Malicious
Classifications
Downloader
Threat Names
Mal/HTMLGen-A
Dynamic Analysis Report
Created on 2023-03-04T23:50:53+00:00
out_4.bin.exe
Windows Exe (x86-32)
Remarks
(0x0200004A): 2 dump(s) were skipped because they exceeded the maximum dump size of 16 MB. The largest one was 24 MB.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0040755F |
Size Of Code | 0x0001B000 |
Size Of Initialized Data | 0x0000A600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-02-13 16:21 (UTC+1) |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x0001AFD6 | 0x0001B000 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.62 |
.rdata | 0x0041C000 | 0x00007904 | 0x00007A00 | 0x0001B400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.07 |
.data | 0x00424000 | 0x0000166C | 0x00000C00 | 0x00022E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.56 |
.reloc | 0x00426000 | 0x0000133C | 0x00001400 | 0x00023A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.44 |
Imports (6)
»
KERNEL32.dll (78)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
HeapFree | - | 0x0041C000 | 0x0002309C | 0x0002249C | 0x0000034C |
lstrlenA | - | 0x0041C004 | 0x000230A0 | 0x000224A0 | 0x0000063F |
GetProcessHeap | - | 0x0041C008 | 0x000230A4 | 0x000224A4 | 0x000002B7 |
lstrcpyA | - | 0x0041C00C | 0x000230A8 | 0x000224A8 | 0x00000639 |
WriteFile | - | 0x0041C010 | 0x000230AC | 0x000224AC | 0x00000616 |
FindClose | - | 0x0041C014 | 0x000230B0 | 0x000224B0 | 0x00000178 |
GetFileAttributesA | - | 0x0041C018 | 0x000230B4 | 0x000224B4 | 0x00000243 |
CreateFileA | - | 0x0041C01C | 0x000230B8 | 0x000224B8 | 0x000000C6 |
CloseHandle | - | 0x0041C020 | 0x000230BC | 0x000224BC | 0x00000089 |
MultiByteToWideChar | - | 0x0041C024 | 0x000230C0 | 0x000224C0 | 0x000003F3 |
CreateDirectoryA | - | 0x0041C028 | 0x000230C4 | 0x000224C4 | 0x000000B8 |
ReadFile | - | 0x0041C02C | 0x000230C8 | 0x000224C8 | 0x00000475 |
GetTempPathA | - | 0x0041C030 | 0x000230CC | 0x000224CC | 0x000002F8 |
GetFileSize | - | 0x0041C034 | 0x000230D0 | 0x000224D0 | 0x0000024E |
HeapAlloc | - | 0x0041C038 | 0x000230D4 | 0x000224D4 | 0x00000348 |
MoveFileA | - | 0x0041C03C | 0x000230D8 | 0x000224D8 | 0x000003EA |
Sleep | - | 0x0041C040 | 0x000230DC | 0x000224DC | 0x00000581 |
GetLastError | - | 0x0041C044 | 0x000230E0 | 0x000224E0 | 0x00000264 |
DeleteFileA | - | 0x0041C048 | 0x000230E4 | 0x000224E4 | 0x00000115 |
ExitProcess | - | 0x0041C04C | 0x000230E8 | 0x000224E8 | 0x00000161 |
VirtualFree | - | 0x0041C050 | 0x000230EC | 0x000224EC | 0x000005CD |
TerminateProcess | - | 0x0041C054 | 0x000230F0 | 0x000224F0 | 0x00000590 |
CreateProcessA | - | 0x0041C058 | 0x000230F4 | 0x000224F4 | 0x000000E3 |
CreateFileW | - | 0x0041C05C | 0x000230F8 | 0x000224F8 | 0x000000CE |
DecodePointer | - | 0x0041C060 | 0x000230FC | 0x000224FC | 0x0000010C |
HeapSize | - | 0x0041C064 | 0x00023100 | 0x00022500 | 0x00000351 |
GetConsoleMode | - | 0x0041C068 | 0x00023104 | 0x00022504 | 0x000001FF |
GetConsoleOutputCP | - | 0x0041C06C | 0x00023108 | 0x00022508 | 0x00000203 |
FlushFileBuffers | - | 0x0041C070 | 0x0002310C | 0x0002250C | 0x000001A2 |
SetFilePointerEx | - | 0x0041C074 | 0x00023110 | 0x00022510 | 0x00000525 |
GetFileSizeEx | - | 0x0041C078 | 0x00023114 | 0x00022514 | 0x0000024F |
GetStringTypeW | - | 0x0041C07C | 0x00023118 | 0x00022518 | 0x000002DA |
SetStdHandle | - | 0x0041C080 | 0x0002311C | 0x0002251C | 0x0000054E |
FreeEnvironmentStringsW | - | 0x0041C084 | 0x00023120 | 0x00022520 | 0x000001AD |
GetEnvironmentStringsW | - | 0x0041C088 | 0x00023124 | 0x00022524 | 0x0000023A |
GetCommandLineW | - | 0x0041C08C | 0x00023128 | 0x00022528 | 0x000001DA |
GetCommandLineA | - | 0x0041C090 | 0x0002312C | 0x0002252C | 0x000001D9 |
GetCPInfo | - | 0x0041C094 | 0x00023130 | 0x00022530 | 0x000001C4 |
GetOEMCP | - | 0x0041C098 | 0x00023134 | 0x00022534 | 0x0000029A |
GetACP | - | 0x0041C09C | 0x00023138 | 0x00022538 | 0x000001B5 |
IsValidCodePage | - | 0x0041C0A0 | 0x0002313C | 0x0002253C | 0x0000038F |
FindNextFileW | - | 0x0041C0A4 | 0x00023140 | 0x00022540 | 0x0000018F |
FindFirstFileExW | - | 0x0041C0A8 | 0x00023144 | 0x00022544 | 0x0000017E |
HeapReAlloc | - | 0x0041C0AC | 0x00023148 | 0x00022548 | 0x0000034F |
LCMapStringW | - | 0x0041C0B0 | 0x0002314C | 0x0002254C | 0x000003B5 |
QueryPerformanceCounter | - | 0x0041C0B4 | 0x00023150 | 0x00022550 | 0x0000044F |
GetCurrentProcessId | - | 0x0041C0B8 | 0x00023154 | 0x00022554 | 0x0000021B |
GetCurrentThreadId | - | 0x0041C0BC | 0x00023158 | 0x00022558 | 0x0000021F |
GetSystemTimeAsFileTime | - | 0x0041C0C0 | 0x0002315C | 0x0002255C | 0x000002EC |
InitializeSListHead | - | 0x0041C0C4 | 0x00023160 | 0x00022560 | 0x00000366 |
IsDebuggerPresent | - | 0x0041C0C8 | 0x00023164 | 0x00022564 | 0x00000382 |
UnhandledExceptionFilter | - | 0x0041C0CC | 0x00023168 | 0x00022568 | 0x000005B1 |
SetUnhandledExceptionFilter | - | 0x0041C0D0 | 0x0002316C | 0x0002256C | 0x00000571 |
GetStartupInfoW | - | 0x0041C0D4 | 0x00023170 | 0x00022570 | 0x000002D3 |
IsProcessorFeaturePresent | - | 0x0041C0D8 | 0x00023174 | 0x00022574 | 0x00000389 |
GetModuleHandleW | - | 0x0041C0DC | 0x00023178 | 0x00022578 | 0x0000027B |
GetCurrentProcess | - | 0x0041C0E0 | 0x0002317C | 0x0002257C | 0x0000021A |
RtlUnwind | - | 0x0041C0E4 | 0x00023180 | 0x00022580 | 0x000004D5 |
RaiseException | - | 0x0041C0E8 | 0x00023184 | 0x00022584 | 0x00000464 |
SetLastError | - | 0x0041C0EC | 0x00023188 | 0x00022588 | 0x00000534 |
EncodePointer | - | 0x0041C0F0 | 0x0002318C | 0x0002258C | 0x00000130 |
EnterCriticalSection | - | 0x0041C0F4 | 0x00023190 | 0x00022590 | 0x00000134 |
LeaveCriticalSection | - | 0x0041C0F8 | 0x00023194 | 0x00022594 | 0x000003C1 |
DeleteCriticalSection | - | 0x0041C0FC | 0x00023198 | 0x00022598 | 0x00000113 |
InitializeCriticalSectionAndSpinCount | - | 0x0041C100 | 0x0002319C | 0x0002259C | 0x00000362 |
TlsAlloc | - | 0x0041C104 | 0x000231A0 | 0x000225A0 | 0x000005A2 |
TlsGetValue | - | 0x0041C108 | 0x000231A4 | 0x000225A4 | 0x000005A4 |
TlsSetValue | - | 0x0041C10C | 0x000231A8 | 0x000225A8 | 0x000005A5 |
TlsFree | - | 0x0041C110 | 0x000231AC | 0x000225AC | 0x000005A3 |
FreeLibrary | - | 0x0041C114 | 0x000231B0 | 0x000225B0 | 0x000001AE |
GetProcAddress | - | 0x0041C118 | 0x000231B4 | 0x000225B4 | 0x000002B1 |
LoadLibraryExW | - | 0x0041C11C | 0x000231B8 | 0x000225B8 | 0x000003C7 |
GetModuleHandleExW | - | 0x0041C120 | 0x000231BC | 0x000225BC | 0x0000027A |
GetStdHandle | - | 0x0041C124 | 0x000231C0 | 0x000225C0 | 0x000002D5 |
GetModuleFileNameW | - | 0x0041C128 | 0x000231C4 | 0x000225C4 | 0x00000277 |
GetFileType | - | 0x0041C12C | 0x000231C8 | 0x000225C8 | 0x00000251 |
WideCharToMultiByte | - | 0x0041C130 | 0x000231CC | 0x000225CC | 0x00000602 |
WriteConsoleW | - | 0x0041C134 | 0x000231D0 | 0x000225D0 | 0x00000615 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
