id: 1 unit: def hello() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 100 LOC McCabe index: 11 number of parameters: 0 id: 2 unit: def build_argument_parser() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 66 LOC McCabe index: 1 number of parameters: 0 id: 3 unit: def extract_configuration() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 51 LOC McCabe index: 3 number of parameters: 1 id: 4 unit: def get_options() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 50 LOC McCabe index: 10 number of parameters: 0 id: 5 unit: def decompress_data() file: nightMARE/src/nightmare/analysis/compression/lznt1.py start line: 0 end line: 0 size: 40 LOC McCabe index: 9 number of parameters: 1 id: 6 unit: def __apply_relocations_aux() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 37 LOC McCabe index: 4 number of parameters: 2 id: 7 unit: def set_decompiler_comment() file: tools/latrodectus/latro_str_decrypt.py start line: 0 end line: 0 size: 33 LOC McCabe index: 8 number of parameters: 2 id: 8 unit: uint32_t main() file: tools/abyssworker/client/main.c start line: 82 end line: 119 size: 33 LOC McCabe index: 6 number of parameters: 2 id: 9 unit: def __extract_idat_blob() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 30 LOC McCabe index: 6 number of parameters: 2 id: 10 unit: def set_key() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 28 LOC McCabe index: 3 number of parameters: 2 id: 11 unit: def extract() file: nightMARE/src/nightmare/malware/redlinestealer/configuration.py start line: 0 end line: 0 size: 26 LOC McCabe index: 3 number of parameters: 1 id: 12 unit: def main() file: tools/ghostpulse/ghostpulse_payload_extractor.py start line: 0 end line: 0 size: 25 LOC McCabe index: 6 number of parameters: 0 id: 13 unit: def extract() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 24 LOC McCabe index: 4 number of parameters: 1 id: 14 unit: def crypt() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 23 LOC McCabe index: 7 number of parameters: 2 id: 15 unit: def build_context() file: tools/icedid/gzip-variant/load_core.py start line: 0 end line: 0 size: 23 LOC McCabe index: 2 number of parameters: 1 id: 16 unit: def __decrypt_configuration() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 22 LOC McCabe index: 7 number of parameters: 2 id: 17 unit: def __load_imports() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 22 LOC McCabe index: 6 number of parameters: 3 id: 18 unit: def __pixels_extraction_implementation() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 21 LOC McCabe index: 5 number of parameters: 1 id: 19 unit: def process_blister_sample() file: tools/blister/blister_payload_extractor.py start line: 0 end line: 0 size: 21 LOC McCabe index: 3 number of parameters: 2 id: 20 unit: def __visit_equality_comparison_expression() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 21 LOC McCabe index: 4 number of parameters: 2 id: 21 unit: def new_handler_5_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 21 LOC McCabe index: 1 number of parameters: 2 id: 22 unit: def decrypt_string() file: nightMARE/src/nightmare/malware/lobshot/crypto.py start line: 0 end line: 0 size: 20 LOC McCabe index: 5 number of parameters: 1 id: 23 unit: def explore_ctree() file: tools/ida_scripts/hexrays_examples/ctree_traversal.py start line: 0 end line: 0 size: 20 LOC McCabe index: 10 number of parameters: 1 id: 24 unit: def new_handler_7_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 20 LOC McCabe index: 1 number of parameters: 1 id: 25 unit: def new_handler_9_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 20 LOC McCabe index: 1 number of parameters: 1 id: 26 unit: def main() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 20 LOC McCabe index: 6 number of parameters: 0 id: 27 unit: def decrypt_core() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 19 LOC McCabe index: 3 number of parameters: 3 id: 28 unit: def next_state() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 19 LOC McCabe index: 4 number of parameters: 2 id: 29 unit: def decrypt_string() file: nightMARE/src/nightmare/malware/stealc/crypto.py start line: 0 end line: 0 size: 19 LOC McCabe index: 6 number of parameters: 2 id: 30 unit: def parse_arguments() file: extractors/remcos/remcos_configuration_extractor.py start line: 0 end line: 0 size: 19 LOC McCabe index: 1 number of parameters: 0 id: 31 unit: def get_addresses_from_tinytracer() file: tools/guloader/guloader_FixCFG.py start line: 0 end line: 0 size: 19 LOC McCabe index: 8 number of parameters: 1 id: 32 unit: def get_browser_hook_payloads() file: tools/icedid/gzip-variant/extract_payloads_from_core.py start line: 0 end line: 0 size: 19 LOC McCabe index: 5 number of parameters: 2 id: 33 unit: def get_payloads() file: tools/icedid/gzip-variant/extract_payloads_from_core.py start line: 0 end line: 0 size: 19 LOC McCabe index: 4 number of parameters: 1 id: 34 unit: def __parse_and_set_config() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 