![]() Source Hybrid Analysis Technology relevance 10/10 +142 call dword ptr EnumServicesStatusExW Which is directly followed by "cmp eax, edi" and "jne 10028274h". Which is directly followed by "cmp eax, edi" and "jne 10027E77h". Which is directly followed by "cmp eax, 04h" and "jbe 1000B216h". Reads information about supported languagesįound API call (Target: "BRFDC0.tmp.127145123" Stream UID: "1692B143") "BRD5F.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows"įound potential IP address in binary/memory "BR187E.tmp" has type "PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB) for MS Windows" "BR19D6.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BR19AC.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BR19FF.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BRCA9.tmp" has type "PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB) for MS Windows" "BRE0A.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BR19C1.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BRFC6B.tmp" has type "PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB) for MS Windows" ![]() "BRD0E.tmp" has type "PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB) for MS Windows" "BRFDC0.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "BR1855.tmp" has type "PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB) for MS Windows"
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |