Malicious
Classifications
Trojan Banker Injector
Threat Names
QBot
Dynamic Analysis Report
Created on 2023-05-30T21:30:57+00:00
696156d9a4117cba652b18b012db376fddfbd7db8b26a638c760d61b98d3590d.msi
MSI Setup
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 hour, 8 minutes, 18 seconds" to "4 minutes, 40 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDHJ0C~1\Desktop\696156d9a4117cba652b18b012db376fddfbd7db8b26a638c760d61b98d3590d.msi | Sample File | MSI |
Malicious
|
...
|
»
50b2025d307394a8681379b155bf287b0da037643401c53bb6b3a09fa860a8d1 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
722d75cf1d916f8e788b206b4c32f0c2d0f01e94e0df4edb9deb6243cdb8a9ba | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
869ecb9bab8ed64ac58af73b97dfc07a10424b9bcbae8317c145c4134dad7910 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
a01318f06c3e80a5299596ec342d1196c7a4d8a9d9aeb5d80b41bf4c8bcdef94 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
d6587eb95c8ff75b3b5ea9f9b9ccd680f86d8980e1e43ed4944a267c7514f839 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
f26f8371fb39489d2239b09f88e75821b13861e1ed3ed007b3905fb57bf76fd6 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
0876157fd9f8e3b077c082a40e8a21857aec6775b0c3c04791aebe2d59f7a4e4 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
f6b8d9bc5036f474d7ff35828328d3d3c1893720da352b7e6a3186a3429c0c93 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
0e21200af76603975c6d0f518b18cf405e5376bddf91e6a63d5151fce3fe4eca | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
a12ea9b237d423fa75e567449d7b9f183ac3e98cdcbe868e07135e04aeb9424d | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
e47d272a4301819a599fc0a370aa9d15af3d8f83cd4e6ca380f1fb4561c3723b | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
20cc8d1bff7b9a2375da6f8c731c2632a6e0fe6eb388a4c556bb0032d20df730 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
de9c8b7ae658a056c830b62a773e7e8d302adea492e4b3e550b927f057e826a8 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
416a0ee099453af90c3022690fc52728947b0740706353212bc34a693718a5d8 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
007ae022b2cb11fcae79b9babf8d5e244be67b1f4bc02fab008ec5052955d748 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7f3c9cae63802870f38106bf2d36d28689fa2daf827e246790280250835281c2 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
706ec2dc01ddf4465f38aa3e7ca09204d592db06baff18bdcd32bfc95666cd97 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7ca15b5fa4ceb3262ee08727c462d6a617d470e2d2fb2f63457be63318bf64d2 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
251b6fd64ae2e9b1308f9cf7cde949bb8caf06ec765663aa8ce4285ff23458e6 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
bfc3372811c89f7c7682b444aed41cb36343750adfcf853d9182205202626d83 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
326620e99e466c0792d17ec12a5bcdb7f7566cc072226beb11907a77d77f9749 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
e2e8c5aaed4517059d66c290a8eaf6e0d5fb210f719fa5d06709fbf918a85894 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7af9d5c066a5fd8f02d4b7cd29a23bc40b2368a483746b8dd4de9879ade75535 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
4205209114bb88c0294a58c48df24275becf5f85a9987a21aea61dedfc1684e2 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
3b351c763e1b67197e9f68b19b057f3cbcc8eb77ddccae5b22f59503ea0c047e | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
5a5510be01ccd93966e49795339aad2175211dad3041f80f6aa4a3968aa658a3 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
0ca1df018cd88440ad08e67448a12cd96ac411ed709925ae16989653c9d870c9 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
cff36730c11d0e51c9ce9492f1557eb8a902ab58194decb1fb535b1624398066 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
055938b22f40d4d6f41cd2517c8c7a090103fcc08a5ddf118f561f1cfd97574b | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
6259316d38e513023397e65a6db5f1b7beb0ce3a135cb304a27327828234cccc | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
6e8f3e478e2fb2f72b063692ad72e3a10685be7c92e19b4dbb85ec1c113b443d | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
70915cc2b320821753d226284e12a8690a35088fd07475a9d327b42e3a940fec | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
99a7966d084d2b61120a9c5158cef9aa8f8d502c08a5ff4aa781c0817583ba99 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
01e6c2fa7399b2a72e2a0f036a901bcbf7c0875bac2696e93a28f1a218671f34 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
8ca9f2d9c2fd8571568fe36791abe9a05c5a4afc3dcc05ff03a98b06c3cbb002 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
1420ddf6d4eab08e139a5e964606e01c36313198227e7798ff9cf71ccb660d6a | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.41 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
fb79ef59956921e153584aa255655047ee14a6450607080bdbe67ce8559c4f8f | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
9fee1d1be3383943b5da0a8ae1c44c471b9a8d374428316628c1b218700c2be4 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7e03caf80b3f871fef011ab1fa04a5a935ceaaf6071cdd8ef53e25efa6a49eee | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
c710a4be8cea1f6d8ecf68d35d40c097778e68abf70490dd4d7a0b27d34ac6c7 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
3d3cec1e56e6c222ce11d185525a3480e7ac79e19682253346c6df626fe62356 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
d300203f26a7ec40e654082b72cdc606ba68bc5229d9580eb9406b0a87ed47e4 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
eab0281e7afb8d88ab45eadeaeed981ec6c4e5d21152e5d80d1ebd8979b1b1d5 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
8719718c520445de024131293815c765ebaad1902a7982fa487021005088eb71 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
62e10d59082f6c255fdbca2d3cee9a973582ff7e6b4e5a9754edc2baca179e17 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
e78e9bdbd006c9b4a762a18e63e0f7c46dde16cbecb1c6c4e550688767da226b | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
9d77b6e5a61275417da7f68ffa7ec31ed3907ad2b390b1c39e9ca56d36fa304e | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
1717aa1d359229dd9cb4425ba27113ca6eed1234e73dc35da0dddcd7e7df86f1 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
22aefe725953a1c119a3aaa9bc2e5e2f5d7e6fbec61eeb2b4b650222e7cbe4ba | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
ec4d0fd15c24995c7209e33ac4bf7a525714f77af58e119df28ef22052bc0fc3 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
e4fb886fdcebf91b01a44cc9d2f5df5a77c232fb22c6da3c07535dd20a3282ca | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
3ff8399aa912e4738a08f31e355fee95909bf8d9408179cc81093636ca633b7e | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
29437c5f5dca27ffe7b6c0ba57e7d6418016116fb808a534511e1e2466d40838 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.4 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.57 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.92 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.85 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.91 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