wsprintfA | - | 0x0041C144 | 0x000231E0 | 0x000225E0 | 0x000003E1 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | - | 0x0041C13C | 0x000231D8 | 0x000225D8 | 0x000001AA |
WINHTTP.dll (9)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WinHttpQueryDataAvailable | - | 0x0041C14C | 0x000231E8 | 0x000225E8 | 0x0000002B |
WinHttpConnect | - | 0x0041C150 | 0x000231EC | 0x000225EC | 0x00000009 |
WinHttpSetTimeouts | - | 0x0041C154 | 0x000231F0 | 0x000225F0 | 0x0000003A |
WinHttpSendRequest | - | 0x0041C158 | 0x000231F4 | 0x000225F4 | 0x00000034 |
WinHttpCloseHandle | - | 0x0041C15C | 0x000231F8 | 0x000225F8 | 0x00000008 |
WinHttpOpenRequest | - | 0x0041C160 | 0x000231FC | 0x000225FC | 0x00000027 |
WinHttpReceiveResponse | - | 0x0041C164 | 0x00023200 | 0x00022600 | 0x00000031 |
WinHttpOpen | - | 0x0041C168 | 0x00023204 | 0x00022604 | 0x00000026 |
WinHttpReadData | - | 0x0041C16C | 0x00023208 | 0x00022608 | 0x0000002E |
urlmon.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
URLDownloadToFileA | - | 0x0041C19C | 0x00023238 | 0x00022638 | 0x00000073 |
WS2_32.dll (9)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WSACleanup | 0x00000074 | 0x0041C174 | 0x00023210 | 0x00022610 | - |
closesocket | 0x00000003 | 0x0041C178 | 0x00023214 | 0x00022614 | - |
setsockopt | 0x00000015 | 0x0041C17C | 0x00023218 | 0x00022618 | - |
sendto | 0x00000014 | 0x0041C180 | 0x0002321C | 0x0002261C | - |
freeaddrinfo | - | 0x0041C184 | 0x00023220 | 0x00022620 | 0x00000095 |
getaddrinfo | - | 0x0041C188 | 0x00023224 | 0x00022624 | 0x00000096 |
WSAStartup | 0x00000073 | 0x0041C18C | 0x00023228 | 0x00022628 | - |
socket | 0x00000017 | 0x0041C190 | 0x0002322C | 0x0002262C | - |
recvfrom | 0x00000011 | 0x0041C194 | 0x00023230 | 0x00022630 | - |
Memory Dumps (21)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
out_4.bin.exe | 1 | 0x01230000 | 0x01257FFF | Relevant Image | 32-bit | 0x012386AE |
...
|
||
buffer | 1 | 0x0040B000 | 0x0040FFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x0054E4D8 | 0x0054E6F7 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x0054E7F0 | 0x0054EB53 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x0054EB60 | 0x0054F95F | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00550168 | 0x005501E7 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005501F0 | 0x00550287 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005502F0 | 0x005503BD | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00550D40 | 0x0055153F | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005519B0 | 0x00551A41 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00557F10 | 0x0055800E | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005607C0 | 0x005608BE | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005608C8 | 0x005609C6 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005609D0 | 0x00560ACE | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00567D08 | 0x005681DC | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00572B80 | 0x005733B3 | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x005733C0 | 0x005737BF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x00573ED0 | 0x00573FCE | First Network Behavior | 32-bit | - |
...
|
||
buffer | 1 | 0x02A656F8 | 0x02A65789 | First Network Behavior | 32-bit | - |
...
|
||
out_4.bin.exe | 1 | 0x01230000 | 0x01257FFF | First Network Behavior | 32-bit | 0x01233900 |
...
|
||
out_4.bin.exe | 1 | 0x01230000 | 0x01257FFF | Process Termination | 32-bit | - |
...
|
C:\Users\KEECFM~1\AppData\Local\Temp\5ZJNWs5LVhHy2g2\svchost.exe | Dropped File | Binary |
Suspicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x00F4FB75 |
Size Of Code | 0x0001D600 |
Size Of Initialized Data | 0x00084200 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-02-21 14:28 (UTC+1) |
Sections (7)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x0001D5FE | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.rdata | 0x0041F000 | 0x00002A50 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0 |
.data | 0x00422000 | 0x000005BC | 0x00000200 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.02 |
.5-D | 0x00423000 | 0x00A931F8 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.qa1 | 0x00EB7000 | 0x00000394 | 0x00000400 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.46 |
.C!b | 0x00EB8000 | 0x00D00E10 | 0x00D01000 | 0x00000A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.99 |
.rsrc | 0x01BB9000 | 0x00080EA4 | 0x00081000 | 0x00D01A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0 |
Imports (1)
»
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DestroyWindow | - | 0x00EB7008 | 0x00AC29C8 | 0x0000B3C8 | 0x00000000 |
C:\Users\kEecfMwgj\AppData\Local\Default\src\mails\gmail.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\mails\yahoo.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\mails\hotmail.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\content\main.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\proxy.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\modules\content-scripts-register-polyfill.4.0.0.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\getMachineInfo.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\commands.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\exchangeSettings.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\resolve.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\ico.png | Dropped File | Image |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\background.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\manifest.json | Dropped File | Unknown |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\tabs.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\notifications.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\rules.json | Dropped File | Unknown |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\injections.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\extensions.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\settings.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\app.html | Dropped File | HTML |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\csp.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\screenshot.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\config.js | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Default\src\functions\utils.js | Dropped File | Text |
Clean
|
...
|
»
5b3209b25aacc6bbdfd9445eb7e77bd910e4209f95094bf386d28524bf72f1ec | Downloaded File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x00F4FB75 |
Size Of Code | 0x0001D600 |
Size Of Initialized Data | 0x00084200 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-02-21 14:28 (UTC+1) |
Version Information (12)
»
CompanyName | MAGIX Computer Products Intl. Co. |
FileDescription | VEGAS MXF File Format |
FileVersion | Version 15.0 (Build 216) |
InternalName | mxfxavc.DLL |
LegalCopyright | Copyright (c) 2017 MAGIX Software GmbH. All rights reserved. |
OriginalFilename | mxfxavc.DLL |
ProductName | VEGAS MXF File Format |
ProductVersion | Version 15.0 (Build 216) |
SfCharSet | UNICODE |
SfLangName | English (U.S.) |
SfLangID | SBCS:409 |
OLESelfRegister | - |
Sections (7)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x0001D5FE | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.rdata | 0x0041F000 | 0x00002A50 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0 |
.data | 0x00422000 | 0x000005BC | 0x00000200 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.02 |
.5-D | 0x00423000 | 0x00A931F8 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.qa1 | 0x00EB7000 | 0x00000394 | 0x00000400 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.46 |
.C!b | 0x00EB8000 | 0x00D00E10 | 0x00D01000 | 0x00000A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.99 |
.rsrc | 0x01BB9000 | 0x00080EA4 | 0x00081000 | 0x00D01A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.95 |
Imports (7)
»
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalAlloc | - | 0x00EB7000 | 0x00AC29C0 | 0x0000B3C0 | 0x00000000 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DestroyWindow | - | 0x00EB7008 | 0x00AC29C8 | 0x0000B3C8 | 0x00000000 |
GDI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetFontLanguageInfo | - | 0x00EB7010 | 0x00AC29D0 | 0x0000B3D0 | 0x00000000 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | - | 0x00EB7018 | 0x00AC29D8 | 0x0000B3D8 | 0x00000000 |
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSystemTimeAsFileTime | - | 0x00EB7020 | 0x00AC29E0 | 0x0000B3E0 | 0x00000000 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CharUpperBuffW | - | 0x00EB7028 | 0x00AC29E8 | 0x0000B3E8 | 0x00000000 |
KERNEL32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalAlloc | - | 0x00EB7030 | 0x00AC29F0 | 0x0000B3F0 | 0x00000000 |
LocalFree | - | 0x00EB7034 | 0x00AC29F4 | 0x0000B3F4 | 0x00000000 |
GetModuleFileNameW | - | 0x00EB7038 | 0x00AC29F8 | 0x0000B3F8 | 0x00000000 |
ExitProcess | - | 0x00EB703C | 0x00AC29FC | 0x0000B3FC | 0x00000000 |
LoadLibraryA | - | 0x00EB7040 | 0x00AC2A00 | 0x0000B400 | 0x00000000 |
GetModuleHandleA | - | 0x00EB7044 | 0x00AC2A04 | 0x0000B404 | 0x00000000 |
GetProcAddress | - | 0x00EB7048 | 0x00AC2A08 | 0x0000B408 | 0x00000000 |
add0ebf1bb604d3681c8f7e80164f2072430c32cc4c8870394938e507fce5f02 | Downloaded File | Text |
Clean
|
...
|
»
15bf4209ecd3d78a4b3331defb091dc4738c2ec83f3897b2b79bc32d14691187 | Downloaded File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | Modified File | Stream |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | Modified File | Stream |
Clean
|
...
|
»