Downloader Injector
SmokeLoader Mal/Generic-S Mal/HTMLGen-A
Created on 2022-01-06T21:04:00
6c02cd3294f998736222c255ddd163b9d5e72dfbf3492bfdd43519a46ed609de.exe
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 hours, 13 minutes, 17 seconds" to "45 seconds" to reveal dormant functionality.
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x0200004A): 2 dumps were skipped because they exceeded the maximum dump size of 7 MB. The largest one was 8 MB.
(0x0200005D): 323 additional dumps with the reason "Content Changed" and a total of 1594 MB were skipped because the respective maximum limit was reached.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\6c02cd3294f998736222c255ddd163b9d5e72dfbf3492bfdd43519a46ed609de.exe | Sample File | Binary |
malicious
|
...
|
Verdict |
malicious
|
Names | Mal/Generic-S |
Image Base | 0x400000 |
Entry Point | 0x41c630 |
Size Of Code | 0x3b200 |
Size Of Initialized Data | 0x20400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-09-13 04:13:55+00:00 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x3b05e | 0x3b200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.99 |
.data | 0x43d000 | 0x12004 | 0x1400 | 0x3b600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.17 |
.paf | 0x450000 | 0x5 | 0x200 | 0x3ca00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.vos | 0x451000 | 0x4b | 0x200 | 0x3cc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.muyes | 0x452000 | 0xea | 0x200 | 0x3ce00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.yomica | 0x453000 | 0xd93 | 0xe00 | 0x3d000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x454000 | 0x9018 | 0x9200 | 0x3de00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.56 |
.reloc | 0x45e000 | 0x3a0c | 0x3c00 | 0x47000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 3.96 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CallNamedPipeA | - | 0x401000 | 0x3afdc | 0x3a3dc | 0x2f |
TerminateThread | - | 0x401004 | 0x3afe0 | 0x3a3e0 | 0x42e |
GetExitCodeProcess | - | 0x401008 | 0x3afe4 | 0x3a3e4 | 0x1c5 |
GetVersionExA | - | 0x40100c | 0x3afe8 | 0x3a3e8 | 0x275 |
GetConsoleCP | - | 0x401010 | 0x3afec | 0x3a3ec | 0x183 |
GetConsoleAliasesLengthW | - | 0x401014 | 0x3aff0 | 0x3a3f0 | 0x181 |
CommConfigDialogA | - | 0x401018 | 0x3aff4 | 0x3a3f4 | 0x4e |
FindFirstFileExA | - | 0x40101c | 0x3aff8 | 0x3a3f8 | 0x11e |
GetDriveTypeA | - | 0x401020 | 0x3affc | 0x3a3fc | 0x1ba |
FreeEnvironmentStringsA | - | 0x401024 | 0x3b000 | 0x3a400 | 0x14a |
GetProcessPriorityBoost | - | 0x401028 | 0x3b004 | 0x3a404 | 0x228 |