818192f693b06cbe77e164442273458db9e64bf456706ad54bf89ddb4ce7950f | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018600 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-05-30 07:53 (UTC) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018558 | 0x00018600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.56 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.97 |
.data | 0x1001F000 | 0x000020D0 | 0x00002000 | 0x0001D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.86 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.29 |
.reloc | 0x10023000 | 0x00000CBC | 0x00000E00 | 0x0001F800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.41 |
Imports (6)
»
msvcrt.dll (18)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_snprintf | - | 0x1001A0F4 | 0x0001E2C4 | 0x0001CCC4 | 0x000002F5 |
memchr | - | 0x1001A0F8 | 0x0001E2C8 | 0x0001CCC8 | 0x000004AE |
malloc | - | 0x1001A0FC | 0x0001E2CC | 0x0001CCCC | 0x000004A4 |
_errno | - | 0x1001A100 | 0x0001E2D0 | 0x0001CCD0 | 0x0000011C |
_strtoi64 | - | 0x1001A104 | 0x0001E2D4 | 0x0001CCD4 | 0x0000033A |
_vsnprintf | - | 0x1001A108 | 0x0001E2D8 | 0x0001CCD8 | 0x0000038E |
memset | - | 0x1001A10C | 0x0001E2DC | 0x0001CCDC | 0x000004B4 |
qsort | - | 0x1001A110 | 0x0001E2E0 | 0x0001CCE0 | 0x000004C0 |
_ftol2_sse | - | 0x1001A114 | 0x0001E2E4 | 0x0001CCE4 | 0x0000015B |
_vsnwprintf | - | 0x1001A118 | 0x0001E2E8 | 0x0001CCE8 | 0x00000394 |
free | - | 0x1001A11C | 0x0001E2EC | 0x0001CCEC | 0x0000046C |
_time64 | - | 0x1001A120 | 0x0001E2F0 | 0x0001CCF0 | 0x00000354 |
strncpy | - | 0x1001A124 | 0x0001E2F4 | 0x0001CCF4 | 0x000004E6 |
strchr | - | 0x1001A128 | 0x0001E2F8 | 0x0001CCF8 | 0x000004D9 |
strtod | - | 0x1001A12C | 0x0001E2FC | 0x0001CCFC | 0x000004ED |
localeconv | - | 0x1001A130 | 0x0001E300 | 0x0001CD00 | 0x0000049F |
memcpy | - | 0x1001A134 | 0x0001E304 | 0x0001CD04 | 0x000004B0 |
atol | - | 0x1001A138 | 0x0001E308 | 0x0001CD08 | 0x00000447 |
KERNEL32.dll (47)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FindNextFileW | - | 0x1001A000 | 0x0001E1D0 | 0x0001CBD0 | 0x0000018F |
GetTickCount | - | 0x1001A004 | 0x0001E1D4 | 0x0001CBD4 | 0x0000030A |
SetThreadPriority | - | 0x1001A008 | 0x0001E1D8 | 0x0001CBD8 | 0x00000562 |
FlushFileBuffers | - | 0x1001A00C | 0x0001E1DC | 0x0001CBDC | 0x000001A2 |
LocalAlloc | - | 0x1001A010 | 0x0001E1E0 | 0x0001CBE0 | 0x000003CE |
GetExitCodeProcess | - | 0x1001A014 | 0x0001E1E4 | 0x0001CBE4 | 0x0000023F |
GetSystemTimeAsFileTime | - | 0x1001A018 | 0x0001E1E8 | 0x0001CBE8 | 0x000002EC |
GetFileAttributesW | - | 0x1001A01C | 0x0001E1EC | 0x0001CBEC | 0x00000248 |
MultiByteToWideChar | - | 0x1001A020 | 0x0001E1F0 | 0x0001CBF0 | 0x000003F3 |
SetCurrentDirectoryA | - | 0x1001A024 | 0x0001E1F4 | 0x0001CBF4 | 0x0000050A |
Sleep | - | 0x1001A028 | 0x0001E1F8 | 0x0001CBF8 | 0x00000581 |
lstrcmpiW | - | 0x1001A02C | 0x0001E1FC | 0x0001CBFC | 0x00000637 |
GetDriveTypeW | - | 0x1001A030 | 0x0001E200 | 0x0001CC00 | 0x00000232 |
GetLastError | - | 0x1001A034 | 0x0001E204 | 0x0001CC04 | 0x00000264 |
CreateDirectoryW | - | 0x1001A038 | 0x0001E208 | 0x0001CC08 | 0x000000BD |
lstrcatA | - | 0x1001A03C | 0x0001E20C | 0x0001CC0C | 0x00000630 |
CreateMutexW | - | 0x1001A040 | 0x0001E210 | 0x0001CC10 | 0x000000DD |
GetCurrentThread | - | 0x1001A044 | 0x0001E214 | 0x0001CC14 | 0x0000021E |
GetProcessId | - | 0x1001A048 | 0x0001E218 | 0x0001CC18 | 0x000002B9 |
DisconnectNamedPipe | - | 0x1001A04C | 0x0001E21C | 0x0001CC1C | 0x00000125 |
lstrcmpA | - | 0x1001A050 | 0x0001E220 | 0x0001CC20 | 0x00000633 |
K32GetModuleFileNameExW | - | 0x1001A054 | 0x0001E224 | 0x0001CC24 | 0x000003A7 |
MoveFileW | - | 0x1001A058 | 0x0001E228 | 0x0001CC28 | 0x000003EF |
ExitThread | - | 0x1001A05C | 0x0001E22C | 0x0001CC2C | 0x00000162 |
GetNumberFormatA | - | 0x1001A060 | 0x0001E230 | 0x0001CC30 | 0x00000294 |
GetCurrentProcessId | - | 0x1001A064 | 0x0001E234 | 0x0001CC34 | 0x0000021B |
SwitchToThread | - | 0x1001A068 | 0x0001E238 | 0x0001CC38 | 0x0000058B |
GetModuleHandleW | - | 0x1001A06C | 0x0001E23C | 0x0001CC3C | 0x0000027B |
GetProcAddress | - | 0x1001A070 | 0x0001E240 | 0x0001CC40 | 0x000002B1 |
HeapCreate | - | 0x1001A074 | 0x0001E244 | 0x0001CC44 | 0x0000034A |
HeapFree | - | 0x1001A078 | 0x0001E248 | 0x0001CC48 | 0x0000034C |
HeapAlloc | - | 0x1001A07C | 0x0001E24C | 0x0001CC4C | 0x00000348 |
GetModuleHandleA | - | 0x1001A080 | 0x0001E250 | 0x0001CC50 | 0x00000278 |
LoadLibraryA | - | 0x1001A084 | 0x0001E254 | 0x0001CC54 | 0x000003C5 |
GetCurrentProcess | - | 0x1001A088 | 0x0001E258 | 0x0001CC58 | 0x0000021A |
lstrcatW | - | 0x1001A08C | 0x0001E25C | 0x0001CC5C | 0x00000631 |
WideCharToMultiByte | - | 0x1001A090 | 0x0001E260 | 0x0001CC60 | 0x00000602 |
FindFirstFileW | - | 0x1001A094 | 0x0001E264 | 0x0001CC64 | 0x00000183 |
GetWindowsDirectoryW | - | 0x1001A098 | 0x0001E268 | 0x0001CC68 | 0x00000329 |
SetFileAttributesW | - | 0x1001A09C | 0x0001E26C | 0x0001CC6C | 0x0000051F |
lstrlenW | - | 0x1001A0A0 | 0x0001E270 | 0x0001CC70 | 0x00000640 |
LoadLibraryW | - | 0x1001A0A4 | 0x0001E274 | 0x0001CC74 | 0x000003C8 |
FreeLibrary | - | 0x1001A0A8 | 0x0001E278 | 0x0001CC78 | 0x000001AE |
GetCommandLineW | - | 0x1001A0AC | 0x0001E27C | 0x0001CC7C | 0x000001DA |
GetVersionExA | - | 0x1001A0B0 | 0x0001E280 | 0x0001CC80 | 0x0000031D |
GetSystemInfo | - | 0x1001A0B4 | 0x0001E284 | 0x0001CC84 | 0x000002E6 |
GetCurrentDirectoryW | - | 0x1001A0B8 | 0x0001E288 | 0x0001CC88 | 0x00000214 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CharUpperBuffA | - | 0x1001A0E8 | 0x0001E2B8 | 0x0001CCB8 | 0x0000003D |
CharUpperBuffW | - | 0x1001A0EC | 0x0001E2BC | 0x0001CCBC | 0x0000003E |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CommandLineToArgvW | - | 0x1001A0E0 | 0x0001E2B0 | 0x0001CCB0 | 0x00000008 |
ole32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoCreateInstance | - | 0x1001A140 | 0x0001E310 | 0x0001CD10 | 0x00000028 |
CoInitializeEx | - | 0x1001A144 | 0x0001E314 | 0x0001CD14 | 0x0000005E |
CoSetProxyBlanket | - | 0x1001A148 | 0x0001E318 | 0x0001CD18 | 0x00000084 |
CoInitializeSecurity | - | 0x1001A14C | 0x0001E31C | 0x0001CD1C | 0x0000005F |
OLEAUT32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SafeArrayGetLBound | 0x00000014 | 0x1001A0C0 | 0x0001E290 | 0x0001CC90 | - |
SysFreeString | 0x00000006 | 0x1001A0C4 | 0x0001E294 | 0x0001CC94 | - |
SysAllocString | 0x00000002 | 0x1001A0C8 | 0x0001E298 | 0x0001CC98 | - |
VariantClear | 0x00000009 | 0x1001A0CC | 0x0001E29C | 0x0001CC9C | - |
SafeArrayGetUBound | 0x00000013 | 0x1001A0D0 | 0x0001E2A0 | 0x0001CCA0 | - |
SafeArrayDestroy | 0x00000010 | 0x1001A0D4 | 0x0001E2A4 | 0x0001CCA4 | - |
SafeArrayGetElement | 0x00000019 | 0x1001A0D8 | 0x0001E2A8 | 0x0001CCA8 | - |
Exports (1)
»
API Name | EAT Address | Ordinal |
---|---|---|
next | 0x00001000 | 0x00000001 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
C:\Users\RDhJ0CNFevzX\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001390 |
Size Of Code | 0x000A8400 |
Size Of Initialized Data | 0x000CDA00 |
Size Of Uninitialized Data | 0x00110400 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_CUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-03-12 11:33 (UTC) |
Version Information (8)
»
CompanyName | FFmpeg Project |
FileDescription | FFmpeg utility library |
FileVersion | 57.42.100 |
InternalName | libavutil |
LegalCopyright | Copyright (C) 2000-2022 FFmpeg Project |
OriginalFilename | avutil-ics-57.dll |
ProductName | FFmpeg |
ProductVersion | git-2023-03-02-c6feb54181 |
Sections (10)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x000A8334 | 0x000A8400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.44 |
.data | 0x100AA000 | 0x00000100 | 0x00000200 | 0x000A8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.14 |
.rdata | 0x100AB000 | 0x0001B37C | 0x0001B400 | 0x000A8A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ | 5.34 |
.bss | 0x100C7000 | 0x00110244 | 0x00000000 | 0x000C3E00 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.edata | 0x101D8000 | 0x00004368 | 0x00004400 | 0x000C3E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ | 5.49 |
.idata | 0x101DD000 | 0x0000123C | 0x00001400 | 0x000C8200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.17 |
.CRT | 0x101DF000 | 0x00000030 | 0x00000200 | 0x000C9600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.25 |
.tls | 0x101E0000 | 0x00000008 | 0x00000200 | 0x000C9800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x101E1000 | 0x0001A662 | 0x0001B000 | 0x000C9A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.91 |
.reloc | 0x101FC000 | 0x00003FD8 | 0x00004000 | 0x000E4A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.61 |
Imports (3)
»
bcrypt.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
BCryptCloseAlgorithmProvider | - | 0x101DD2E8 | 0x001DD050 | 0x000C8250 | 0x00000003 |
BCryptGenRandom | - | 0x101DD2EC | 0x001DD054 | 0x000C8254 | 0x0000001E |
BCryptOpenAlgorithmProvider | - | 0x101DD2F0 | 0x001DD058 | 0x000C8258 | 0x00000028 |
KERNEL32.dll (76)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
AcquireSRWLockExclusive | - | 0x101DD2F8 | 0x001DD060 | 0x000C8260 | 0x00000002 |
AddVectoredExceptionHandler | - | 0x101DD2FC | 0x001DD064 | 0x000C8264 | 0x00000015 |
CloseHandle | - | 0x101DD300 | 0x001DD068 | 0x000C8268 | 0x00000088 |
CreateEventA | - | 0x101DD304 | 0x001DD06C | 0x000C826C | 0x000000C0 |
CreateFileMappingA | - | 0x101DD308 | 0x001DD070 | 0x000C8270 | 0x000000C8 |
CreateSemaphoreA | - | 0x101DD30C | 0x001DD074 | 0x000C8274 | 0x000000ED |
DeleteCriticalSection | - | 0x101DD310 | 0x001DD078 | 0x000C8278 | 0x00000115 |
DuplicateHandle | - | 0x101DD314 | 0x001DD07C | 0x000C827C | 0x00000130 |
EnterCriticalSection | - | 0x101DD318 | 0x001DD080 | 0x000C8280 | 0x00000136 |
FileTimeToSystemTime | - | 0x101DD31C | 0x001DD084 | 0x000C8284 | 0x00000170 |
GetConsoleMode | - | 0x101DD320 | 0x001DD088 | 0x000C8288 | 0x00000204 |
GetConsoleScreenBufferInfo | - | 0x101DD324 | 0x001DD08C | 0x000C828C | 0x0000020A |
GetCurrentProcess | - | 0x101DD328 | 0x001DD090 | 0x000C8290 | 0x0000021F |
GetCurrentProcessId | - | 0x101DD32C | 0x001DD094 | 0x000C8294 | 0x00000220 |
GetCurrentThread | - | 0x101DD330 | 0x001DD098 | 0x000C8298 | 0x00000223 |
GetCurrentThreadId | - | 0x101DD334 | 0x001DD09C | 0x000C829C | 0x00000224 |
GetFullPathNameW | - | 0x101DD338 | 0x001DD0A0 | 0x000C82A0 | 0x00000261 |
GetHandleInformation | - | 0x101DD33C | 0x001DD0A4 | 0x000C82A4 | 0x00000266 |
GetLastError | - | 0x101DD340 | 0x001DD0A8 | 0x000C82A8 | 0x00000269 |
GetModuleHandleA | - | 0x101DD344 | 0x001DD0AC | 0x000C82AC | 0x0000027D |
GetModuleHandleW | - | 0x101DD348 | 0x001DD0B0 | 0x000C82B0 | 0x00000280 |
GetProcAddress | - | 0x101DD34C | 0x001DD0B4 | 0x000C82B4 | 0x000002B6 |
GetProcessAffinityMask | - | 0x101DD350 | 0x001DD0B8 | 0x000C82B8 | 0x000002B7 |
GetProcessTimes | - | 0x101DD354 | 0x001DD0BC | 0x000C82BC | 0x000002C6 |
GetStdHandle | - | 0x101DD358 | 0x001DD0C0 | 0x000C82C0 | 0x000002DC |
GetSystemTimeAdjustment | - | 0x101DD35C | 0x001DD0C4 | 0x000C82C4 | 0x000002F2 |
GetSystemTimeAsFileTime | - | 0x101DD360 | 0x001DD0C8 | 0x000C82C8 | 0x000002F3 |
GetThreadContext | - | 0x101DD364 | 0x001DD0CC | 0x000C82CC | 0x00000301 |
GetThreadPriority | - | 0x101DD368 | 0x001DD0D0 | 0x000C82D0 | 0x0000030B |
GetThreadTimes | - | 0x101DD36C | 0x001DD0D4 | 0x000C82D4 | 0x0000030F |
GetTickCount64 | - | 0x101DD370 | 0x001DD0D8 | 0x000C82D8 | 0x00000311 |
GetTimeZoneInformation | - | 0x101DD374 | 0x001DD0DC | 0x000C82DC | 0x00000318 |
InitOnceBeginInitialize | - | 0x101DD378 | 0x001DD0E0 | 0x000C82E0 | 0x00000366 |
InitOnceComplete | - | 0x101DD37C | 0x001DD0E4 | 0x000C82E4 | 0x00000367 |
InitializeConditionVariable | - | 0x101DD380 | 0x001DD0E8 | 0x000C82E8 | 0x0000036A |
InitializeCriticalSection | - | 0x101DD384 | 0x001DD0EC | 0x000C82EC | 0x0000036D |
InitializeSRWLock | - | 0x101DD388 | 0x001DD0F0 | 0x000C82F0 | 0x00000373 |
IsDBCSLeadByteEx | - | 0x101DD38C | 0x001DD0F4 | 0x000C82F4 | 0x0000038D |
IsDebuggerPresent | - | 0x101DD390 | 0x001DD0F8 | 0x000C82F8 | 0x0000038E |
LeaveCriticalSection | - | 0x101DD394 | 0x001DD0FC | 0x000C82FC | 0x000003CD |
MapViewOfFile | - | 0x101DD398 | 0x001DD100 | 0x000C8300 | 0x000003EE |
MultiByteToWideChar | - | 0x101DD39C | 0x001DD104 | 0x000C8304 | 0x00000400 |
OpenProcess | - | 0x101DD3A0 | 0x001DD108 | 0x000C8308 | 0x0000041F |
OutputDebugStringA | - | 0x101DD3A4 | 0x001DD10C | 0x000C830C | 0x00000429 |
QueryPerformanceCounter | - | 0x101DD3A8 | 0x001DD110 | 0x000C8310 | 0x0000045E |
QueryPerformanceFrequency | - | 0x101DD3AC | 0x001DD114 | 0x000C8314 | 0x0000045F |
RaiseException | - | 0x101DD3B0 | 0x001DD118 | 0x000C8318 | 0x00000474 |
ReleaseSRWLockExclusive | - | 0x101DD3B4 | 0x001DD11C | 0x000C831C | 0x0000049C |
ReleaseSemaphore | - | 0x101DD3B8 | 0x001DD120 | 0x000C8320 | 0x0000049E |
RemoveVectoredExceptionHandler | - | 0x101DD3BC | 0x001DD124 | 0x000C8324 | 0x000004A9 |
ResetEvent | - | 0x101DD3C0 | 0x001DD128 | 0x000C8328 | 0x000004B0 |
ResumeThread | - | 0x101DD3C4 | 0x001DD12C | 0x000C832C | 0x000004B7 |
SetConsoleTextAttribute | - | 0x101DD3C8 | 0x001DD130 | 0x000C8330 | 0x000004EE |
SetEvent | - | 0x101DD3CC | 0x001DD134 | 0x000C8334 | 0x00000502 |
SetLastError | - | 0x101DD3D0 | 0x001DD138 | 0x000C8338 | 0x0000051E |
SetProcessAffinityMask | - | 0x101DD3D4 | 0x001DD13C | 0x000C833C | 0x00000529 |
SetSystemTime | - | 0x101DD3D8 | 0x001DD140 | 0x000C8340 | 0x0000053B |
SetThreadContext | - | 0x101DD3DC | 0x001DD144 | 0x000C8344 | 0x00000541 |
SetThreadPriority | - | 0x101DD3E0 | 0x001DD148 | 0x000C8348 | 0x0000054B |
Sleep | - | 0x101DD3E4 | 0x001DD14C | 0x000C834C | 0x0000056A |
SleepConditionVariableSRW | - | 0x101DD3E8 | 0x001DD150 | 0x000C8350 | 0x0000056C |
SuspendThread | - | 0x101DD3EC | 0x001DD154 | 0x000C8354 | 0x00000572 |
TlsAlloc | - | 0x101DD3F0 | 0x001DD158 | 0x000C8358 | 0x0000058B |
TlsGetValue | - | 0x101DD3F4 | 0x001DD15C | 0x000C835C | 0x0000058D |
TlsSetValue | - | 0x101DD3F8 | 0x001DD160 | 0x000C8360 | 0x0000058E |
TryEnterCriticalSection | - | 0x101DD3FC | 0x001DD164 | 0x000C8364 | 0x00000595 |
UnmapViewOfFile | - | 0x101DD400 | 0x001DD168 | 0x000C8368 | 0x0000059E |
VirtualProtect | - | 0x101DD404 | 0x001DD16C | 0x000C836C | 0x000005BD |
VirtualQuery | - | 0x101DD408 | 0x001DD170 | 0x000C8370 | 0x000005C0 |
WaitForMultipleObjects | - | 0x101DD40C | 0x001DD174 | 0x000C8374 | 0x000005C7 |
WaitForSingleObject | - | 0x101DD410 | 0x001DD178 | 0x000C8378 | 0x000005C9 |
WaitForSingleObjectEx | - | 0x101DD414 | 0x001DD17C | 0x000C837C | 0x000005CA |
WakeAllConditionVariable | - | 0x101DD418 | 0x001DD180 | 0x000C8380 | 0x000005D1 |
WakeConditionVariable | - | 0x101DD41C | 0x001DD184 | 0x000C8384 | 0x000005D2 |
WideCharToMultiByte | - | 0x101DD420 | 0x001DD188 | 0x000C8388 | 0x000005F2 |
WriteConsoleW | - | 0x101DD424 | 0x001DD18C | 0x000C838C | 0x00000605 |
msvcrt.dll (84)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
__mb_cur_max | - | 0x101DD42C | 0x001DD194 | 0x000C8394 | 0x00000045 |
__setusermatherr | - | 0x101DD430 | 0x001DD198 | 0x000C8398 | 0x0000006B |
_aligned_free | - | 0x101DD434 | 0x001DD19C | 0x000C839C | 0x00000089 |
_aligned_malloc | - | 0x101DD438 | 0x001DD1A0 | 0x000C83A0 | 0x0000008A |
_aligned_realloc | - | 0x101DD43C | 0x001DD1A4 | 0x000C83A4 | 0x0000008D |
_amsg_exit | - | 0x101DD440 | 0x001DD1A8 | 0x000C83A8 | 0x0000008E |
_beginthreadex | - | 0x101DD444 | 0x001DD1AC | 0x000C83AC | 0x0000009B |
_endthreadex | - | 0x101DD448 | 0x001DD1B0 | 0x000C83B0 | 0x0000013F |
_errno | - | 0x101DD44C | 0x001DD1B4 | 0x000C83B4 | 0x00000142 |
_fstat64 | - | 0x101DD450 | 0x001DD1B8 | 0x000C83B8 | 0x000000E5 |
_get_osfhandle | - | 0x101DD454 | 0x001DD1BC | 0x000C83BC | 0x000000F5 |
_gmtime64 | - | 0x101DD458 | 0x001DD1C0 | 0x000C83C0 | 0x00000146 |
_hypot | - | 0x101DD45C | 0x001DD1C4 | 0x000C83C4 | 0x0000014D |
_initterm | - | 0x101DD460 | 0x001DD1C8 | 0x000C83C8 | 0x00000152 |
_iob | - | 0x101DD464 | 0x001DD1CC | 0x000C83CC | 0x00000156 |
_localtime64 | - | 0x101DD468 | 0x001DD1D0 | 0x000C83D0 | 0x000001B8 |
_lock | - | 0x101DD46C | 0x001DD1D4 | 0x000C83D4 | 0x000001B9 |
_mktime64 | - | 0x101DD470 | 0x001DD1D8 | 0x000C83D8 | 0x00000237 |
_setjmp3 | - | 0x101DD474 | 0x001DD1DC | 0x000C83DC | 0x0000026E |
_sopen | - | 0x101DD478 | 0x001DD1E0 | 0x000C83E0 | 0x00000286 |
_ultoa | - | 0x101DD47C | 0x001DD1E4 | 0x000C83E4 | 0x000002D8 |
_unlock | - | 0x101DD480 | 0x001DD1E8 | 0x000C83E8 | 0x000002E1 |
_wsopen | - | 0x101DD484 | 0x001DD1EC | 0x000C83EC | 0x0000037A |
abort | - | 0x101DD488 | 0x001DD1F0 | 0x000C83F0 | 0x0000039A |
acos | - | 0x101DD48C | 0x001DD1F4 | 0x000C83F4 | 0x0000039C |
asin | - | 0x101DD490 | 0x001DD1F8 | 0x000C83F8 | 0x0000039E |
atan | - | 0x101DD494 | 0x001DD1FC | 0x000C83FC | 0x0000039F |
atoi | - | 0x101DD498 | 0x001DD200 | 0x000C8400 | 0x000003A3 |
bsearch | - | 0x101DD49C | 0x001DD204 | 0x000C8404 | 0x000003A5 |
calloc | - | 0x101DD4A0 | 0x001DD208 | 0x000C8408 | 0x000003A7 |
clock | - | 0x101DD4A4 | 0x001DD20C | 0x000C840C | 0x000003AB |
cosh | - | 0x101DD4A8 | 0x001DD210 | 0x000C8410 | 0x000003AD |
exit | - | 0x101DD4AC | 0x001DD214 | 0x000C8414 | 0x000003B1 |
fprintf | - | 0x101DD4B0 | 0x001DD218 | 0x000C8418 | 0x000003C2 |
fputc | - | 0x101DD4B4 | 0x001DD21C | 0x000C841C | 0x000003C4 |
fputs | - | 0x101DD4B8 | 0x001DD220 | 0x000C8420 | 0x000003C5 |
free | - | 0x101DD4BC | 0x001DD224 | 0x000C8424 | 0x000003C9 |
fwrite | - | 0x101DD4C0 | 0x001DD228 | 0x000C8428 | 0x000003D6 |
getc | - | 0x101DD4C4 | 0x001DD22C | 0x000C842C | 0x000003DA |
getenv | - | 0x101DD4C8 | 0x001DD230 | 0x000C8430 | 0x000003DC |
islower | - | 0x101DD4CC | 0x001DD234 | 0x000C8434 | 0x000003E9 |
isspace | - | 0x101DD4D0 | 0x001DD238 | 0x000C8438 | 0x000003EC |
isupper | - | 0x101DD4D4 | 0x001DD23C | 0x000C843C | 0x000003ED |
isxdigit | - | 0x101DD4D8 | 0x001DD240 | 0x000C8440 | 0x000003FB |
localeconv | - | 0x101DD4DC | 0x001DD244 | 0x000C8444 | 0x000003FF |
log10 | - | 0x101DD4E0 | 0x001DD248 | 0x000C8448 | 0x00000402 |
malloc | - | 0x101DD4E4 | 0x001DD24C | 0x000C844C | 0x00000403 |
memchr | - | 0x101DD4E8 | 0x001DD250 | 0x000C8450 | 0x00000409 |
memcmp | - | 0x101DD4EC | 0x001DD254 | 0x000C8454 | 0x0000040A |
memcpy | - | 0x101DD4F0 | 0x001DD258 | 0x000C8458 | 0x0000040B |
memmove | - | 0x101DD4F4 | 0x001DD25C | 0x000C845C | 0x0000040C |
memset | - | 0x101DD4F8 | 0x001DD260 | 0x000C8460 | 0x0000040D |
printf | - | 0x101DD4FC | 0x001DD264 | 0x000C8464 | 0x00000413 |
rand | - | 0x101DD500 | 0x001DD268 | 0x000C8468 | 0x0000041D |
realloc | - | 0x101DD504 | 0x001DD26C | 0x000C846C | 0x0000041E |
setlocale | - | 0x101DD508 | 0x001DD270 | 0x000C8470 | 0x00000426 |
sinh | - | 0x101DD50C | 0x001DD274 | 0x000C8474 | 0x0000042A |
strchr | - | 0x101DD510 | 0x001DD278 | 0x000C8478 | 0x00000434 |
strcmp | - | 0x101DD514 | 0x001DD27C | 0x000C847C | 0x00000435 |
strcpy | - | 0x101DD518 | 0x001DD280 | 0x000C8480 | 0x00000437 |
strcspn | - | 0x101DD51C | 0x001DD284 | 0x000C8484 | 0x00000439 |
strerror | - | 0x101DD520 | 0x001DD288 | 0x000C8488 | 0x0000043A |
strftime | - | 0x101DD524 | 0x001DD28C | 0x000C848C | 0x0000043B |
strlen | - | 0x101DD528 | 0x001DD290 | 0x000C8490 | 0x0000043C |
strncmp | - | 0x101DD52C | 0x001DD294 | 0x000C8494 | 0x0000043F |
strrchr | - | 0x101DD530 | 0x001DD298 | 0x000C8498 | 0x00000443 |
strspn | - | 0x101DD534 | 0x001DD29C | 0x000C849C | 0x00000444 |
strstr | - | 0x101DD538 | 0x001DD2A0 | 0x000C84A0 | 0x00000445 |
strtol | - | 0x101DD53C | 0x001DD2A4 | 0x000C84A4 | 0x00000449 |
strtoul | - | 0x101DD540 | 0x001DD2A8 | 0x000C84A8 | 0x0000044A |
tan | - | 0x101DD544 | 0x001DD2AC | 0x000C84AC | 0x00000453 |
tanh | - | 0x101DD548 | 0x001DD2B0 | 0x000C84B0 | 0x00000454 |
tolower | - | 0x101DD54C | 0x001DD2B4 | 0x000C84B4 | 0x0000045A |
ungetc | - | 0x101DD550 | 0x001DD2B8 | 0x000C84B8 | 0x0000045E |
vfprintf | - | 0x101DD554 | 0x001DD2BC | 0x000C84BC | 0x00000461 |
wcscat | - | 0x101DD558 | 0x001DD2C0 | 0x000C84C0 | 0x00000472 |
wcscpy | - | 0x101DD55C | 0x001DD2C4 | 0x000C84C4 | 0x00000477 |
wcslen | - | 0x101DD560 | 0x001DD2C8 | 0x000C84C8 | 0x0000047B |
longjmp | - | 0x101DD564 | 0x001DD2CC | 0x000C84CC | 0x000004BA |
_strdup | - | 0x101DD568 | 0x001DD2D0 | 0x000C84D0 | 0x000004E1 |
_read | - | 0x101DD56C | 0x001DD2D4 | 0x000C84D4 | 0x000004F0 |
_isatty | - | 0x101DD570 | 0x001DD2D8 | 0x000C84D8 | 0x00000501 |
_fdopen | - | 0x101DD574 | 0x001DD2DC | 0x000C84DC | 0x0000050F |
_close | - | 0x101DD578 | 0x001DD2E0 | 0x000C84E0 | 0x0000051F |
Exports (583)
»
API Name | EAT Address | Ordinal |
---|---|---|
mv_add_i | 0x00021110 | 0x00000001 |
mv_add_q | 0x00032E70 | 0x00000002 |
mv_add_stable | 0x000252F0 | 0x00000003 |
mv_adler32_update | 0x00001410 | 0x00000004 |
mv_aes_alloc | 0x00001BD0 | 0x00000005 |
mv_aes_crypt | 0x00001BF0 | 0x00000006 |
mv_aes_ctr_alloc | 0x000022F0 | 0x00000007 |
mv_aes_ctr_crypt | 0x00002480 | 0x00000008 |
mv_aes_ctr_free | 0x00002420 | 0x00000009 |
mv_aes_ctr_get_iv | 0x00002370 | 0x0000000A |
mv_aes_ctr_increment_iv | 0x00002430 | 0x0000000B |
mv_aes_ctr_init | 0x000023C0 | 0x0000000C |
mv_aes_ctr_set_full_iv | 0x00002340 | 0x0000000D |
mv_aes_ctr_set_iv | 0x00002310 | 0x0000000E |
mv_aes_ctr_set_random_iv | 0x00002380 | 0x0000000F |
mv_aes_init | 0x00001C10 | 0x00000010 |
mv_aes_size | 0x000AB00C | 0x00000011 |
mv_append_path_component | 0x00006EB0 | 0x00000012 |
mv_asprintf | 0x00006850 | 0x00000013 |
mv_assert0_fpu | 0x0008A480 | 0x00000014 |
mv_audio_fifo_alloc | 0x00002670 | 0x00000015 |
mv_audio_fifo_drain | 0x00002AF0 | 0x00000016 |
mv_audio_fifo_free | 0x00002610 | 0x00000017 |
mv_audio_fifo_peek | 0x00002900 | 0x00000018 |
mv_audio_fifo_peek_at | 0x00002990 | 0x00000019 |
mv_audio_fifo_read | 0x00002A40 | 0x0000001A |
mv_audio_fifo_realloc | 0x000027B0 | 0x0000001B |
mv_audio_fifo_reset | 0x00002B70 | 0x0000001C |
mv_audio_fifo_size | 0x00002BB0 | 0x0000001D |
mv_audio_fifo_space | 0x00002BC0 | 0x0000001E |
mv_audio_fifo_write | 0x00002850 | 0x0000001F |
mv_base64_decode | 0x000076C0 | 0x00000020 |
mv_base64_encode | 0x000078D0 | 0x00000021 |
mv_basename | 0x00006D70 | 0x00000022 |
mv_blowfish_alloc | 0x00007DA0 | 0x00000023 |
mv_blowfish_crypt | 0x000084B0 | 0x00000024 |
mv_blowfish_crypt_ecb | 0x00007DC0 | 0x00000025 |
mv_blowfish_init | 0x000A3F90 | 0x00000026 |
mv_bmg_get | 0x000224C0 | 0x00000027 |
mv_bprint_append_data | 0x00008F30 | 0x00000028 |
mv_bprint_channel_layout | 0x0000C9F0 | 0x00000029 |
mv_bprint_chars | 0x00008D20 | 0x0000002A |
mv_bprint_clear | 0x00009670 | 0x0000002B |
mv_bprint_escape | 0x00009730 | 0x0000002C |
mv_bprint_finalize | 0x00009690 | 0x0000002D |
mv_bprint_get_buffer | 0x00009500 | 0x0000002E |
mv_bprint_init | 0x00008880 | 0x0000002F |
mv_bprint_init_for_buffer | 0x000089A0 | 0x00000030 |
mv_bprint_strftime | 0x00009130 | 0x00000031 |
mv_bprintf | 0x000089C0 | 0x00000032 |
mv_buffer_alloc | 0x00009DC0 | 0x00000033 |
mv_buffer_allocz | 0x00009EF0 | 0x00000034 |
mv_buffer_create | 0x00009E60 | 0x00000035 |
mv_buffer_default_free | 0x00009D10 | 0x00000036 |
mv_buffer_get_opaque | 0x0000A090 | 0x00000037 |
mv_buffer_get_ref_count | 0x0000A0A0 | 0x00000038 |
mv_buffer_is_writable | 0x0000A070 | 0x00000039 |
mv_buffer_make_writable | 0x0000A0B0 | 0x0000003A |
mv_buffer_pool_buffer_get_opaque | 0x0000A9B0 | 0x0000003B |
mv_buffer_pool_get | 0x0000A720 | 0x0000003C |
mv_buffer_pool_init | 0x0000A5F0 | 0x0000003D |
mv_buffer_pool_init2 | 0x0000A590 | 0x0000003E |
mv_buffer_pool_uninit | 0x0000A650 | 0x0000003F |
mv_buffer_realloc | 0x0000A1D0 | 0x00000040 |
mv_buffer_ref | 0x00009FC0 | 0x00000041 |
mv_buffer_replace | 0x0000A480 | 0x00000042 |
mv_buffer_unref | 0x0000A000 | 0x00000043 |
mv_calloc | 0x000266D0 | 0x00000044 |
mv_camellia_alloc | 0x0000B0B0 | 0x00000045 |
mv_camellia_crypt | 0x0000B0D0 | 0x00000046 |
mv_camellia_init | 0x000A415E | 0x00000047 |
mv_camellia_size | 0x000AC650 | 0x00000048 |
mv_cast5_alloc | 0x0000C090 | 0x00000049 |
mv_cast5_crypt | 0x0000C1B0 | 0x0000004A |
mv_cast5_crypt2 | 0x0000C0B0 | 0x0000004B |
mv_cast5_init | 0x000A4F3E | 0x0000004C |
mv_cast5_size | 0x000AEA60 | 0x0000004D |
mv_channel_description | 0x0000C470 | 0x0000004E |
mv_channel_description_bprint | 0x0000C3C0 | 0x0000004F |
mv_channel_from_string | 0x0000C560 | 0x00000050 |
mv_channel_layout_channel_from_index | 0x0000DC10 | 0x00000051 |
mv_channel_layout_channel_from_string | 0x0000EAC0 | 0x00000052 |
mv_channel_layout_check | 0x0000EC10 | 0x00000053 |
mv_channel_layout_compare | 0x0000EDB0 | 0x00000054 |
mv_channel_layout_copy | 0x0000D340 | 0x00000055 |
mv_channel_layout_default | 0x0000EFF0 | 0x00000056 |
mv_channel_layout_describe | 0x0000DBA0 | 0x00000057 |
mv_channel_layout_describe_bprint | 0x0000D4D0 | 0x00000058 |
mv_channel_layout_extract_channel | 0x0000D060 | 0x00000059 |
mv_channel_layout_from_mask | 0x0000D1B0 | 0x0000005A |
mv_channel_layout_from_string | 0x0000DD40 | 0x0000005B |
mv_channel_layout_index_from_channel | 0x0000E760 | 0x0000005C |
mv_channel_layout_index_from_string | 0x0000E950 | 0x0000005D |
mv_channel_layout_standard | 0x0000F050 | 0x0000005E |
mv_channel_layout_subset | 0x0000F080 | 0x0000005F |
mv_channel_layout_uninit | 0x0000D270 | 0x00000060 |
mv_channel_name | 0x0000C2D0 | 0x00000061 |
mv_channel_name_bprint | 0x0000C220 | 0x00000062 |
mv_chroma_location_enum_to_pos | 0x00032410 | 0x00000063 |
mv_chroma_location_from_name | 0x000323C0 | 0x00000064 |
mv_chroma_location_name | 0x000323A0 | 0x00000065 |
mv_chroma_location_pos_to_enum | 0x00032450 | 0x00000066 |
mv_cmp_i | 0x000216E0 | 0x00000067 |
mv_color_primaries_from_name | 0x00032270 | 0x00000068 |
mv_color_primaries_name | 0x00032250 | 0x00000069 |
mv_color_range_from_name | 0x00032200 | 0x0000006A |
mv_color_range_name | 0x000321E0 | 0x0000006B |
mv_color_space_from_name | 0x00032350 | 0x0000006C |
mv_color_space_name | 0x00032330 | 0x0000006D |
mv_color_transfer_from_name | 0x000322E0 | 0x0000006E |
mv_color_transfer_name | 0x000322C0 | 0x0000006F |
mv_compare_mod | 0x00024ED0 | 0x00000070 |
mv_compare_ts | 0x00024D10 | 0x00000071 |
mv_content_light_metadata_alloc | 0x00024500 | 0x00000072 |
mv_content_light_metadata_create_side_data | 0x00024530 | 0x00000073 |
mv_cpu_count | 0x0000F8F0 | 0x00000074 |
mv_cpu_force_count | 0x0000F9E0 | 0x00000075 |
mv_cpu_max_align | 0x0000F9F0 | 0x00000076 |
mv_crc | 0x000101D0 | 0x00000077 |
mv_crc_get_table | 0x0000FDB0 | 0x00000078 |
mv_crc_init | 0x0000FBC0 | 0x00000079 |
mv_csp_luma_coeffs_from_avcsp | 0x000102B0 | 0x0000007A |
mv_csp_primaries_desc_from_id | 0x000102F0 | 0x0000007B |
mv_csp_primaries_id_from_desc | 0x00010320 | 0x0000007C |
mv_d2q | 0x00032F80 | 0x0000007D |
mv_d2str | 0x000068E0 | 0x0000007E |
mv_default_get_category | 0x00023720 | 0x0000007F |
mv_default_item_name | 0x00023710 | 0x00000080 |
mv_des_alloc | 0x00010D80 | 0x00000081 |
mv_des_crypt | 0x00010E40 | 0x00000082 |
mv_des_init | 0x00010DA0 | 0x00000083 |
mv_des_mac | 0x00010E90 | 0x00000084 |
mv_detection_bbox_alloc | 0x00010EE0 | 0x00000085 |
mv_detection_bbox_create_side_data | 0x00010F70 | 0x00000086 |
mv_dict_copy | 0x00011D20 | 0x00000087 |
mv_dict_count | 0x00011070 | 0x00000088 |
mv_dict_free | 0x00011CC0 | 0x00000089 |
mv_dict_get | 0x000110D0 | 0x0000008A |
mv_dict_get_string | 0x000121A0 | 0x0000008B |
mv_dict_iterate | 0x00011090 | 0x0000008C |
mv_dict_parse_string | 0x000118C0 | 0x0000008D |
mv_dict_set | 0x00011210 | 0x0000008E |
mv_dict_set_int | 0x00011560 | 0x0000008F |
mv_dirname | 0x00006E10 | 0x00000090 |
mv_display_matrix_flip | 0x000126F0 | 0x00000091 |
mv_display_rotation_get | 0x00012470 | 0x00000092 |
mv_display_rotation_set | 0x000125C0 | 0x00000093 |
mv_div_i | 0x000223D0 | 0x00000094 |
mv_div_q | 0x00032E00 | 0x00000095 |
mv_dovi_alloc | 0x00012780 | 0x00000096 |
mv_dovi_metadata_alloc | 0x000127B0 | 0x00000097 |
mv_downmix_info_update_side_data | 0x00012800 | 0x00000098 |
mv_dynamic_hdr_plus_alloc | 0x0001D0A0 | 0x00000099 |
mv_dynamic_hdr_plus_create_side_data | 0x0001D0D0 | 0x0000009A |
mv_dynamic_hdr_vivid_alloc | 0x0001D130 | 0x0000009B |
mv_dynamic_hdr_vivid_create_side_data | 0x0001D160 | 0x0000009C |
mv_dynarray2_add | 0x00026BD0 | 0x0000009D |
mv_dynarray_add | 0x00026B00 | 0x0000009E |
mv_dynarray_add_nofree | 0x00026A40 | 0x0000009F |
mv_encryption_info_add_side_data | 0x00012F30 | 0x000000A0 |
mv_encryption_info_alloc | 0x00012A70 | 0x000000A1 |
mv_encryption_info_clone | 0x00012B40 | 0x000000A2 |
mv_encryption_info_free | 0x00012CF0 | 0x000000A3 |
mv_encryption_info_get_side_data | 0x00012D40 | 0x000000A4 |
mv_encryption_init_info_add_side_data | 0x00013860 | 0x000000A5 |
mv_encryption_init_info_alloc | 0x00013100 | 0x000000A6 |
mv_encryption_init_info_free | 0x000132D0 | 0x000000A7 |
mv_encryption_init_info_get_side_data | 0x00013480 | 0x000000A8 |
mv_escape | 0x00007050 | 0x000000A9 |
mv_expr_count_func | 0x000176E0 | 0x000000AA |
mv_expr_count_vars | 0x00017650 | 0x000000AB |
mv_expr_eval | 0x000177A0 | 0x000000AC |
mv_expr_free | 0x00015280 | 0x000000AD |
mv_expr_parse | 0x00017110 | 0x000000AE |
mv_expr_parse_and_eval | 0x000177F0 | 0x000000AF |
mv_fast_malloc | 0x000271F0 | 0x000000B0 |
mv_fast_mallocz | 0x000272D0 | 0x000000B1 |
mv_fast_realloc | 0x00027140 | 0x000000B2 |
mv_fifo_alloc | 0x00018A20 | 0x000000B3 |
mv_fifo_alloc2 | 0x00017E40 | 0x000000B4 |
mv_fifo_alloc_array | 0x00018990 | 0x000000B5 |
mv_fifo_auto_grow_limit | 0x00017EF0 | 0x000000B6 |
mv_fifo_can_read | 0x00017F10 | 0x000000B7 |
mv_fifo_can_write | 0x00017F40 | 0x000000B8 |
mv_fifo_drain | 0x000192B0 | 0x000000B9 |
mv_fifo_drain2 | 0x000188C0 | 0x000000BA |
mv_fifo_elem_size | 0x00017F00 | 0x000000BB |
mv_fifo_free | 0x00018AA0 | 0x000000BC |
mv_fifo_freep | 0x00018AE0 | 0x000000BD |
mv_fifo_freep2 | 0x00018950 | 0x000000BE |
mv_fifo_generic_peek | 0x00019120 | 0x000000BF |
mv_fifo_generic_peek_at | 0x00018FC0 | 0x000000C0 |
mv_fifo_generic_read | 0x00019160 | 0x000000C1 |
mv_fifo_generic_write | 0x00018E70 | 0x000000C2 |
mv_fifo_grow | 0x00018CE0 | 0x000000C3 |
mv_fifo_grow2 | 0x00017F70 | 0x000000C4 |
mv_fifo_peek | 0x00018760 | 0x000000C5 |
mv_fifo_peek_to_cb | 0x000188A0 | 0x000000C6 |
mv_fifo_read | 0x00018500 | 0x000000C7 |
mv_fifo_read_to_cb | 0x000186C0 | 0x000000C8 |
mv_fifo_realloc2 | 0x00018B70 | 0x000000C9 |
mv_fifo_reset | 0x00018B20 | 0x000000CA |
mv_fifo_reset2 | 0x00018930 | 0x000000CB |
mv_fifo_size | 0x00018B40 | 0x000000CC |
mv_fifo_space | 0x00018B50 | 0x000000CD |
mv_fifo_write | 0x000180F0 | 0x000000CE |
mv_fifo_write_from_cb | 0x000182A0 | 0x000000CF |
mv_file_map | 0x000192E0 | 0x000000D0 |
mv_file_unmap | 0x00019570 | 0x000000D1 |
mv_film_grain_params_alloc | 0x00019B60 | 0x000000D2 |
mv_film_grain_params_create_side_data | 0x00019B90 | 0x000000D3 |
mv_find_best_pix_fmt_of_2 | 0x00031F20 | 0x000000D4 |
mv_find_info_tag | 0x0002F8F0 | 0x000000D5 |
mv_find_nearest_q_idx | 0x00033340 | 0x000000D6 |
mv_fopen_utf8 | 0x00019B50 | 0x000000D7 |
mv_force_cpu_flags | 0x0000F820 | 0x000000D8 |
mv_fourcc_make_string | 0x0008A3B0 | 0x000000D9 |
mv_frame_alloc | 0x0001AC40 | 0x000000DA |
mv_frame_apply_cropping | 0x0001C490 | 0x000000DB |
mv_frame_clone | 0x0001C050 | 0x000000DC |
mv_frame_copy | 0x0001B8D0 | 0x000000DD |
mv_frame_copy_props | 0x0001B550 | 0x000000DE |
mv_frame_free | 0x0001ADB0 | 0x000000DF |
mv_frame_get_buffer | 0x0001ADF0 | 0x000000E0 |
mv_frame_get_plane_buffer | 0x0001B570 | 0x000000E1 |
mv_frame_get_side_data | 0x0001B890 | 0x000000E2 |
mv_frame_is_writable | 0x0001B4B0 | 0x000000E3 |
mv_frame_make_writable | 0x0001C210 | 0x000000E4 |
mv_frame_move_ref | 0x0001B320 | 0x000000E5 |
mv_frame_new_side_data | 0x0001B7E0 | 0x000000E6 |
mv_frame_new_side_data_from_buf | 0x0001B750 | 0x000000E7 |
mv_frame_ref | 0x0001BC40 | 0x000000E8 |
mv_frame_remove_side_data | 0x0001C3E0 | 0x000000E9 |
mv_frame_side_data_name | 0x0001C470 | 0x000000EA |
mv_frame_unref | 0x0001B300 | 0x000000EB |
mv_free | 0x000265B0 | 0x000000EC |
mv_freep | 0x000265C0 | 0x000000ED |
mv_gcd | 0x00024570 | 0x000000EE |
mv_gcd_q | 0x000337D0 | 0x000000EF |
mv_get_alt_sample_fmt | 0x00039ED0 | 0x000000F0 |
mv_get_bits_per_pixel | 0x00031A80 | 0x000000F1 |
mv_get_bytes_per_sample | 0x0003A030 | 0x000000F2 |
mv_get_channel_description | 0x0000CF80 | 0x000000F3 |
mv_get_channel_layout | 0x0000C640 | 0x000000F4 |
mv_get_channel_layout_channel_index | 0x0000CD50 | 0x000000F5 |
mv_get_channel_layout_nb_channels | 0x0000CC80 | 0x000000F6 |
mv_get_channel_layout_string | 0x0000CBF0 | 0x000000F7 |
mv_get_channel_name | 0x0000CEA0 | 0x000000F8 |
mv_get_colorspace_name | 0x0001AC20 | 0x000000F9 |
mv_get_cpu_flags | 0x0000F880 | 0x000000FA |
mv_get_default_channel_layout | 0x0000CD10 | 0x000000FB |
mv_get_extended_channel_layout | 0x0000C8F0 | 0x000000FC |
mv_get_known_color_name | 0x0002EC40 | 0x000000FD |
mv_get_media_type_string | 0x0008A240 | 0x000000FE |
mv_get_packed_sample_fmt | 0x00039F10 | 0x000000FF |
mv_get_padded_bits_per_pixel | 0x00031AD0 | 0x00000100 |
mv_get_picture_type_char | 0x0008A260 | 0x00000101 |
mv_get_pix_fmt | 0x00031960 | 0x00000102 |
mv_get_pix_fmt_loss | 0x00031EF0 | 0x00000103 |
mv_get_pix_fmt_name | 0x00031930 | 0x00000104 |
mv_get_pix_fmt_string | 0x00031B80 | 0x00000105 |
mv_get_planar_sample_fmt | 0x00039F50 | 0x00000106 |
mv_get_random_seed | 0x00032510 | 0x00000107 |
mv_get_sample_fmt | 0x00039D40 | 0x00000108 |
mv_get_sample_fmt_name | 0x00039D20 | 0x00000109 |
mv_get_sample_fmt_string | 0x00039F80 | 0x0000010A |
mv_get_standard_channel_layout | 0x0000D150 | 0x0000010B |
mv_get_time_base_q | 0x0008A470 | 0x0000010C |
mv_get_token | 0x00006940 | 0x0000010D |
mv_gettime | 0x0004B090 | 0x0000010E |
mv_gettime_relative | 0x0004B0D0 | 0x0000010F |
mv_gettime_relative_is_monotonic | 0x0004B140 | 0x00000110 |
mv_hash_alloc | 0x0001C790 | 0x00000111 |
mv_hash_final | 0x0001CB30 | 0x00000112 |
mv_hash_final_b64 | 0x0001CE80 | 0x00000113 |
mv_hash_final_bin | 0x0001CBC0 | 0x00000114 |
mv_hash_final_hex | 0x0001CE00 | 0x00000115 |
mv_hash_freep | 0x0001D070 | 0x00000116 |
mv_hash_get_name | 0x0001C770 | 0x00000117 |
mv_hash_get_size | 0x0001C780 | 0x00000118 |
mv_hash_init | 0x0001C870 | 0x00000119 |
mv_hash_names | 0x0001C750 | 0x0000011A |
mv_hash_update | 0x0001CA10 | 0x0000011B |
mv_hmac_alloc | 0x0001D220 | 0x0000011C |
mv_hmac_calc | 0x0001D720 | 0x0000011D |
mv_hmac_final | 0x0001D5A0 | 0x0000011E |
mv_hmac_free | 0x0001D3A0 | 0x0000011F |
mv_hmac_init | 0x0001D3E0 | 0x00000120 |
mv_hmac_update | 0x0001D590 | 0x00000121 |
mv_hwdevice_ctx_alloc | 0x0001D920 | 0x00000122 |
mv_hwdevice_ctx_create | 0x0001DEB0 | 0x00000123 |
mv_hwdevice_ctx_create_derived | 0x0001DF50 | 0x00000124 |
mv_hwdevice_ctx_create_derived_opts | 0x0001DEE0 | 0x00000125 |
mv_hwdevice_ctx_init | 0x0001D930 | 0x00000126 |
mv_hwdevice_find_type_by_name | 0x0001D8A0 | 0x00000127 |
mv_hwdevice_get_hwframe_constraints | 0x0001DDD0 | 0x00000128 |
mv_hwdevice_get_type_name | 0x0001D8F0 | 0x00000129 |
mv_hwdevice_hwconfig_alloc | 0x0001DDA0 | 0x0000012A |
mv_hwdevice_iterate_types | 0x0001D910 | 0x0000012B |
mv_hwframe_constraints_free | 0x0001DE70 | 0x0000012C |
mv_hwframe_ctx_alloc | 0x0001D990 | 0x0000012D |
mv_hwframe_ctx_create_derived | 0x0001E690 | 0x0000012E |
mv_hwframe_ctx_init | 0x0001E450 | 0x0000012F |
mv_hwframe_get_buffer | 0x0001E2F0 | 0x00000130 |
mv_hwframe_map | 0x0001E0B0 | 0x00000131 |
mv_hwframe_transfer_data | 0x0001DB70 | 0x00000132 |
mv_hwframe_transfer_get_formats | 0x0001DB40 | 0x00000133 |
mv_i2int | 0x00022490 | 0x00000134 |
mv_image_alloc | 0x0001F200 | 0x00000135 |
mv_image_check_sar | 0x0001F790 | 0x00000136 |
mv_image_check_size | 0x0001F6A0 | 0x00000137 |
mv_image_check_size2 | 0x0001F550 | 0x00000138 |
mv_image_copy | 0x0001FAF0 | 0x00000139 |
mv_image_copy_plane | 0x0001F9D0 | 0x0000013A |
mv_image_copy_plane_uc_from | 0x0001F870 | 0x0000013B |
mv_image_copy_to_buffer | 0x00020830 | 0x0000013C |
mv_image_copy_uc_from | 0x0001FFD0 | 0x0000013D |
mv_image_fill_arrays | 0x000204C0 | 0x0000013E |
mv_image_fill_black | 0x00020B00 | 0x0000013F |
mv_image_fill_linesizes | 0x0001EAB0 | 0x00000140 |
mv_image_fill_max_pixsteps | 0x0001E860 | 0x00000141 |
mv_image_fill_plane_sizes | 0x0001EE90 | 0x00000142 |
mv_image_fill_pointers | 0x0001EFD0 | 0x00000143 |
mv_image_get_buffer_size | 0x00020660 | 0x00000144 |
