Summary | ZeroBOX

13loader_p1_dll_64_n1_x64_inf.dll

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 14, 2023, 2:44 p.m. Sept. 14, 2023, 2:47 p.m.
Size 302.5KB
Type PE32+ executable (DLL) (console) x86-64, for MS Windows
MD5 e2e6dae8a6dc0297fa05621ab32a1217
SHA256 4d10e1d9ea1bdca465b1be0940f1d5e30aaf75cdb962df344fa7ae4aa497ff10
CRC32 C44F70F8
ssdeep 6144:IOXtutuAZoWIn7Csid4BXGeg6QquQkCpj:B9u4AKWIn7eFounE
PDB Path C:\php-sdk\php70dev\vc14\x64\obj\Release_TS\php7phpdbg.pdb
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE64 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\php-sdk\php70dev\vc14\x64\obj\Release_TS\php7phpdbg.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2616
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000018002f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2616
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd6c1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2616
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd7c3000
process_handle: 0xffffffffffffffff
1 0 0
section {u'size_of_data': u'0x00005000', u'virtual_address': u'0x0004a000', u'entropy': 7.490083600152523, u'name': u'.rsrc', u'virtual_size': u'0x00004a5a'} entropy 7.49008360015 description A section with a high entropy has been found