SetVolumeMountPointA | - | 0x40102c | 0x3b008 | 0x3a408 | 0x41a |
GetLongPathNameA | - | 0x401030 | 0x3b00c | 0x3a40c | 0x1ef |
CopyFileW | - | 0x401034 | 0x3b010 | 0x3a410 | 0x65 |
TlsSetValue | - | 0x401038 | 0x3b014 | 0x3a414 | 0x435 |
SetConsoleCursorInfo | - | 0x40103c | 0x3b018 | 0x3a418 | 0x3a9 |
GlobalHandle | - | 0x401040 | 0x3b01c | 0x3a41c | 0x28f |
TzSpecificLocalTimeToSystemTime | - | 0x401044 | 0x3b020 | 0x3a420 | 0x43b |
FindAtomA | - | 0x401048 | 0x3b024 | 0x3a424 | 0x117 |
ReleaseSemaphore | - | 0x40104c | 0x3b028 | 0x3a428 | 0x37b |
GetNamedPipeHandleStateA | - | 0x401050 | 0x3b02c | 0x3a42c | 0x201 |
CreateMailslotW | - | 0x401054 | 0x3b030 | 0x3a430 | 0x89 |
BuildCommDCBAndTimeoutsA | - | 0x401058 | 0x3b034 | 0x3a434 | 0x2c |
VirtualProtect | - | 0x40105c | 0x3b038 | 0x3a438 | 0x45a |
GetModuleHandleA | - | 0x401060 | 0x3b03c | 0x3a43c | 0x1f6 |
LocalAlloc | - | 0x401064 | 0x3b040 | 0x3a440 | 0x2f9 |
TryEnterCriticalSection | - | 0x401068 | 0x3b044 | 0x3a444 | 0x439 |
GetCommandLineA | - | 0x40106c | 0x3b048 | 0x3a448 | 0x16f |
InterlockedExchange | - | 0x401070 | 0x3b04c | 0x3a44c | 0x2bd |
GetCalendarInfoA | - | 0x401074 | 0x3b050 | 0x3a450 | 0x162 |
DeleteFileA | - | 0x401078 | 0x3b054 | 0x3a454 | 0xc0 |
CreateActCtxA | - | 0x40107c | 0x3b058 | 0x3a458 | 0x67 |
CreateRemoteThread | - | 0x401080 | 0x3b05c | 0x3a45c | 0x98 |
CreateThread | - | 0x401084 | 0x3b060 | 0x3a460 | 0xa3 |
GetPriorityClass | - | 0x401088 | 0x3b064 | 0x3a464 | 0x215 |
WritePrivateProfileStringW | - | 0x40108c | 0x3b068 | 0x3a468 | 0x493 |
GetProcessHeaps | - | 0x401090 | 0x3b06c | 0x3a46c | 0x224 |
GetProcessHeap | - | 0x401094 | 0x3b070 | 0x3a470 | 0x223 |
GlobalUnWire | - | 0x401098 | 0x3b074 | 0x3a474 | 0x295 |
ReadConsoleOutputCharacterW | - | 0x40109c | 0x3b078 | 0x3a478 | 0x364 |
GetStartupInfoA | - | 0x4010a0 | 0x3b07c | 0x3a47c | 0x239 |
GetDiskFreeSpaceExA | - | 0x4010a4 | 0x3b080 | 0x3a480 | 0x1b5 |
GetCPInfoExA | - | 0x4010a8 | 0x3b084 | 0x3a484 | 0x15c |
GetWindowsDirectoryA | - | 0x4010ac | 0x3b088 | 0x3a488 | 0x280 |
GetSystemWow64DirectoryW | - | 0x4010b0 | 0x3b08c | 0x3a48c | 0x254 |
GetProfileStringA | - | 0x4010b4 | 0x3b090 | 0x3a490 | 0x233 |
WriteProfileSectionW | - | 0x4010b8 | 0x3b094 | 0x3a494 | 0x498 |
GetProfileStringW | - | 0x4010bc | 0x3b098 | 0x3a498 | 0x234 |
GetLastError | - | 0x4010c0 | 0x3b09c | 0x3a49c | 0x1e6 |
GetStringTypeExA | - | 0x4010c4 | 0x3b0a0 | 0x3a4a0 | 0x23e |
DebugBreak | - | 0x4010c8 | 0x3b0a4 | 0x3a4a4 | 0xb4 |