mv_image_get_linesize | 0x0001E960 | 0x00000145 |
mv_int2i | 0x00022460 | 0x00000146 |
mv_int_list_length_for_size | 0x0008A280 | 0x00000147 |
mv_lfg_init | 0x000A50EC | 0x00000148 |
mv_lfg_init_from_data | 0x000225E0 | 0x00000149 |
mv_log | 0x00023A40 | 0x0000014A |
mv_log2 | 0x000224A0 | 0x0000014B |
mv_log2_16bit | 0x000224B0 | 0x0000014C |
mv_log2_i | 0x000212B0 | 0x0000014D |
mv_log_default_callback | 0x00022FF0 | 0x0000014E |
mv_log_format_line | 0x00023A30 | 0x0000014F |
mv_log_format_line2 | 0x00023730 | 0x00000150 |
mv_log_get_flags | 0x00023BF0 | 0x00000151 |
mv_log_get_level | 0x00023BC0 | 0x00000152 |
mv_log_once | 0x00023AB0 | 0x00000153 |
mv_log_set_callback | 0x00023C00 | 0x00000154 |
mv_log_set_flags | 0x00023BE0 | 0x00000155 |
mv_log_set_level | 0x00023BD0 | 0x00000156 |
mv_lzo1x_decode | 0x00023D50 | 0x00000157 |
mv_malloc | 0x00026230 | 0x00000158 |
mv_malloc_array | 0x000263A0 | 0x00000159 |
mv_mallocz | 0x000265E0 | 0x0000015A |
mv_mallocz_array | 0x00026400 | 0x0000015B |
mv_mastering_display_metadata_alloc | 0x00024420 | 0x0000015C |
mv_mastering_display_metadata_create_side_data | 0x00024440 | 0x0000015D |
mv_match_list | 0x000075A0 | 0x0000015E |
mv_match_name | 0x00007100 | 0x0000015F |
mv_max_alloc | 0x00026220 | 0x00000160 |
mv_md5_alloc | 0x00025C70 | 0x00000161 |
mv_md5_final | 0x00025ED0 | 0x00000162 |
mv_md5_init | 0x00025C90 | 0x00000163 |
mv_md5_size | 0x000B3B48 | 0x00000164 |
mv_md5_sum | 0x00025FE0 | 0x00000165 |
mv_md5_update | 0x00025CC0 | 0x00000166 |
mv_memcpy_backptr | 0x00026D10 | 0x00000167 |
mv_memdup | 0x00026980 | 0x00000168 |
mv_mod_i | 0x000218A0 | 0x00000169 |
mv_mul_i | 0x00021340 | 0x0000016A |
mv_mul_q | 0x00032DA0 | 0x0000016B |
mv_murmur3_alloc | 0x000274A0 | 0x0000016C |
mv_murmur3_final | 0x00027CE0 | 0x0000016D |
mv_murmur3_init | 0x000275B0 | 0x0000016E |
mv_murmur3_init_seeded | 0x000274C0 | 0x0000016F |
mv_murmur3_update | 0x00027690 | 0x00000170 |
mv_nearer_q | 0x00033180 | 0x00000171 |
mv_opt_child_class_iterate | 0x0002D880 | 0x00000172 |
mv_opt_child_next | 0x0002D860 | 0x00000173 |
mv_opt_copy | 0x0002D910 | 0x00000174 |
mv_opt_eval_double | 0x0002CB00 | 0x00000175 |
mv_opt_eval_flags | 0x0002CA00 | 0x00000176 |
mv_opt_eval_float | 0x0002CAC0 | 0x00000177 |
mv_opt_eval_int | 0x0002CA40 | 0x00000178 |
mv_opt_eval_int64 | 0x0002CA80 | 0x00000179 |
mv_opt_eval_q | 0x0002CB40 | 0x0000017A |
mv_opt_find | 0x0002C350 | 0x0000017B |
mv_opt_find2 | 0x0002C140 | 0x0000017C |
mv_opt_flag_is_set | 0x0002D7B0 | 0x0000017D |
mv_opt_free | 0x0002C0B0 | 0x0000017E |
mv_opt_freep_ranges | 0x0002DC40 | 0x0000017F |
mv_opt_get | 0x0002AD50 | 0x00000180 |
mv_opt_get_channel_layout | 0x0002B9A0 | 0x00000181 |
mv_opt_get_chlayout | 0x0002BA30 | 0x00000182 |
mv_opt_get_dict_val | 0x0002BAC0 | 0x00000183 |
mv_opt_get_double | 0x0002B3E0 | 0x00000184 |
mv_opt_get_image_size | 0x0002B680 | 0x00000185 |
mv_opt_get_int | 0x0002B270 | 0x00000186 |
mv_opt_get_key_value | 0x0002BF30 | 0x00000187 |
mv_opt_get_pixel_fmt | 0x0002B8A0 | 0x00000188 |
mv_opt_get_q | 0x0002B4F0 | 0x00000189 |
mv_opt_get_sample_fmt | 0x0002B920 | 0x0000018A |
mv_opt_get_video_rate | 0x0002B710 | 0x0000018B |
mv_opt_is_set_to_default | 0x0002DCE0 | 0x0000018C |
mv_opt_is_set_to_default_by_name | 0x0002E260 | 0x0000018D |
mv_opt_next | 0x00029C40 | 0x0000018E |
mv_opt_ptr | 0x0002D8A0 | 0x0000018F |
mv_opt_query_ranges | 0x0002DBE0 | 0x00000190 |
mv_opt_query_ranges_default | 0x00028ED0 | 0x00000191 |
mv_opt_serialize | 0x0002E2B0 | 0x00000192 |
mv_opt_set | 0x0002CB80 | 0x00000193 |
mv_opt_set_bin | 0x0008A930 | 0x00000194 |
mv_opt_set_channel_layout | 0x0002AC10 | 0x00000195 |
mv_opt_set_chlayout | 0x0002AD00 | 0x00000196 |
mv_opt_set_defaults | 0x0002BF10 | 0x00000197 |
mv_opt_set_defaults2 | 0x0002BB90 | 0x00000198 |
mv_opt_set_dict | 0x0002D780 | 0x00000199 |
mv_opt_set_dict2 | 0x0002D660 | 0x0000019A |
mv_opt_set_dict_val | 0x0002AC90 | 0x0000019B |
mv_opt_set_double | 0x00029EB0 | 0x0000019C |
mv_opt_set_from_string | 0x0002D400 | 0x0000019D |
mv_opt_set_image_size | 0x0002A600 | 0x0000019E |
mv_opt_set_int | 0x00029C90 | 0x0000019F |
mv_opt_set_pixel_fmt | 0x0002A9F0 | 0x000001A0 |
mv_opt_set_q | 0x0002A1A0 | 0x000001A1 |
mv_opt_set_sample_fmt | 0x0002AB00 | 0x000001A2 |
mv_opt_set_video_rate | 0x0002A6C0 | 0x000001A3 |
mv_opt_show2 | 0x0002BB20 | 0x000001A4 |
mv_parse_color | 0x0002E900 | 0x000001A5 |
mv_parse_cpu_caps | 0x0000F8B0 | 0x000001A6 |
mv_parse_ratio | 0x0002E5D0 | 0x000001A7 |
mv_parse_time | 0x0002F110 | 0x000001A8 |
mv_parse_video_rate | 0x0002E7A0 | 0x000001A9 |
mv_parse_video_size | 0x0002E6E0 | 0x000001AA |
mv_pix_fmt_count_planes | 0x00031D50 | 0x000001AB |
mv_pix_fmt_desc_get | 0x00031C70 | 0x000001AC |
mv_pix_fmt_desc_get_id | 0x00031CE0 | 0x000001AD |
mv_pix_fmt_desc_next | 0x00031CA0 | 0x000001AE |
mv_pix_fmt_get_chroma_sub_sample | 0x00031D10 | 0x000001AF |
mv_pix_fmt_swap_endianness | 0x00031E00 | 0x000001B0 |
mv_pixelutils_get_sad_fn | 0x000324E0 | 0x000001B1 |
mv_q2intfloat | 0x00033570 | 0x000001B2 |
mv_rc4_alloc | 0x000338C0 | 0x000001B3 |
mv_rc4_crypt | 0x000339C0 | 0x000001B4 |
mv_rc4_init | 0x000338E0 | 0x000001B5 |
mv_read_image_line | 0x00030EA0 | 0x000001B6 |
mv_read_image_line2 | 0x00030750 | 0x000001B7 |
mv_realloc | 0x00026280 | 0x000001B8 |
mv_realloc_array | 0x000264F0 | 0x000001B9 |
mv_realloc_f | 0x000262C0 | 0x000001BA |
mv_reallocp | 0x00026320 | 0x000001BB |
mv_reallocp_array | 0x00026530 | 0x000001BC |
mv_reduce | 0x00032890 | 0x000001BD |
mv_rescale | 0x00024C40 | 0x000001BE |
mv_rescale_delta | 0x00024F60 | 0x000001BF |
mv_rescale_q | 0x00024CC0 | 0x000001C0 |
mv_rescale_q_rnd | 0x00024C90 | 0x000001C1 |
mv_rescale_rnd | 0x00024700 | 0x000001C2 |
mv_ripemd_alloc | 0x00039950 | 0x000001C3 |
mv_ripemd_final | 0x00039BC0 | 0x000001C4 |
mv_ripemd_init | 0x000A5198 | 0x000001C5 |
mv_ripemd_size | 0x000BC2E4 | 0x000001C6 |
mv_ripemd_update | 0x00039970 | 0x000001C7 |
mv_sample_fmt_is_planar | 0x0003A050 | 0x000001C8 |
mv_samples_alloc | 0x0003A320 | 0x000001C9 |
mv_samples_alloc_array_and_samples | 0x0003A4F0 | 0x000001CA |
mv_samples_copy | 0x0003A750 | 0x000001CB |
mv_samples_fill_arrays | 0x0003A1B0 | 0x000001CC |
mv_samples_get_buffer_size | 0x0003A070 | 0x000001CD |
mv_samples_set_silence | 0x0003A930 | 0x000001CE |
mv_set_options_string | 0x0002D230 | 0x000001CF |
mv_sha512_alloc | 0x00049740 | 0x000001D0 |
mv_sha512_final | 0x000499A0 | 0x000001D1 |
mv_sha512_init | 0x000A53BC | 0x000001D2 |
mv_sha512_size | 0x000BC42C | 0x000001D3 |
mv_sha512_update | 0x00049760 | 0x000001D4 |
mv_sha_alloc | 0x0003E680 | 0x000001D5 |
mv_sha_final | 0x0003E8F0 | 0x000001D6 |
mv_sha_init | 0x000A52C0 | 0x000001D7 |
mv_sha_size | 0x000BC424 | 0x000001D8 |
mv_sha_update | 0x0003E6A0 | 0x000001D9 |
mv_shr_i | 0x00021760 | 0x000001DA |
mv_size_mult | 0x00027480 | 0x000001DB |
mv_small_strptime | 0x0002EC70 | 0x000001DC |
mv_spherical_alloc | 0x0004A600 | 0x000001DD |
mv_spherical_from_name | 0x0004A760 | 0x000001DE |
mv_spherical_projection_name | 0x0004A740 | 0x000001DF |
mv_spherical_tile_bounds | 0x0004A630 | 0x000001E0 |
mv_sscanf | 0x00002F80 | 0x000001E1 |
mv_stereo3d_alloc | 0x0004A7B0 | 0x000001E2 |
mv_stereo3d_create_side_data | 0x0004A7D0 | 0x000001E3 |
mv_stereo3d_from_name | 0x0004A840 | 0x000001E4 |
mv_stereo3d_type_name | 0x0004A820 | 0x000001E5 |
mv_strcasecmp | 0x00006B30 | 0x000001E6 |
mv_strdup | 0x000267C0 | 0x000001E7 |
mv_strerror | 0x00013B30 | 0x000001E8 |
mv_strireplace | 0x00006BF0 | 0x000001E9 |
mv_stristart | 0x00006580 | 0x000001EA |
mv_stristr | 0x000065F0 | 0x000001EB |
mv_strlcat | 0x00006750 | 0x000001EC |
mv_strlcatf | 0x000067F0 | 0x000001ED |
mv_strlcpy | 0x000066E0 | 0x000001EE |
mv_strncasecmp | 0x00006B80 | 0x000001EF |
mv_strndup | 0x00026890 | 0x000001F0 |
mv_strnstr | 0x00006660 | 0x000001F1 |
mv_strstart | 0x00006530 | 0x000001F2 |
mv_strtod | 0x000150E0 | 0x000001F3 |
mv_strtok | 0x00006AA0 | 0x000001F4 |
mv_sub_i | 0x000211E0 | 0x000001F5 |
mv_sub_q | 0x00032EF0 | 0x000001F6 |
mv_tea_alloc | 0x0004A940 | 0x000001F7 |
mv_tea_crypt | 0x0004A990 | 0x000001F8 |
mv_tea_init | 0x0004A960 | 0x000001F9 |
mv_tea_size | 0x000BC5A0 | 0x000001FA |
mv_tempfile | 0x000195A0 | 0x000001FB |
mv_thread_message_flush | 0x0004B020 | 0x000001FC |
mv_thread_message_queue_alloc | 0x0004ABE0 | 0x000001FD |
mv_thread_message_queue_free | 0x0004ACB0 | 0x000001FE |
mv_thread_message_queue_nb_elems | 0x0004AD60 | 0x000001FF |
mv_thread_message_queue_recv | 0x0004AE90 | 0x00000200 |
mv_thread_message_queue_send | 0x0004ADB0 | 0x00000201 |
mv_thread_message_queue_set_err_recv | 0x0004AFD0 | 0x00000202 |
mv_thread_message_queue_set_err_send | 0x0004AF80 | 0x00000203 |
mv_thread_message_queue_set_free_func | 0x0004ACA0 | 0x00000204 |
mv_timecode_adjust_ntsc_framenum2 | 0x0004B210 | 0x00000205 |
mv_timecode_check_frame_rate | 0x0004BDA0 | 0x00000206 |
mv_timecode_get_smpte | 0x0004B560 | 0x00000207 |
mv_timecode_get_smpte_from_framenum | 0x0004B2B0 | 0x00000208 |
mv_timecode_init | 0x0004BE10 | 0x00000209 |
mv_timecode_init_from_components | 0x0004BF30 | 0x0000020A |
mv_timecode_init_from_string | 0x0004C160 | 0x0000020B |
mv_timecode_make_mpeg_tc_string | 0x0004BD30 | 0x0000020C |
mv_timecode_make_smpte_tc_string | 0x0004BC00 | 0x0000020D |
mv_timecode_make_smpte_tc_string2 | 0x0004BA00 | 0x0000020E |
mv_timecode_make_string | 0x0004B750 | 0x0000020F |
mv_timegm | 0x0002F030 | 0x00000210 |
mv_tree_destroy | 0x0004CDD0 | 0x00000211 |
mv_tree_enumerate | 0x0004CFB0 | 0x00000212 |
mv_tree_find | 0x0004C440 | 0x00000213 |
mv_tree_insert | 0x0004C500 | 0x00000214 |
mv_tree_node_alloc | 0x0004C420 | 0x00000215 |
mv_tree_node_size | 0x000BC6C0 | 0x00000216 |
mv_twofish_alloc | 0x0004D570 | 0x00000217 |
mv_twofish_crypt | 0x0004D590 | 0x00000218 |
mv_twofish_init | 0x000A5843 | 0x00000219 |
mv_twofish_size | 0x000BC6E0 | 0x0000021A |
mv_tx_init | 0x000A6A4F | 0x0000021B |
mv_tx_uninit | 0x000A6137 | 0x0000021C |
mv_usleep | 0x0004B150 | 0x0000021D |
mv_utf8_decode | 0x00007270 | 0x0000021E |
mv_util_ffversion | 0x000C27E0 | 0x0000021F |
mv_uuid_parse | 0x0008A5F0 | 0x00000220 |
mv_uuid_parse_range | 0x0008A4D0 | 0x00000221 |
mv_uuid_unparse | 0x0008A640 | 0x00000222 |
mv_uuid_urn_parse | 0x0008A8C0 | 0x00000223 |
mv_vbprintf | 0x00008B70 | 0x00000224 |
mv_version_info | 0x0008A920 | 0x00000225 |
mv_video_enc_params_alloc | 0x0008A960 | 0x00000226 |
mv_video_enc_params_create_side_data | 0x0008A9E0 | 0x00000227 |
mv_vk_frame_alloc | 0x0001E850 | 0x00000228 |
mv_vkfmt_from_pixfmt | 0x0001E840 | 0x00000229 |
mv_vlog | 0x00023B30 | 0x0000022A |
mv_write_image_line | 0x000316F0 | 0x0000022B |
mv_write_image_line2 | 0x00031350 | 0x0000022C |
mv_xtea_alloc | 0x0008DC40 | 0x0000022D |
mv_xtea_crypt | 0x0008DCB0 | 0x0000022E |
mv_xtea_init | 0x0008DC60 | 0x0000022F |
mv_xtea_le_crypt | 0x0008DDF0 | 0x00000230 |
mv_xtea_le_init | 0x0008DC90 | 0x00000231 |
mvpriv_alloc_fixed_dsp | 0x00019FA0 | 0x00000232 |
mvpriv_cga_font | 0x000C4220 | 0x00000233 |
mvpriv_dict_set_timestamp | 0x00012370 | 0x00000234 |
mvpriv_float_dsp_alloc | 0x000A4FF0 | 0x00000235 |
mvpriv_fopen_utf8 | 0x00019A90 | 0x00000236 |
mvpriv_get_gamma_from_trc | 0x0000F7D0 | 0x00000237 |
mvpriv_get_trc_function_from_trc | 0x0000F800 | 0x00000238 |
mvpriv_init_lls | 0x000A5164 | 0x00000239 |
mvpriv_open | 0x000195E0 | 0x0000023A |
mvpriv_report_missing_feature | 0x00023CC0 | 0x0000023B |
mvpriv_request_sample | 0x00023C10 | 0x0000023C |
mvpriv_scalarproduct_float_c | 0x0001A2E0 | 0x0000023D |
mvpriv_set_systematic_pal2 | 0x0001F0D0 | 0x0000023E |
mvpriv_slicethread_create | 0x0004A330 | 0x0000023F |
mvpriv_slicethread_execute | 0x0004A030 | 0x00000240 |
mvpriv_slicethread_free | 0x0004A200 | 0x00000241 |
mvpriv_solve_lls | 0x00022750 | 0x00000242 |
mvpriv_tempfile | 0x00019970 | 0x00000243 |
mvpriv_vga16_font | 0x000C3220 | 0x00000244 |
mvutil_configuration | 0x0008A940 | 0x00000245 |
mvutil_license | 0x0008A950 | 0x00000246 |
next | 0x0002A4A0 | 0x00000247 |
C:\Windows\Installer\inprogressinstallinfo.ipi | Dropped File | OLE Compound |
Clean
|
...
|
»
CFB Streams (17)
»
Name | ID | Size | Actions |
---|---|---|---|
Root\ProductId | 1 | 76 Bytes |
...
|
Root\ProductName | 2 | 78 Bytes |
...
|
Root\LogonUser | 3 | 24 Bytes |
...
|
Root\Selections | 4 | 60 Bytes |
...
|
Root\Folders | 5 | 226 Bytes |
...
|
Root\Properties | 6 | 642 Bytes |
...
|
Root\TimeStampLow | 7 | 20 Bytes |
...
|
Root\TimeStampHigh | 8 | 16 Bytes |
...
|
Root\DatabasePath | 9 | 62 Bytes |
...
|
Root\DiskPrompt | 10 | 0 Bytes | - |
Root\DiskSerial | 11 | 0 Bytes | - |
Root\SystemRestoreSequence | 12 | 2 Bytes |
...
|
Root\AfterReboot | 13 | 0 Bytes | - |
Root\TransactionName | 14 | 188 Bytes |
...
|
Root\TransactionBeginTimeLow | 15 | 20 Bytes |
...
|
Root\TransactionBeginTimeHigh | 16 | 16 Bytes |
...
|
Root\MultiPackageTransaction | 17 | 2 Bytes |
...
|
c:\windows\temp\~df7440725ba3356785.tmp | Dropped File | OLE Compound |
Clean
|
...
|
»
CFB Streams (17)
»
Name | ID | Size | Actions |
---|---|---|---|
Root\ProductId | 1 | 0 Bytes | - |
Root\ProductName | 2 | 0 Bytes | - |
Root\LogonUser | 3 | 24 Bytes |
...
|
Root\Selections | 4 | 0 Bytes | - |
Root\Folders | 5 | 0 Bytes | - |
Root\Properties | 6 | 0 Bytes | - |
Root\TimeStampLow | 7 | 0 Bytes | - |
Root\TimeStampHigh | 8 | 0 Bytes | - |
Root\DatabasePath | 9 | 0 Bytes | - |
Root\DiskPrompt | 10 | 0 Bytes | - |
Root\DiskSerial | 11 | 0 Bytes | - |
Root\SystemRestoreSequence | 12 | 2 Bytes |
...
|
Root\AfterReboot | 13 | 0 Bytes | - |
Root\TransactionName | 14 | 188 Bytes |
...
|
Root\TransactionBeginTimeLow | 15 | 20 Bytes |
...
|
Root\TransactionBeginTimeHigh | 16 | 16 Bytes |
...
|
Root\MultiPackageTransaction | 17 | 2 Bytes |
...
|
c:\windows\temp\~dfd98fecbabb421781.tmp | Dropped File | Stream |
Clean
|
...
|
»
c:\windows\temp\~dfb9cb7b2c1f5ec17e.tmp | Dropped File | Stream |
Clean
|
...
|
»
c:\windows\installer\sourcehash{2db09fcd-7d8e-4c24-bf5d-fb5bd25d67b7} | Dropped File | MSI |
Clean
|
...
|
»
c:\windows\temp\~df152bfb04c3a1b745.tmp | Dropped File | Stream |
Clean
Known to be clean.
|
...
|
»
File Reputation Information
»
Verdict |
Clean
Known to be clean.
|
C:\Users\RDhJ0CNFevzX\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs | Dropped File | Text |
Clean
|
...
|
»
C:\Config.Msi\d2b6e0.rbs | Dropped File | Empty |
Clean
|
...
|
»
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\counters.dat | Modified File | Stream |
Clean
|
...
|
»