Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AQSEFheXAt.exe

Overview

General Information

Sample name:AQSEFheXAt.exe
renamed because original name is a hash value
Original sample name:dd9d850c3adfcc00afc866be173f0ff2.exe
Analysis ID:1527162
MD5:dd9d850c3adfcc00afc866be173f0ff2
SHA1:5a589e76661c8d7e5670de2e029c7197a4cf5c62
SHA256:f06dfaf71001e7b9234ea3d8cbefd367963e82e7ae62d0859567be143fb00142
Tags:exeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

Go Injector
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Go Injector
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found

Classification

No configs have been found
SourceRuleDescriptionAuthorStrings
AQSEFheXAt.exeJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: AQSEFheXAt.exeReversingLabs: Detection: 15%
    Source: AQSEFheXAt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: AQSEFheXAt.exeString found in binary or memory: http://github.com/garycourt/uri-js
    Source: AQSEFheXAt.exeString found in binary or memory: http://json-schema.org/draft-07/schema
    Source: AQSEFheXAt.exeString found in binary or memory: http://json-schema.org/draft-07/schema#
    Source: AQSEFheXAt.exeString found in binary or memory: http://json-schema.org/schema
    Source: AQSEFheXAt.exeString found in binary or memory: https://aws.amazon.com
    Source: AQSEFheXAt.exeString found in binary or memory: https://github.com/aws/jsii
    Source: AQSEFheXAt.exeString found in binary or memory: https://github.com/aws/jsii.git
    Source: AQSEFheXAt.exeString found in binary or memory: https://github.com/aws/jsii/issues
    Source: AQSEFheXAt.exeString found in binary or memory: https://github.com/jprichardson/node-fs-extra/issues/269
    Source: AQSEFheXAt.exeString found in binary or memory: https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
    Source: AQSEFheXAt.exeStatic PE information: Number of sections : 12 > 10
    Source: AQSEFheXAt.exeStatic PE information: No import functions for PE file found
    Source: AQSEFheXAt.exeStatic PE information: Data appended to the last section found
    Source: classification engineClassification label: mal56.troj.winEXE@0/0@0/0
    Source: AQSEFheXAt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: AQSEFheXAt.exeReversingLabs: Detection: 15%
    Source: AQSEFheXAt.exeString found in binary or memory: net/addrselect.go
    Source: AQSEFheXAt.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
    Source: AQSEFheXAt.exeString found in binary or memory: github.com/aws/jsii-runtime-go@v1.101.0/internal/kernel/load.go
    Source: AQSEFheXAt.exeString found in binary or memory: MXjsXMnKMN/load.go
    Source: AQSEFheXAt.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: AQSEFheXAt.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: AQSEFheXAt.exeStatic file information: File size 11465048 > 1048576
    Source: AQSEFheXAt.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x483600
    Source: AQSEFheXAt.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x850c00
    Source: AQSEFheXAt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: AQSEFheXAt.exeStatic PE information: section name: .xdata