GetPrivateProfileSectionA | - | 0x4010cc | 0x3b0a8 | 0x3a4a8 | 0x218 |
lstrcmpW | - | 0x4010d0 | 0x3b0ac | 0x3a4ac | 0x4aa |
ReadFile | - | 0x4010d4 | 0x3b0b0 | 0x3a4b0 | 0x368 |
GetConsoleMode | - | 0x4010d8 | 0x3b0b4 | 0x3a4b4 | 0x195 |
GetThreadSelectorEntry | - | 0x4010dc | 0x3b0b8 | 0x3a4b8 | 0x263 |
lstrcatA | - | 0x4010e0 | 0x3b0bc | 0x3a4bc | 0x4a6 |
CreateActCtxW | - | 0x4010e4 | 0x3b0c0 | 0x3a4c0 | 0x68 |
SetMailslotInfo | - | 0x4010e8 | 0x3b0c4 | 0x3a4c4 | 0x3f2 |
GetSystemTimeAdjustment | - | 0x4010ec | 0x3b0c8 | 0x3a4c8 | 0x24e |
DefineDosDeviceW | - | 0x4010f0 | 0x3b0cc | 0x3a4cc | 0xba |
EndUpdateResourceW | - | 0x4010f4 | 0x3b0d0 | 0x3a4d0 | 0xd8 |
WriteConsoleA | - | 0x4010f8 | 0x3b0d4 | 0x3a4d4 | 0x482 |
GetPrivateProfileStructW | - | 0x4010fc | 0x3b0d8 | 0x3a4d8 | 0x21f |
HeapLock | - | 0x401100 | 0x3b0dc | 0x3a4dc | 0x2a2 |
DisableThreadLibraryCalls | - | 0x401104 | 0x3b0e0 | 0x3a4e0 | 0xcb |
PeekConsoleInputW | - | 0x401108 | 0x3b0e4 | 0x3a4e4 | 0x33d |
GetTapeStatus | - | 0x40110c | 0x3b0e8 | 0x3a4e8 | 0x257 |
TransmitCommChar | - | 0x401110 | 0x3b0ec | 0x3a4ec | 0x438 |
WaitNamedPipeW | - | 0x401114 | 0x3b0f0 | 0x3a4f0 | 0x46b |
FindResourceExA | - | 0x401118 | 0x3b0f4 | 0x3a4f4 | 0x137 |
GetLocalTime | - | 0x40111c | 0x3b0f8 | 0x3a4f8 | 0x1e7 |
GetOverlappedResult | - | 0x401120 | 0x3b0fc | 0x3a4fc | 0x214 |
CreateSemaphoreW | - | 0x401124 | 0x3b100 | 0x3a500 | 0x9c |
SetThreadLocale | - | 0x401128 | 0x3b104 | 0x3a504 | 0x409 |
SetFileShortNameA | - | 0x40112c | 0x3b108 | 0x3a508 | 0x3e1 |
lstrcpyW | - | 0x401130 | 0x3b10c | 0x3a50c | 0x4b0 |
VerLanguageNameW | - | 0x401134 | 0x3b110 | 0x3a510 | 0x44e |
LockFile | - | 0x401138 | 0x3b114 | 0x3a514 | 0x305 |
GetConsoleAliasA | - | 0x40113c | 0x3b118 | 0x3a518 | 0x179 |
EnumDateFormatsW | - | 0x401140 | 0x3b11c | 0x3a51c | 0xe3 |
ResetWriteWatch | - | 0x401144 | 0x3b120 | 0x3a520 | 0x38b |
GetNumberOfConsoleInputEvents | - | 0x401148 | 0x3b124 | 0x3a524 | 0x211 |
WriteConsoleOutputCharacterA | - | 0x40114c | 0x3b128 | 0x3a528 | 0x489 |
GetConsoleAliasExesLengthW | - | 0x401150 | 0x3b12c | 0x3a52c | 0x17c |
GetComputerNameW | - | 0x401154 | 0x3b130 | 0x3a530 | 0x178 |
HeapFree | - | 0x401158 | 0x3b134 | 0x3a534 | 0x2a1 |
LocalReAlloc | - | 0x40115c | 0x3b138 | 0x3a538 | 0x300 |
SetCommMask | - | 0x401160 | 0x3b13c | 0x3a53c | 0x39e |
SetEndOfFile | - | 0x401164 | 0x3b140 | 0x3a540 | 0x3cd |
FindClose | - | 0x401168 | 0x3b144 | 0x3a544 | 0x119 |
PostQueuedCompletionStatus | - | 0x40116c | 0x3b148 | 0x3a548 | 0x33f |
AreFileApisANSI | - | 0x401170 | 0x3b14c | 0x3a54c | 0x13 |
