![]() ![]() dllĬontains modern PE file flags such as dynamic base (ASLR) or NX Static PE information: 32BIT_MACH INE, EXECU TABLE_IMAG Eįile opened: C:\Users\u ser\AppDat a\Local\Te mp\downloa d\msvcr71. ![]() Source: C:\Users\u ser\AppDat a\Local\Te mp\C0CA61A 12E4C8B38. exe.33100 00.8.unpac kĭetected unpacking (creates a PE file in dynamic memory) 0x3fa4f0:$s4: | %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger').Detects an suspicious ping command execution in an executableĥ.2.C0CA61 A12E4C8B38.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |