01-04T18:55:00
26a4c5b36d9fde80ea47137eb53b40dacf240432a5895f98417eae51b6b681da.exe
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "4 hours, 4 minutes, 28 seconds" to "45 seconds" to reveal dormant functionality.
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x0200004A): One dump of 8 MB was skipped because it exceeded the maximum dump size of 7 MB.
(0x0200005D): 88 additional dumps with the reason "Content Changed" and a total of 433 MB were skipped because the respective maximum limit was reached.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\26a4c5b36d9fde80ea47137eb53b40dacf240432a5895f98417eae51b6b681da.exe | Sample File | Binary |
malicious
|
...
|
Image Base | 0x400000 |
Entry Point | 0x422e10 |
Size Of Code | 0x44000 |
Size Of Initialized Data | 0x20800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-10-11 15:43:10+00:00 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x43e9e | 0x44000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.85 |
.data | 0x445000 | 0x12548 | 0x1600 | 0x44400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.04 |
.bekuvox | 0x458000 | 0x5 | 0x200 | 0x45a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.jutu | 0x459000 | 0x4b | 0x200 | 0x45c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.vezev | 0x45a000 | 0xea | 0x200 | 0x45e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.mubone | 0x45b000 | 0xd93 | 0xe00 | 0x46000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x45c000 | 0x8d60 | 0x8e00 | 0x46e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.62 |
.reloc | 0x465000 | 0x3e84 | 0x4000 | 0x4fc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.57 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CallNamedPipeA | - | 0x401000 | 0x43d94 | 0x43194 | 0x2f |
TerminateProcess | - | 0x401004 | 0x43d98 | 0x43198 | 0x42d |
GetExitCodeProcess | - | 0x401008 | 0x43d9c | 0x4319c | 0x1c5 |
GetVersionExA | - | 0x40100c | 0x43da0 | 0x431a0 | 0x275 |
GetConsoleCP | - | 0x401010 | 0x43da4 | 0x431a4 | 0x183 |
GetConsoleAliasesLengthA | - | 0x401014 | 0x43da8 | 0x431a8 | 0x180 |
CommConfigDialogA | - | 0x401018 | 0x43dac | 0x431ac | 0x4e |
FindFirstFileExW | - | 0x40101c | 0x43db0 | 0x431b0 | 0x11f |
GetDriveTypeA | - | 0x401020 | 0x43db4 | 0x431b4 | 0x1ba |
FreeEnvironmentStringsA | - | 0x401024 | 0x43db8 | 0x431b8 | 0x14a |
GetProcessPriorityBoost | - | 0x401028 | 0x43dbc | 0x431bc | 0x228 |
SetVolumeMountPointA | - | 0x40102c | 0x43dc0 | 0x431c0 | 0x41a |
GetLongPathNameA | - | 0x401030 | 0x43dc4 | 0x431c4 | 0x1ef |
CopyFileW | - | 0x401034 | 0x43dc8 | 0x431c8 | 0x65 |
TlsSetValue | - | 0x401038 | 0x43dcc | 0x431cc | 0x435 |
SetConsoleCursorInfo | - | 0x40103c | 0x43dd0 | 0x431d0 | 0x3a9 |
LocalHandle | - | 0x401040 | 0x43dd4 | 0x431d4 | 0x2fe |
TzSpecificLocalTimeToSystemTime | - | 0x401044 | 0x43dd8 | 0x431d8 | 0x43b |
FindAtomA | - | 0x401048 | 0x43ddc | 0x431dc | 0x117 |
ReleaseSemaphore | - | 0x40104c | 0x43de0 | 0x431e0 | 0x37b |
GetNamedPipeHandleStateA | - | 0x401050 | 0x43de4 | 0x431e4 | 0x201 |
SetThreadPriorityBoost | - | 0x401054 | 0x43de8 | 0x431e8 | 0x40c |
BuildCommDCBAndTimeoutsW | - | 0x401058 | 0x43dec | 0x431ec | 0x2d |
GetProcAddress | - | 0x40105c | 0x43df0 | 0x431f0 | 0x220 |
GetModuleHandleA | - | 0x401060 | 0x43df4 | 0x431f4 | 0x1f6 |
LocalAlloc | - | 0x401064 | 0x43df8 | 0x431f8 | 0x2f9 |
LocalReAlloc | - | 0x401068 | 0x43dfc | 0x431fc | 0x300 |
GetCommandLineA | - | 0x40106c | 0x43e00 | 0x43200 | 0x16f |
InterlockedExchange | - | 0x401070 | 0x43e04 | 0x43204 | 0x2bd |
GetCalendarInfoA | - | 0x401074 | 0x43e08 | 0x43208 | 0x162 |
DeleteFileA | - | 0x401078 | 0x43e0c | 0x4320c | 0xc0 |
CreateActCtxA | - | 0x40107c | 0x43e10 | 0x43210 | 0x67 |
CreateRemoteThread | - | 0x401080 | 0x43e14 | 0x43214 | 0x98 |
CreateThread | - | 0x401084 | 0x43e18 | 0x43218 | 0xa3 |
GetPriorityClass | - | 0x401088 | 0x43e1c | 0x4321c | 0x215 |
WritePrivateProfileStringW | - | 0x40108c | 0x43e20 | 0x43220 | 0x493 |
GetProcessHeaps | - | 0x401090 | 0x43e24 | 0x43224 | 0x224 |
GetProcessHeap | - | 0x401094 | 0x43e28 | 0x43228 | 0x223 |
GlobalUnWire | - | 0x401098 | 0x43e2c | 0x4322c | 0x295 |
ReadConsoleOutputCharacterW | - | 0x40109c | 0x43e30 | 0x43230 | 0x364 |
GetStartupInfoA | - | 0x4010a0 | 0x43e34 | 0x43234 | 0x239 |
GetDiskFreeSpaceExA | - | 0x4010a4 | 0x43e38 | 0x43238 | 0x1b5 |
GetCPInfoExA | - | 0x4010a8 | 0x43e3c | 0x4323c | 0x15c |
GetWindowsDirectoryA | - | 0x4010ac | 0x43e40 | 0x43240 | 0x280 |
GetSystemWow64DirectoryW | - | 0x4010b0 | 0x43e44 | 0x43244 | 0x254 |
GetLastError | - | 0x4010b4 | 0x43e48 | 0x43248 | 0x1e6 |
GetProfileStringA | - | 0x4010b8 | 0x43e4c | 0x4324c | 0x233 |
WriteProfileSectionW | - | 0x4010bc | 0x43e50 | 0x43250 | 0x498 |
GetProfileStringW | - | 0x4010c0 | 0x43e54 | 0x43254 | 0x234 |
SetLastError | - | 0x4010c4 | 0x43e58 | 0x43258 | 0x3ec |
GetStringTypeExA | - | 0x4010c8 | 0x43e5c | 0x4325c | 0x23e |
DebugBreak | - | 0x4010cc | 0x43e60 | 0x43260 | 0xb4 |
GetPrivateProfileSectionW | - | 0x4010d0 | 0x43e64 | 0x43264 | 0x21b |
lstrcmpW | - | 0x4010d4 | 0x43e68 | 0x43268 | 0x4aa |
ReadFile | - | 0x4010d8 | 0x43e6c | 0x4326c | 0x368 |
GetConsoleMode | - | 0x4010dc | 0x43e70 | 0x43270 | 0x195 |
TerminateThread | - | 0x4010e0 | 0x43e74 | 0x43274 | 0x42e |
GetThreadSelectorEntry | - | 0x4010e4 | 0x43e78 | 0x43278 | 0x263 |
lstrcatW | - | 0x4010e8 | 0x43e7c | 0x4327c | 0x4a7 |