SetWaitableTimer | - | 0x401174 | 0x3b150 | 0x3a550 | 0x41c |
EnumResourceNamesW | - | 0x401178 | 0x3b154 | 0x3a554 | 0xed |
GetProcessTimes | - | 0x40117c | 0x3b158 | 0x3a558 | 0x22a |
FatalAppExitW | - | 0x401180 | 0x3b15c | 0x3a55c | 0x10c |
lstrcpynW | - | 0x401184 | 0x3b160 | 0x3a560 | 0x4b3 |
GetNamedPipeInfo | - | 0x401188 | 0x3b164 | 0x3a564 | 0x203 |
FillConsoleOutputCharacterW | - | 0x40118c | 0x3b168 | 0x3a568 | 0x113 |
GetCompressedFileSizeA | - | 0x401190 | 0x3b16c | 0x3a56c | 0x171 |
FindNextVolumeMountPointA | - | 0x401194 | 0x3b170 | 0x3a570 | 0x133 |
GetFullPathNameW | - | 0x401198 | 0x3b174 | 0x3a574 | 0x1df |
WriteProfileStringW | - | 0x40119c | 0x3b178 | 0x3a578 | 0x49a |
SetHandleCount | - | 0x4011a0 | 0x3b17c | 0x3a57c | 0x3e8 |
GlobalAddAtomA | - | 0x4011a4 | 0x3b180 | 0x3a580 | 0x283 |
TerminateJobObject | - | 0x4011a8 | 0x3b184 | 0x3a584 | 0x42c |
QueryDosDeviceW | - | 0x4011ac | 0x3b188 | 0x3a588 | 0x34e |
InitializeCriticalSection | - | 0x4011b0 | 0x3b18c | 0x3a58c | 0x2b4 |
Process32FirstW | - | 0x4011b4 | 0x3b190 | 0x3a590 | 0x344 |
SetCurrentDirectoryA | - | 0x4011b8 | 0x3b194 | 0x3a594 | 0x3c6 |
GetBinaryTypeW | - | 0x4011bc | 0x3b198 | 0x3a598 | 0x159 |
OpenMutexA | - | 0x4011c0 | 0x3b19c | 0x3a59c | 0x32f |
UnhandledExceptionFilter | - | 0x4011c4 | 0x3b1a0 | 0x3a5a0 | 0x43e |
SetUnhandledExceptionFilter | - | 0x4011c8 | 0x3b1a4 | 0x3a5a4 | 0x415 |
MoveFileA | - | 0x4011cc | 0x3b1a8 | 0x3a5a8 | 0x311 |
RaiseException | - | 0x4011d0 | 0x3b1ac | 0x3a5ac | 0x35a |
GetStartupInfoW | - | 0x4011d4 | 0x3b1b0 | 0x3a5b0 | 0x23a |
HeapValidate | - | 0x4011d8 | 0x3b1b4 | 0x3a5b4 | 0x2a9 |
IsBadReadPtr | - | 0x4011dc | 0x3b1b8 | 0x3a5b8 | 0x2c8 |
TerminateProcess | - | 0x4011e0 | 0x3b1bc | 0x3a5bc | 0x42d |
GetCurrentProcess | - | 0x4011e4 | 0x3b1c0 | 0x3a5c0 | 0x1a9 |
IsDebuggerPresent | - | 0x4011e8 | 0x3b1c4 | 0x3a5c4 | 0x2d1 |
GetModuleFileNameW | - | 0x4011ec | 0x3b1c8 | 0x3a5c8 | 0x1f5 |
DeleteCriticalSection | - | 0x4011f0 | 0x3b1cc | 0x3a5cc | 0xbe |
EnterCriticalSection | - | 0x4011f4 | 0x3b1d0 | 0x3a5d0 | 0xd9 |
LeaveCriticalSection | - | 0x4011f8 | 0x3b1d4 | 0x3a5d4 | 0x2ef |
GetModuleHandleW | - | 0x4011fc | 0x3b1d8 | 0x3a5d8 | 0x1f9 |
Sleep | - | 0x401200 | 0x3b1dc | 0x3a5dc | 0x421 |
InterlockedIncrement | - | 0x401204 | 0x3b1e0 | 0x3a5e0 | 0x2c0 |
InterlockedDecrement | - | 0x401208 | 0x3b1e4 | 0x3a5e4 | 0x2bc |
GetProcAddress | - | 0x40120c | 0x3b1e8 | 0x3a5e8 | 0x220 |
ExitProcess | - | 0x401210 | 0x3b1ec | 0x3a5ec | 0x104 |