18 LOC McCabe index: 2 number of parameters: 1 id: 35 unit: def extract() file: nightMARE/src/nightmare/malware/stealc/configuration.py start line: 0 end line: 0 size: 18 LOC McCabe index: 6 number of parameters: 1 id: 36 unit: def main() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 18 LOC McCabe index: 6 number of parameters: 0 id: 37 unit: def get_encrypted_string() file: tools/latrodectus/latro_str_decrypt.py start line: 0 end line: 0 size: 18 LOC McCabe index: 6 number of parameters: 1 id: 38 unit: def visit_expr() file: tools/ida_scripts/hexrays_examples/ctree_practical_example.py start line: 0 end line: 0 size: 18 LOC McCabe index: 5 number of parameters: 2 id: 39 unit: def find_browser_hook_payloads() file: tools/icedid/gzip-variant/extract_payloads_from_core.py start line: 0 end line: 0 size: 18 LOC McCabe index: 4 number of parameters: 2 id: 40 unit: def __dict__() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 17 LOC McCabe index: 1 number of parameters: 1 id: 41 unit: def extract() file: nightMARE/src/nightmare/malware/smokeloader/configuration.py start line: 0 end line: 0 size: 17 LOC McCabe index: 4 number of parameters: 1 id: 42 unit: def main() file: extractors/redlinestealer/redlinestealer_config_extractor.py start line: 0 end line: 0 size: 17 LOC McCabe index: 7 number of parameters: 0 id: 43 unit: def parse_arguments() file: extractors/strelastealer/strela_stealer_payload_extractor.py start line: 0 end line: 0 size: 17 LOC McCabe index: 1 number of parameters: 0 id: 44 unit: def __init__() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 17 LOC McCabe index: 5 number of parameters: 2 id: 45 unit: def parse_arguments() file: tools/ghostpulse/ghostpulse_payload_extractor.py start line: 0 end line: 0 size: 17 LOC McCabe index: 1 number of parameters: 0 id: 46 unit: def __add_sections() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 16 LOC McCabe index: 2 number of parameters: 2 id: 47 unit: def unpack_mode() file: extractors/remcos/remcos_configuration_extractor.py start line: 0 end line: 0 size: 16 LOC McCabe index: 2 number of parameters: 2 id: 48 unit: def check() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 16 LOC McCabe index: 14 number of parameters: 1 id: 49 unit: def new_handler_10_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 16 LOC McCabe index: 1 number of parameters: 1 id: 50 unit: def extract() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 15 LOC McCabe index: 3 number of parameters: 1 id: 51 unit: def __visit() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 15 LOC McCabe index: 2 number of parameters: 2 id: 52 unit: def main() file: tools/icedid/gzip-variant/extract_gzip.py start line: 0 end line: 0 size: 15 LOC McCabe index: 1 number of parameters: 0 id: 53 unit: def new_handler_4_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 15 LOC McCabe index: 1 number of parameters: 1 id: 54 unit: def new_handler_6_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 15 LOC McCabe index: 1 number of parameters: 1 id: 55 unit: def get_string_decrypt_funcs() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 15 LOC McCabe index: 4 number of parameters: 0 id: 56 unit: def set_iv() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 14 LOC McCabe index: 4 number of parameters: 2 id: 57 unit: def __set_header() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 14 LOC McCabe index: 2 number of parameters: 2 id: 58 unit: def description() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 14 LOC McCabe index: 7 number of parameters: 1 id: 59 unit: def create_pipeline() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 14 LOC McCabe index: 1 number of parameters: 1 id: 60 unit: def calculate_checksum() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 14 LOC McCabe index: 6 number of parameters: 2 id: 61 unit: def __get_data_refs() file: nightMARE/src/nightmare/malware/xorddos/core.py start line: 0 end line: 0 size: 13 LOC McCabe index: 8 number of parameters: 1 id: 62 unit: def __allocate_image_memory() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 13 LOC McCabe index: 2 number of parameters: 1 id: 63 unit: def parse_arguments() file: tools/blister/blister_payload_extractor.py start line: 0 end line: 0 size: 13 LOC McCabe index: 1 number of parameters: 0 id: 64 unit: def __set_file_data() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 13 LOC McCabe index: 4 number of parameters: 1 id: 65 unit: def main() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 13 LOC McCabe index: 6 number of parameters: 0 id: 66 unit: def get_RtlDecompressBuffer() file: nightMARE/src/nightmare/win32.py start line: 0 end line: 0 size: 12 LOC McCabe index: 1 number of parameters: 0 id: 67 unit: def __parse_domains() file: nightMARE/src/nightmare/malware/icedid/configuration.py start line: 0 end line: 0 size: 12 LOC McCabe index: 3 number of parameters: 2 id: 68 unit: def decrypt_0() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 12 LOC McCabe index: 3 number of parameters: 2 id: 69 unit: def __init__() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 12 LOC McCabe index: 3 number of parameters: 2 id: 70 unit: def find_uris() file: nightMARE/src/nightmare/malware/stealc/configuration.py start line: 0 end line: 0 size: 12 LOC McCabe index: 4 number of parameters: 1 id: 71 unit: def pack_c2() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 12 LOC McCabe index: 2 number of parameters: 2 id: 72 unit: def parse_arguments() file: extractors/redlinestealer/redlinestealer_config_extractor.py start line: 0 end line: 0 size: 12 LOC McCabe index: 1 number of parameters: 0 id: 73 unit: def main() file: extractors/remcos/remcos_configuration_extractor.py start line: 0 end line: 0 size: 12 LOC McCabe index: 3 number of parameters: 0 id: 74 unit: def get_string_decrypt_funcs() file: tools/latrodectus/latro_str_decrypt.py start line: 0 end line: 0 size: 12 LOC McCabe index: 5 number of parameters: 1 id: 75 unit: def __init__() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 11 LOC McCabe index: 1 number of parameters: 0 id: 76 unit: def __injection_method() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 11 LOC McCabe index: 5 number of parameters: 1 id: 77 unit: def extract() file: nightMARE/src/nightmare/malware/strelastealer/payload.py start line: 0 end line: 0 size: 11 LOC McCabe index: 3 number of parameters: 1 id: 78 unit: def resolve_key_chain() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 11 LOC McCabe index: 4 number of parameters: 3 id: 79 unit: def __init_iat() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 11 LOC McCabe index: 4 number of parameters: 2 id: 80 unit: def unpack_and_write() file: extractors/strelastealer/strela_stealer_payload_extractor.py start line: 0 end line: 0 size: 11 LOC McCabe index: 2 number of parameters: 2 id: 81 unit: def parse_arguments() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 11 LOC McCabe index: 1 number of parameters: 0 id: 82 unit: def create_enrich_policies() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 11 LOC McCabe index: 3 number of parameters: 0 id: 83 unit: def find_cutom_pipeline_processor() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 11 LOC McCabe index: 6 number of parameters: 2 id: 84 unit: def get_VirtualAlloc() file: nightMARE/src/nightmare/win32.py start line: 0 end line: 0 size: 10 LOC McCabe index: 1 number of parameters: 0 id: 85 unit: def __parse_configuration_aux() file: nightMARE/src/nightmare/malware/xorddos/configuration.py start line: 0 end line: 0 size: 10 LOC McCabe index: 5 number of parameters: 1 id: 86 unit: def _decrypt_configuration() file: nightMARE/src/nightmare/malware/smokeloader/configuration.py start line: 0 end line: 0 size: 10 LOC McCabe index: 2 number of parameters: 2 id: 87 unit: def __apply_relocations() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 10 LOC McCabe index: 3 number of parameters: 1 id: 88 unit: def __resolve_imports() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 10 LOC McCabe index: 2 number of parameters: 1 id: 89 unit: def unpack_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 10 LOC McCabe index: 5 number of parameters: 1 id: 90 unit: def __init__() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 10 LOC McCabe index: 3 number of parameters: 2 id: 91 unit: def main() file: tools/blister/blister_payload_extractor.py start line: 0 end line: 0 size: 10 LOC McCabe index: 3 number of parameters: 0 id: 92 unit: def cleaning_callback() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 10 LOC McCabe index: 8 number of parameters: 1 id: 93 unit: def get_custom_pipelines() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 10 LOC McCabe index: 4 number of parameters: 0 id: 94 unit: def parse_arguments() file: tools/icedid/gzip-variant/load_core.py start line: 0 end line: 0 size: 10 LOC McCabe index: 1 number of parameters: 0 id: 95 unit: uint32_t malware_remove_callbacks_and_devices_by_module_name() file: tools/abyssworker/client/main.c start line: 70 end line: 80 size: 10 LOC McCabe index: 1 number of parameters: 4 id: 96 unit: def get_configuration() file: nightMARE/src/nightmare/malware/xorddos/configuration.py start line: 0 end line: 0 size: 9 LOC McCabe index: 1 number of parameters: 2 id: 97 unit: def __idat_extaction_implementation() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 9 LOC McCabe index: 3 number of parameters: 1 id: 98 unit: def __repr__() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 9 LOC McCabe index: 1 number of parameters: 1 id: 99 unit: def __decrypt_aux() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 9 LOC McCabe index: 3 number of parameters: 2 id: 100 unit: def read_encrypted_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 9 LOC McCabe index: 6 number of parameters: 1 id: 101 unit: def get_rdata_section_content() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 9 LOC McCabe index: 4 number of parameters: 1 id: 102 unit: def repack_mode() file: extractors/remcos/remcos_configuration_extractor.py start line: 0 end line: 0 size: 9 LOC McCabe index: 1 number of parameters: 2 id: 103 unit: def main() file: tools/guloader/guloader_FixCFG.py start line: 0 end line: 0 size: 9 LOC McCabe index: 2 number of parameters: 1 id: 104 unit: def process_stix_file() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 9 LOC McCabe index: 1 number of parameters: 2 id: 105 unit: def new_handler_multi_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 9 LOC McCabe index: 1 number of parameters: 0 id: 106 unit: def set_decompiler_comment() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 9 LOC McCabe index: 2 number of parameters: 2 id: 107 unit: uint32_t send_ioctrl() file: tools/abyssworker/client/main.c start line: 48 end line: 58 size: 9 LOC McCabe index: 3 number of parameters: 6 id: 108 unit: def __init__() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 0 id: 109 unit: def copy_state() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 2 id: 110 unit: def __get_all_posible_datarefs() file: nightMARE/src/nightmare/malware/xorddos/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 4 number of parameters: 1 id: 111 unit: def find_encrypted_candidates() file: nightMARE/src/nightmare/malware/xorddos/crypto.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 1 id: 112 unit: def decrypt_data() file: nightMARE/src/nightmare/malware/xorddos/crypto.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 3 id: 113 unit: def __generate_encrypted_string_candidates() file: nightMARE/src/nightmare/malware/lobshot/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 6 number of parameters: 1 id: 114 unit: def decrypt_string() file: nightMARE/src/nightmare/malware/latrodectus/crypto.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 1 id: 115 unit: def __get_payload() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 1 id: 116 unit: def __repr__() file: nightMARE/src/nightmare/malware/icedid/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 1 id: 117 unit: def __resolve_imports_aux() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 2 id: 118 unit: def unpack_c2() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 4 number of parameters: 1 id: 119 unit: def pack_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 2 id: 120 unit: def get_section_content() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 8 LOC McCabe index: 4 number of parameters: 2 id: 121 unit: def __print_iat_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 2 id: 122 unit: def load_pe() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 3 id: 123 unit: def main() file: extractors/strelastealer/strela_stealer_payload_extractor.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 0 id: 124 unit: def extract_configuration() file: tools/blister/blister_payload_extractor.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 1 id: 125 unit: def main() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 0 id: 126 unit: def __set_type() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 8 LOC McCabe index: 3 number of parameters: 1 id: 127 unit: def send_put() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 2 id: 128 unit: def send_post_empty() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 2 id: 129 unit: def send_put() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 2 id: 130 unit: def extract_payload() file: tools/ghostpulse/ghostpulse_payload_extractor.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 1 id: 131 unit: def main() file: tools/icedid/decompress_file.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 0 id: 132 unit: def main() file: tools/icedid/gzip-variant/read_configuration.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 0 id: 133 unit: def main() file: tools/icedid/gzip-variant/load_core.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 0 id: 134 unit: def parse_arguments() file: tools/icedid/rebuild_pe.py start line: 0 end line: 0 size: 8 LOC McCabe index: 1 number of parameters: 0 id: 135 unit: def main() file: tools/icedid/decrypt_file.py start line: 0 end line: 0 size: 8 LOC McCabe index: 2 number of parameters: 0 id: 136 unit: def _extract_config() file: nightMARE/src/nightmare/malware/smokeloader/configuration.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 2 id: 137 unit: def __find_tag_offset() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 7 LOC McCabe index: 3 number of parameters: 1 id: 138 unit: def __init__() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 2 id: 139 unit: def __find_free_memory() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 7 LOC McCabe index: 4 number of parameters: 2 id: 140 unit: def ip() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 2 id: 141 unit: def sp() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 2 id: 142 unit: def process_redlinestealer_file() file: extractors/redlinestealer/redlinestealer_config_extractor.py start line: 0 end line: 0 size: 7 LOC McCabe index: 3 number of parameters: 1 id: 143 unit: def pass_exception_unpack_mode() file: extractors/remcos/remcos_configuration_extractor.