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: AQSEFheXAt.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: AQSEFheXAt.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    Path InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    AQSEFheXAt.exe16%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://github.com/aws/jsii/issuesAQSEFheXAt.exefalse
      unknown
      https://github.com/jprichardson/node-fs-extra/issues/269AQSEFheXAt.exefalse
        unknown
        https://github.com/aws/jsii.gitAQSEFheXAt.exefalse
          unknown
          https://github.com/aws/jsiiAQSEFheXAt.exefalse
            unknown
            http://github.com/garycourt/uri-jsAQSEFheXAt.exefalse
              unknown
              http://json-schema.org/draft-07/schema#AQSEFheXAt.exefalse
                unknown
                https://aws.amazon.comAQSEFheXAt.exefalse
                  unknown
                  https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#AQSEFheXAt.exefalse
                    unknown
                    http://json-schema.org/schemaAQSEFheXAt.exefalse
                      unknown
                      http://json-schema.org/draft-07/schemaAQSEFheXAt.exefalse
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1527162
                        Start date and time:2024-10-06 21:13:48 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 1m 38s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:1
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:AQSEFheXAt.exe
                        renamed because original name is a hash value
                        Original Sample Name:dd9d850c3adfcc00afc866be173f0ff2.exe
                        Detection:MAL
                        Classification:mal56.troj.winEXE@0/0@0/0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Unable to launch sample, stop analysis
                        • No process behavior to analyse as no analysis process or sample was found
                        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                        • Exclude process from analysis (whitelisted): dllhost.exe
                        • VT rate limit hit for: AQSEFheXAt.exe
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                        Entropy (8bit):6.47459854171725
                        TrID:
                        • Win64 Executable (generic) (12005/4) 74.95%
                        • Generic Win/DOS Executable (2004/3) 12.51%
                        • DOS Executable Generic (2002/1) 12.50%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                        File name:AQSEFheXAt.exe
                        File size:11'465'048 bytes
                        MD5:dd9d850c3adfcc00afc866be173f0ff2
                        SHA1:5a589e76661c8d7e5670de2e029c7197a4cf5c62
                        SHA256:f06dfaf71001e7b9234ea3d8cbefd367963e82e7ae62d0859567be143fb00142
                        SHA512:29b7daf8aad456ae807ad300249d9d2b4df02dc8686c5806f8d7f4a4d61b67395eecbd67ca57c229f3e50c061f360fac6212809f1a5be7478c66e19805fcd526
                        SSDEEP:49152:wmzngihKMT2072v8r1yM1zJA08KYj+FEvYVgcW1XedvR5gthtcdT9sGO/0ZR7sII:fKWr68sFKYm4VFYq1EmCDLsKW
                        TLSH:2AB67C53ADA140F1C6AED674C96B80237B70744A533027D73E6C96206F56FE09EFAB60
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.6H..F.................@....................................p.....`... ............................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x1400014c0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:1
                        File Version Major:6
                        File Version Minor:1
                        Subsystem Version Major:6
                        Subsystem Version Minor:1
                        Import Hash:
                        Instruction
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [00D1FE75h]
                        mov dword ptr [eax], 00000001h
                        call 00007FE8CCB5FF4Fh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [00D1FE55h]
                        mov dword ptr [eax], 00000000h
                        call 00007FE8CCB5FF2Fh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        call 00007FE8CCFE2A0Ch
                        dec eax
                        test eax, eax
                        sete al
                        movzx eax, al
                        neg eax
                        dec eax
                        add esp, 28h
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        dec eax
                        lea ecx, dword ptr [00000009h]
                        jmp 00007FE8CCB60269h
                        nop dword ptr [eax+00h]
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        jmp dword ptr [eax]
                        inc edi
                        outsd
                        and byte ptr [edx+75h], ah
                        imul ebp, dword ptr [esp+20h], 203A4449h
                        and cl, byte ptr [edx+55h]
                        xor ecx, dword ptr [ecx+6Ah]
                        push ebp
                        inc ecx
                        bound ebp, dword ptr [edx+69h]
                        jbe 00007FE8CCB60303h
                        push eax
                        je 00007FE8CCB60303h
                        dec esp
                        inc esp
                        push 38572F39h
                        outsb
                        jp 00007FE8CCB602E1h
                        inc ecx
                        cmp dword ptr [edi], esi
                        push ebx
                        xor al, 56h
                        pop edx
                        push ebx
                        imul edx, dword ptr [eax+79h], 752F3072h
                        xor bh, byte ptr [eax]
                        inc edi
                        js 00007FE8CCB602F5h
                        arpl word ptr [4D343042h], bp
                        inc ebp
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0xdd80000x4e.edata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xdd90000x1458.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xddd0000x141b5.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xd220000x254c4.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xdf20000x189b8.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xd20ca00x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xdd94940x458.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x4834400x4836002d40a6344d2d6cd6f18ac3db9bc4fc94unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x4850000x4b7900x4b8004f3da827a3d53299701265a3211c0fe8False0.37411397971854304dBase III DBT, version number 0, next free block index 10, 1st item "WY="4.890020677993758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x4d10000x850ad00x850c00b0aea8b77291791f14ecdde471ec0146unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .pdata0xd220000x254c40x25600d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .xdata0xd480000xc500xe00d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .bss0xd490000x8e5800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .edata0xdd80000x4e0x200d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .idata0xdd90000x14580x1600d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .CRT0xddb0000x700x200d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0xddc0000x100x200d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xddd0000x141b50x14200d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0xdf20000x189b80x18a00d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        No network behavior found
                        No statistics
                        No system behavior
                        No disassembly