CreateActCtxW | - | 0x4010ec | 0x43e80 | 0x43280 | 0x68 |
SetMailslotInfo | - | 0x4010f0 | 0x43e84 | 0x43284 | 0x3f2 |
SetSystemTimeAdjustment | - | 0x4010f4 | 0x43e88 | 0x43288 | 0x401 |
DefineDosDeviceW | - | 0x4010f8 | 0x43e8c | 0x4328c | 0xba |
EndUpdateResourceW | - | 0x4010fc | 0x43e90 | 0x43290 | 0xd8 |
WriteConsoleA | - | 0x401100 | 0x43e94 | 0x43294 | 0x482 |
GetPrivateProfileStructW | - | 0x401104 | 0x43e98 | 0x43298 | 0x21f |
TryEnterCriticalSection | - | 0x401108 | 0x43e9c | 0x4329c | 0x439 |
HeapLock | - | 0x40110c | 0x43ea0 | 0x432a0 | 0x2a2 |
DisableThreadLibraryCalls | - | 0x401110 | 0x43ea4 | 0x432a4 | 0xcb |
PeekConsoleInputW | - | 0x401114 | 0x43ea8 | 0x432a8 | 0x33d |
GetTapeStatus | - | 0x401118 | 0x43eac | 0x432ac | 0x257 |
TransmitCommChar | - | 0x40111c | 0x43eb0 | 0x432b0 | 0x438 |
WaitNamedPipeW | - | 0x401120 | 0x43eb4 | 0x432b4 | 0x46b |
FindResourceExA | - | 0x401124 | 0x43eb8 | 0x432b8 | 0x137 |
GetLocalTime | - | 0x401128 | 0x43ebc | 0x432bc | 0x1e7 |
GetOverlappedResult | - | 0x40112c | 0x43ec0 | 0x432c0 | 0x214 |
CreateSemaphoreW | - | 0x401130 | 0x43ec4 | 0x432c4 | 0x9c |
SetThreadLocale | - | 0x401134 | 0x43ec8 | 0x432c8 | 0x409 |
SetFileShortNameA | - | 0x401138 | 0x43ecc | 0x432cc | 0x3e1 |
lstrcpyA | - | 0x40113c | 0x43ed0 | 0x432d0 | 0x4af |
VerLanguageNameW | - | 0x401140 | 0x43ed4 | 0x432d4 | 0x44e |
UnlockFile | - | 0x401144 | 0x43ed8 | 0x432d8 | 0x43f |
GetConsoleAliasA | - | 0x401148 | 0x43edc | 0x432dc | 0x179 |
GetConsoleAliasExesLengthW | - | 0x40114c | 0x43ee0 | 0x432e0 | 0x17c |
EnumDateFormatsW | - | 0x401150 | 0x43ee4 | 0x432e4 | 0xe3 |
RequestDeviceWakeup | - | 0x401154 | 0x43ee8 | 0x432e8 | 0x388 |
ResetWriteWatch | - | 0x401158 | 0x43eec | 0x432ec | 0x38b |
GetNumberOfConsoleInputEvents | - | 0x40115c | 0x43ef0 | 0x432f0 | 0x211 |
TlsGetValue | - | 0x401160 | 0x43ef4 | 0x432f4 | 0x434 |
GetComputerNameW | - | 0x401164 | 0x43ef8 | 0x432f8 | 0x178 |
HeapFree | - | 0x401168 | 0x43efc | 0x432fc | 0x2a1 |
SetCommMask | - | 0x40116c | 0x43f00 | 0x43300 | 0x39e |
SetEndOfFile | - | 0x401170 | 0x43f04 | 0x43304 | 0x3cd |
FindClose | - | 0x401174 | 0x43f08 | 0x43308 | 0x119 |
PostQueuedCompletionStatus | - | 0x401178 | 0x43f0c | 0x4330c | 0x33f |
AreFileApisANSI | - | 0x40117c | 0x43f10 | 0x43310 | 0x13 |
SetWaitableTimer | - | 0x401180 | 0x43f14 | 0x43314 | 0x41c |
EnumResourceNamesW | - | 0x401184 | 0x43f18 | 0x43318 | 0xed |
GetProcessTimes | - | 0x401188 | 0x43f1c | 0x4331c | 0x22a |
GetConsoleAliasesLengthW | - | 0x40118c | 0x43f20 | 0x43320 | 0x181 |
FatalAppExitA | - | 0x401190 | 0x43f24 | 0x43324 | 0x10b |
lstrcpynW | - | 0x401194 | 0x43f28 | 0x43328 | 0x4b3 |
GetNamedPipeInfo | - | 0x401198 | 0x43f2c | 0x4332c | 0x203 |
FillConsoleOutputCharacterA | - | 0x40119c | 0x43f30 | 0x43330 | 0x112 |
GetCompressedFileSizeA | - | 0x4011a0 | 0x43f34 | 0x43334 | 0x171 |
FindNextVolumeMountPointW | - | 0x4011a4 | 0x43f38 | 0x43338 | 0x134 |
GetFullPathNameW | - | 0x4011a8 | 0x43f3c | 0x4333c | 0x1df |
WriteProfileStringW | - | 0x4011ac | 0x43f40 | 0x43340 | 0x49a |
SetHandleCount | - | 0x4011b0 | 0x43f44 | 0x43344 | 0x3e8 |
GlobalAddAtomA | - | 0x4011b4 | 0x43f48 | 0x43348 | 0x283 |
TerminateJobObject | - | 0x4011b8 | 0x43f4c | 0x4334c | 0x42c |
QueryDosDeviceW | - | 0x4011bc | 0x43f50 | 0x43350 | 0x34e |
InitializeCriticalSection | - | 0x4011c0 | 0x43f54 | 0x43354 | 0x2b4 |
Process32FirstW | - | 0x4011c4 | 0x43f58 | 0x43358 | 0x344 |
SetCurrentDirectoryW | - | 0x4011c8 | 0x43f5c | 0x4335c | 0x3c7 |
GetBinaryTypeW | - | 0x4011cc | 0x43f60 | 0x43360 | 0x159 |
OpenMutexA | - | 0x4011d0 | 0x43f64 | 0x43364 | 0x32f |
InterlockedIncrement | - | 0x4011d4 | 0x43f68 | 0x43368 | 0x2c0 |
InterlockedDecrement | - | 0x4011d8 | 0x43f6c | 0x4336c | 0x2bc |
WideCharToMultiByte | - | 0x4011dc | 0x43f70 | 0x43370 | 0x47a |
MultiByteToWideChar | - | 0x4011e0 | 0x43f74 | 0x43374 | 0x31a |
InterlockedCompareExchange | - | 0x4011e4 | 0x43f78 | 0x43378 | 0x2ba |
Sleep | - | 0x4011e8 | 0x43f7c | 0x4337c | 0x421 |
DeleteCriticalSection | - | 0x4011ec | 0x43f80 | 0x43380 | 0xbe |
EnterCriticalSection | - | 0x4011f0 | 0x43f84 | 0x43384 | 0xd9 |
LeaveCriticalSection | - | 0x4011f4 | 0x43f88 | 0x43388 | 0x2ef |
RaiseException | - | 0x4011f8 | 0x43f8c | 0x4338c | 0x35a |
RtlUnwind | - | 0x4011fc | 0x43f90 | 0x43390 | 0x392 |
GetCurrentProcess | - | 0x401200 | 0x43f94 | 0x43394 | 0x1a9 |
UnhandledExceptionFilter | - | 0x401204 | 0x43f98 | 0x43398 | 0x43e |
SetUnhandledExceptionFilter | - | 0x401208 | 0x43f9c | 0x4339c | 0x415 |
IsDebuggerPresent | - | 0x40120c | 0x43fa0 | 0x433a0 | 0x2d1 |
GetModuleFileNameW | - | 0x401210 | 0x43fa4 | 0x433a4 | 0x1f5 |
MoveFileA | - | 0x401214 | 0x43fa8 | 0x433a8 | 0x311 |
GetStartupInfoW | - | 0x401218 | 0x43fac | 0x433ac | 0x23a |
LCMapStringA | - | 0x40121c | 0x43fb0 | 0x433b0 | 0x2e1 |
LCMapStringW | - | 0x401220 | 0x43fb4 | 0x433b4 | 0x2e3 |
GetCPInfo | - | 0x401224 | 0x43fb8 | 0x433b8 | 0x15b |
HeapValidate | - | 0x401228 | 0x43fbc | 0x433bc | 0x2a9 |
IsBadReadPtr | - | 0x40122c | 0x43fc0 | 0x433c0 | 0x2c8 |
GetStringTypeW | - | 0x401230 | 0x43fc4 | 0x433c4 | 0x240 |
GetModuleHandleW | - | 0x401234 | 0x43fc8 | 0x433c8 | 0x1f9 |
TlsAlloc | - | 0x401238 | 0x43fcc | 0x433cc | 0x432 |
GetCurrentThreadId | - | 0x40123c | 0x43fd0 | 0x433d0 | 0x1ad |
TlsFree | - | 0x401240 | 0x43fd4 | 0x433d4 | 0x433 |