GetModuleFileNameA | - | 0x401214 | 0x3b1f0 | 0x3a5f0 | 0x1f4 |
WriteFile | - | 0x401218 | 0x3b1f4 | 0x3a5f4 | 0x48d |
GetStdHandle | - | 0x40121c | 0x3b1f8 | 0x3a5f8 | 0x23b |
GetFileType | - | 0x401220 | 0x3b1fc | 0x3a5fc | 0x1d7 |
QueryPerformanceCounter | - | 0x401224 | 0x3b200 | 0x3a600 | 0x354 |
GetTickCount | - | 0x401228 | 0x3b204 | 0x3a604 | 0x266 |
GetCurrentThreadId | - | 0x40122c | 0x3b208 | 0x3a608 | 0x1ad |
GetCurrentProcessId | - | 0x401230 | 0x3b20c | 0x3a60c | 0x1aa |
GetSystemTimeAsFileTime | - | 0x401234 | 0x3b210 | 0x3a610 | 0x24f |
FreeEnvironmentStringsW | - | 0x401238 | 0x3b214 | 0x3a614 | 0x14b |
GetEnvironmentStringsW | - | 0x40123c | 0x3b218 | 0x3a618 | 0x1c1 |
GetCommandLineW | - | 0x401240 | 0x3b21c | 0x3a61c | 0x170 |
TlsGetValue | - | 0x401244 | 0x3b220 | 0x3a620 | 0x434 |
TlsAlloc | - | 0x401248 | 0x3b224 | 0x3a624 | 0x432 |
TlsFree | - | 0x40124c | 0x3b228 | 0x3a628 | 0x433 |
SetLastError | - | 0x401250 | 0x3b22c | 0x3a62c | 0x3ec |
HeapDestroy | - | 0x401254 | 0x3b230 | 0x3a630 | 0x2a0 |
HeapCreate | - | 0x401258 | 0x3b234 | 0x3a634 | 0x29f |
VirtualFree | - | 0x40125c | 0x3b238 | 0x3a638 | 0x457 |
HeapAlloc | - | 0x401260 | 0x3b23c | 0x3a63c | 0x29d |
HeapSize | - | 0x401264 | 0x3b240 | 0x3a640 | 0x2a6 |
HeapReAlloc | - | 0x401268 | 0x3b244 | 0x3a644 | 0x2a4 |
VirtualAlloc | - | 0x40126c | 0x3b248 | 0x3a648 | 0x454 |
GetACP | - | 0x401270 | 0x3b24c | 0x3a64c | 0x152 |
GetOEMCP | - | 0x401274 | 0x3b250 | 0x3a650 | 0x213 |
GetCPInfo | - | 0x401278 | 0x3b254 | 0x3a654 | 0x15b |
IsValidCodePage | - | 0x40127c | 0x3b258 | 0x3a658 | 0x2db |
SetFilePointer | - | 0x401280 | 0x3b25c | 0x3a65c | 0x3df |
WideCharToMultiByte | - | 0x401284 | 0x3b260 | 0x3a660 | 0x47a |
OutputDebugStringA | - | 0x401288 | 0x3b264 | 0x3a664 | 0x33a |
WriteConsoleW | - | 0x40128c | 0x3b268 | 0x3a668 | 0x48c |
OutputDebugStringW | - | 0x401290 | 0x3b26c | 0x3a66c | 0x33b |
LoadLibraryW | - | 0x401294 | 0x3b270 | 0x3a670 | 0x2f4 |
MultiByteToWideChar | - | 0x401298 | 0x3b274 | 0x3a674 | 0x31a |
RtlUnwind | - | 0x40129c | 0x3b278 | 0x3a678 | 0x392 |
InitializeCriticalSectionAndSpinCount | - | 0x4012a0 | 0x3b27c | 0x3a67c | 0x2b5 |
LoadLibraryA | - | 0x4012a4 | 0x3b280 | 0x3a680 | 0x2f1 |
LCMapStringA | - | 0x4012a8 | 0x3b284 | 0x3a684 | 0x2e1 |
LCMapStringW | - | 0x4012ac | 0x3b288 | 0x3a688 | 0x2e3 |
GetStringTypeA | - | 0x4012b0 | 0x3b28c | 0x3a68c | 0x23d |
GetStringTypeW | - | 0x4012b4 | 0x3b290 | 0x3a690 | 0x240 |
GetLocaleInfoA | - | 0x4012b8 | 0x3b294 | 0x3a694 | 0x1e8 |
SetStdHandle | - | 0x4012bc | 0x3b298 | 0x3a698 | 0x3fc |
GetConsoleOutputCP | - | 0x4012c0 | 0x3b29c | 0x3a69c | 0x199 |
FlushFileBuffers | - | 0x4012c4 | 0x3b2a0 | 0x3a6a0 | 0x141 |
CreateFileA | - | 0x4012c8 | 0x3b2a4 | 0x3a6a4 | 0x78 |
CloseHandle | - | 0x4012cc | 0x3b2a8 | 0x3a6a8 | 0x43 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
6c02cd3294f998736222c255ddd163b9d5e72dfbf3492bfdd43519a46ed609de.exe | 1 | 0x00400000 | 0x00461FFF | Relevant Image | 32-bit | 0x00428180 |
...
|
||
buffer | 1 | 0x00681DF8 | 0x0069101F | First Execution | 32-bit | 0x00685736 |
...
|
||
buffer | 1 | 0x00030000 | 0x00038FFF | First Execution | 32-bit | 0x00030000 |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | First Execution | 32-bit | 0x00402F47 |
...
|
||
6c02cd3294f998736222c255ddd163b9d5e72dfbf3492bfdd43519a46ed609de.exe | 1 | 0x00400000 | 0x00461FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Content Changed | 32-bit | 0x0040283D |
...
|
||
buffer | 2 | 0x00450000 | 0x00465FFF | Marked Executable | 32-bit | - |
...
|
||
buffer | 2 | 0x001D0000 | 0x001D5FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\677.exe | Downloaded File | Binary |
suspicious
|
...
|
Image Base | 0x400000 |
Entry Point | 0x8fea00 |
Size Of Code | 0x1c2000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x33c000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 1970-01-01 00:00:00+00:00 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x33c000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x73d000 | 0x1c2000 | 0x1c1e00 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.87 |
UPX2 | 0x8ff000 | 0x1000 | 0x200 | 0x1c2000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.37 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | - | 0x8ff028 | 0x4ff028 | 0x1c2028 | 0x0 |
ExitProcess | - | 0x8ff030 | 0x4ff030 | 0x1c2030 | 0x0 |
GetProcAddress | - | 0x8ff038 | 0x4ff038 | 0x1c2038 | 0x0 |
VirtualProtect | - | 0x8ff040 | 0x4ff040 | 0x1c2040 | 0x0 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
677.exe | 5 | 0x00400000 | 0x008FFFFF | First Execution | 64-bit | 0x008FEA00 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00460540 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00403E70 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00445830 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x0042F530 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00444F10 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00451CB0 |
...
|
||
677.exe | 5 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00428A30 |
...
|