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 2 id: 144 unit: def parse_minsn_t() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 1 id: 145 unit: def __set_data() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 1 id: 146 unit: def send_delete() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 1 id: 147 unit: def send_post() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 2 id: 148 unit: def send_get() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 1 id: 149 unit: def process_ghostpulse_file() file: tools/ghostpulse/ghostpulse_payload_extractor.py start line: 0 end line: 0 size: 7 LOC McCabe index: 3 number of parameters: 1 id: 150 unit: def print_info() file: tools/icedid/gzip-variant/load_core.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 2 id: 151 unit: def main() file: tools/icedid/rebuild_pe.py start line: 0 end line: 0 size: 7 LOC McCabe index: 2 number of parameters: 0 id: 152 unit: def build_request() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 7 LOC McCabe index: 1 number of parameters: 3 id: 153 unit: def __parse_configuration() file: nightMARE/src/nightmare/malware/xorddos/configuration.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 0 id: 154 unit: def contains_only_printable_characters() file: nightMARE/src/nightmare/malware/xorddos/strings.py start line: 0 end line: 0 size: 6 LOC McCabe index: 3 number of parameters: 1 id: 155 unit: def __get_second_stage_content() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 1 id: 156 unit: def core_filename() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 1 id: 157 unit: def to_pe() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 1 id: 158 unit: def __init__() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 2 id: 159 unit: def __map_sections() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 6 LOC McCabe index: 3 number of parameters: 1 id: 160 unit: def __init_stack() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 2 id: 161 unit: def __map_pe() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 2 id: 162 unit: def ip() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 1 id: 163 unit: def sp() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 1 id: 164 unit: def get_displacement() file: nightMARE/src/nightmare/analysis/compression/lznt1.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 1 id: 165 unit: def parse_arguments() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 6 LOC McCabe index: 1 number of parameters: 0 id: 166 unit: def extract_config() file: extractors/redlinestealer/redlinestealer_config_extractor.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 1 id: 167 unit: def get_json_files() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 6 LOC McCabe index: 3 number of parameters: 2 id: 168 unit: def load_stix_objects_from_file() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 6 LOC McCabe index: 3 number of parameters: 1 id: 169 unit: def parse_tlp() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 6 LOC McCabe index: 3 number of parameters: 1 id: 170 unit: def cleanup() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 6 LOC McCabe index: 2 number of parameters: 0 id: 171 unit: def get_GetLastError() file: nightMARE/src/nightmare/win32.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 172 unit: def get_GetProcAddress() file: nightMARE/src/nightmare/win32.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 173 unit: def get_LoadLibraryA() file: nightMARE/src/nightmare/win32.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 174 unit: def g_func() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 2 id: 175 unit: def st() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 1 id: 176 unit: def __get_user_string() file: nightMARE/src/nightmare/malware/redlinestealer/configuration.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 177 unit: def __decrypt_configuration_field() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 178 unit: def __check_data() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 2 id: 179 unit: def __get_offset_to_payload() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 180 unit: def __init__() file: nightMARE/src/nightmare/malware/icedid/configuration.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 2 id: 181 unit: def __parse_key() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 1 id: 182 unit: def __check_integrity() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 183 unit: def decrypt_1() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 1 id: 184 unit: def find_key() file: nightMARE/src/nightmare/malware/stealc/configuration.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 1 id: 185 unit: def build_packet() file: nightMARE/src/nightmare/malware/remcos/c2.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 1 id: 186 unit: def get_data() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 3 id: 187 unit: def find_strings() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 1 id: 188 unit: def yara_scan() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 189 unit: def get_pe_data_from_rva() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 3 id: 190 unit: def __is_memory_mapped() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 3 id: 191 unit: def do_return() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 2 id: 192 unit: def xor() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 2 id: 193 unit: def get_mcode_name() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 1 id: 194 unit: def parse_mblock_t() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 1 id: 195 unit: def get_op_name() file: tools/ida_scripts/hexrays_examples/ctree_traversal.py start line: 0 end line: 0 size: 5 LOC McCabe index: 3 number of parameters: 1 id: 196 unit: def main() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 197 unit: def flatten_list() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 1 id: 198 unit: def format_ecs_indicator_for_elastic() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 1 id: 199 unit: def is_supported_ecs_indicator() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 1 id: 200 unit: def main() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 201 unit: def main() file: tools/malware_research/custom_pipelines.py start line: 0 end line: 0 size: 5 LOC McCabe index: 2 number of parameters: 0 id: 202 unit: def parse_arguments() file: tools/icedid/decompress_file.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 203 unit: def parse_arguments() file: tools/icedid/gzip-variant/extract_payloads_from_core.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 204 unit: def parse_arguments() file: tools/icedid/gzip-variant/extract_gzip.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 205 unit: def print_info() file: tools/icedid/gzip-variant/extract_gzip.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 1 id: 206 unit: def parse_arguments() file: tools/icedid/decrypt_file.py start line: 0 end line: 0 size: 5 LOC McCabe index: 1 number of parameters: 0 id: 207 unit: def __init__() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 208 unit: def __init__() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 3 id: 209 unit: def __get_stream_data() file: nightMARE/src/nightmare/malware/redlinestealer/configuration.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 2 id: 210 unit: def core() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 211 unit: def stage_2() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 212 unit: def __repr__() file: nightMARE/src/nightmare/malware/icedid/configuration.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 213 unit: def memory() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 1 id: 214 unit: def unpack_window_names() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 1 id: 215 unit: def pack_window_names() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 1 id: 216 unit: def download_json() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 3 id: 217 unit: def __dispatch_iat_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 2 id: 218 unit: def allocate_memory() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 2 id: 219 unit: def set_iat_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 220 unit: def set_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 221 unit: def rol() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 3 id: 222 unit: def ror() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 3 id: 223 unit: def print_banner() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 224 unit: def print_banner() file: tools/blister/blister_payload_extractor.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 225 unit: def __init__() file: tools/ida_scripts/hexrays_examples/ctree_practical_example.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 2 id: 226 unit: def main() file: tools/ida_scripts/hexrays_examples/ctree_practical_example.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 227 unit: def parse_mop_t() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 1 id: 228 unit: def parse_mba_t() file: tools/ida_scripts/hexrays_examples/microcode_traversal.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 1 id: 229 unit: def main() file: tools/ida_scripts/hexrays_examples/ctree_traversal.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 230 unit: def execute_enrich_policies() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 4 LOC McCabe index: 2 number of parameters: 0 id: 231 unit: def print_banner() file: tools/ghostpulse/ghostpulse_payload_extractor.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 232 unit: def main() file: tools/icedid/gzip-variant/extract_payloads_from_core.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 233 unit: def parse_arguments() file: tools/icedid/gzip-variant/read_configuration.py start line: 0 end line: 0 size: 4 LOC McCabe index: 1 number of parameters: 0 id: 234 unit: uint32_t malware_enable() file: tools/abyssworker/client/main.c start line: 60 end line: 63 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 235 unit: uint32_t malware_load_api() file: tools/abyssworker/client/main.c start line: 65 end line: 68 size: 4 LOC McCabe index: 1 number of parameters: 1 id: 236 unit: def __init__() file: nightMARE/src/nightmare/malware/blister/crypto.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 1 id: 237 unit: def __calculate_basic_block_start() file: nightMARE/src/nightmare/malware/xorddos/crypto.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 238 unit: def find_c2_list() file: nightMARE/src/nightmare/malware/xorddos/strings.py start line: 0 end line: 0 size: 3 LOC McCabe index: 2 number of parameters: 1 id: 239 unit: def find_embedded_urls() file: nightMARE/src/nightmare/malware/xorddos/strings.py start line: 0 end line: 0 size: 3 LOC McCabe index: 2 number of parameters: 1 id: 240 unit: def find_xor_key_and_function() file: nightMARE/src/nightmare/malware/xorddos/core.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 241 unit: def parse() file: nightMARE/src/nightmare/malware/lobshot/configuration.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 1 id: 242 unit: def __decrypt_string() file: nightMARE/src/nightmare/malware/redlinestealer/configuration.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 2 id: 243 unit: def __init__() file: nightMARE/src/nightmare/malware/icedid/configuration.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 2 id: 244 unit: def __map() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 1 id: 245 unit: def write_files() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 3 LOC McCabe index: 2 number of parameters: 3 id: 246 unit: def __call_iat_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 3 LOC McCabe index: 2 number of parameters: 3 id: 247 unit: def __call_hook() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 3 id: 248 unit: def generate_random_string() file: tools/ida_scripts/hexrays_examples/ctree_practical_example.py start line: 0 end line: 0 size: 3 LOC McCabe index: 2 number of parameters: 1 id: 249 unit: def visit_json_aux() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 250 unit: def __set_field_name() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 1 id: 251 unit: def __set_other_data() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 3 LOC McCabe index: 3 number of parameters: 1 id: 252 unit: def write_ecs_files() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 253 unit: def recreate_ingest_pipeline() file: tools/malware_research/enrich_policy_setup.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 254 unit: def new_handler_8_parameter() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 3 LOC McCabe index: 1 number of parameters: 0 id: 255 unit: def enabled_features() file: nightMARE/src/nightmare/malware/blister/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 3 number of parameters: 1 id: 256 unit: def __get_encrypted_candidates() file: nightMARE/src/nightmare/malware/xorddos/crypto.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 257 unit: def __find_xor_key() file: nightMARE/src/nightmare/malware/xorddos/core.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 258 unit: def __get_xor_key() file: nightMARE/src/nightmare/malware/xorddos/core.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 259 unit: def parse_binary() file: nightMARE/src/nightmare/malware/xorddos/core.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 260 unit: def __parse_encrypted_string_candidates() file: nightMARE/src/nightmare/malware/lobshot/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 261 unit: def _extract_encryption_addresses() file: nightMARE/src/nightmare/malware/smokeloader/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 262 unit: def __get_match_offset() file: nightMARE/src/nightmare/malware/redlinestealer/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 263 unit: def decrypt_string() file: nightMARE/src/nightmare/malware/nighthawk/crypto.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 264 unit: def __extract_config() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 265 unit: def __extract_encryption_addresses() file: nightMARE/src/nightmare/malware/netwire/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 266 unit: def __get_idat_occurrence() file: nightMARE/src/nightmare/malware/ghostpulse/payload.py start line: 0 end line: 0 size: 2 LOC McCabe index: 2 number of parameters: 1 id: 267 unit: def configuration() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 268 unit: def core_directory() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 269 unit: def core_size() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 270 unit: def is_dll() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 271 unit: def stage_2_filename() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 272 unit: def stage_2_size() file: nightMARE/src/nightmare/malware/icedid/fake_gzip.