GetStdHandle | - | 0x401244 | 0x43fd8 | 0x433d8 | 0x23b |
WriteFile | - | 0x401248 | 0x43fdc | 0x433dc | 0x48d |
OutputDebugStringA | - | 0x40124c | 0x43fe0 | 0x433e0 | 0x33a |
WriteConsoleW | - | 0x401250 | 0x43fe4 | 0x433e4 | 0x48c |
GetFileType | - | 0x401254 | 0x43fe8 | 0x433e8 | 0x1d7 |
OutputDebugStringW | - | 0x401258 | 0x43fec | 0x433ec | 0x33b |
ExitProcess | - | 0x40125c | 0x43ff0 | 0x433f0 | 0x104 |
LoadLibraryW | - | 0x401260 | 0x43ff4 | 0x433f4 | 0x2f4 |
GetModuleFileNameA | - | 0x401264 | 0x43ff8 | 0x433f8 | 0x1f4 |
QueryPerformanceCounter | - | 0x401268 | 0x43ffc | 0x433fc | 0x354 |
GetTickCount | - | 0x40126c | 0x44000 | 0x43400 | 0x266 |
GetCurrentProcessId | - | 0x401270 | 0x44004 | 0x43404 | 0x1aa |
GetSystemTimeAsFileTime | - | 0x401274 | 0x44008 | 0x43408 | 0x24f |
FreeEnvironmentStringsW | - | 0x401278 | 0x4400c | 0x4340c | 0x14b |
GetEnvironmentStringsW | - | 0x40127c | 0x44010 | 0x43410 | 0x1c1 |
GetCommandLineW | - | 0x401280 | 0x44014 | 0x43414 | 0x170 |
HeapDestroy | - | 0x401284 | 0x44018 | 0x43418 | 0x2a0 |
HeapCreate | - | 0x401288 | 0x4401c | 0x4341c | 0x29f |
VirtualFree | - | 0x40128c | 0x44020 | 0x43420 | 0x457 |
GetACP | - | 0x401290 | 0x44024 | 0x43424 | 0x152 |
GetOEMCP | - | 0x401294 | 0x44028 | 0x43428 | 0x213 |
IsValidCodePage | - | 0x401298 | 0x4402c | 0x4342c | 0x2db |
GetLocaleInfoA | - | 0x40129c | 0x44030 | 0x43430 | 0x1e8 |
GetStringTypeA | - | 0x4012a0 | 0x44034 | 0x43434 | 0x23d |
HeapAlloc | - | 0x4012a4 | 0x44038 | 0x43438 | 0x29d |
HeapSize | - | 0x4012a8 | 0x4403c | 0x4343c | 0x2a6 |
HeapReAlloc | - | 0x4012ac | 0x44040 | 0x43440 | 0x2a4 |
VirtualAlloc | - | 0x4012b0 | 0x44044 | 0x43444 | 0x454 |
IsValidLocale | - | 0x4012b4 | 0x44048 | 0x43448 | 0x2dd |
EnumSystemLocalesA | - | 0x4012b8 | 0x4404c | 0x4344c | 0xf8 |
GetUserDefaultLCID | - | 0x4012bc | 0x44050 | 0x43450 | 0x26d |
FlushFileBuffers | - | 0x4012c0 | 0x44054 | 0x43454 | 0x141 |
SetFilePointer | - | 0x4012c4 | 0x44058 | 0x43458 | 0x3df |
InitializeCriticalSectionAndSpinCount | - | 0x4012c8 | 0x4405c | 0x4345c | 0x2b5 |
LoadLibraryA | - | 0x4012cc | 0x44060 | 0x43460 | 0x2f1 |
GetLocaleInfoW | - | 0x4012d0 | 0x44064 | 0x43464 | 0x1ea |
SetStdHandle | - | 0x4012d4 | 0x44068 | 0x43468 | 0x3fc |
GetConsoleOutputCP | - | 0x4012d8 | 0x4406c | 0x4346c | 0x199 |
CloseHandle | - | 0x4012dc | 0x44070 | 0x43470 | 0x43 |
CreateFileA | - | 0x4012e0 | 0x44074 | 0x43474 | 0x78 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
26a4c5b36d9fde80ea47137eb53b40dacf240432a5895f98417eae51b6b681da.exe | 1 | 0x00400000 | 0x00468FFF | Relevant Image | 32-bit | 0x00423040 |
...
|
||
buffer | 1 | 0x00491DF8 | 0x004A1307 | First Execution | 32-bit | 0x00495A64 |
...
|
||
buffer | 1 | 0x001C0000 | 0x001C8FFF | First Execution | 32-bit | 0x001C0000 |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | First Execution | 32-bit | 0x00402F47 |
...
|
||
26a4c5b36d9fde80ea47137eb53b40dacf240432a5895f98417eae51b6b681da.exe | 1 | 0x00400000 | 0x00468FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Content Changed | 32-bit | 0x0040283D |
...
|
||
buffer | 2 | 0x00440000 | 0x00455FFF | Marked Executable | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00420000 | 0x00425FFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\506A.exe | Downloaded File | Binary |
suspicious
|
...
|
Image Base | 0x400000 |
Entry Point | 0x8f7520 |
Size Of Code | 0x1c0000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x337000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 1970-01-01 00:00:00+00:00 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x337000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x738000 | 0x1c0000 | 0x1bf800 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.87 |
UPX2 | 0x8f8000 | 0x1000 | 0x200 | 0x1bfa00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.37 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | - | 0x8f8028 | 0x4f8028 | 0x1bfa28 | 0x0 |
ExitProcess | - | 0x8f8030 | 0x4f8030 | 0x1bfa30 | 0x0 |
GetProcAddress | - | 0x8f8038 | 0x4f8038 | 0x1bfa38 | 0x0 |
VirtualProtect | - | 0x8f8040 | 0x4f8040 | 0x1bfa40 | 0x0 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
506a.exe | 6 | 0x00400000 | 0x008F8FFF | First Execution | 64-bit | 0x008F7520 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00460540 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00440D60 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00447DC0 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00403E70 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00445830 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0042F530 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0045DFF0 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00444F10 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00451CB0 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0044C050 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00428A30 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0041A850 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x00459160 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0040D1C0 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0044B160 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Content Changed | 64-bit | 0x0041B1A6 |
...
|
||
506a.exe | 6 | 0x00400000 | 0x008F8FFF | Final Dump | 64-bit | - |
...
|