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 273 unit: def __parse_integrity_hash() file: nightMARE/src/nightmare/malware/icedid/crypto.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 274 unit: def __decompress_lznt1() file: nightMARE/src/nightmare/malware/icedid/compression.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 275 unit: def decompress() file: nightMARE/src/nightmare/malware/icedid/compression.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 276 unit: def protection_to_lief_section_characteristics() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 277 unit: def content() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 278 unit: def is_32() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 279 unit: def __load_library_and_get_thunks() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 280 unit: def base_address() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 281 unit: def entrypoint() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 282 unit: def EntryPoint() file: nightMARE/src/nightmare/malware/icedid/custom_pe.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 283 unit: def build_command_packet() file: nightMARE/src/nightmare/malware/remcos/c2.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 284 unit: def patch_encrypted_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 285 unit: def decrypt_encrypted_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 286 unit: def encrypt_configuration() file: nightMARE/src/nightmare/malware/remcos/configuration.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 287 unit: def __download_aux() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 288 unit: def convert_bytes_to_base64_in_dict() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 289 unit: def download() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 3 id: 290 unit: def map_files_directory() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 291 unit: def is_base64() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 292 unit: def is_url() file: nightMARE/src/nightmare/utils.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 293 unit: def __enable_iat_hooking() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 294 unit: def free_memory() file: nightMARE/src/nightmare/analysis/emulation.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 3 id: 295 unit: def rol8() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 296 unit: def rol16() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 297 unit: def rol32() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 298 unit: def rol64() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 299 unit: def ror8() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 300 unit: def ror16() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 301 unit: def ror32() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 302 unit: def ror64() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 303 unit: def swap32() file: nightMARE/src/nightmare/analysis/bits.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 304 unit: def decompress() file: nightMARE/src/nightmare/analysis/compression/lznt1.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 305 unit: def extract_configuration() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 306 unit: def display_results() file: extractors/lobshot/lobshot_config_extractor.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 307 unit: def get_xrefs() file: tools/latrodectus/latro_str_decrypt.py start line: 0 end line: 0 size: 2 LOC McCabe index: 2 number of parameters: 1 id: 308 unit: def clean_stix() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 309 unit: def visit_json() file: tools/stix-to-ecs/extra/clean_stix.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 310 unit: def data() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 311 unit: def field_name() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 312 unit: def type() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 313 unit: def convert_ecs_word_to_field() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 314 unit: def convert_stix_indicator_to_ecs_indicator() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 315 unit: def convert_stix_indicators_to_ecs_indicators() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 316 unit: def convert_stix_word_to_ecs_word() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 317 unit: def is_stix_indicator() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 1 id: 318 unit: def process_stix_files() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 319 unit: def write_ecs_to_elastic() file: tools/stix-to-ecs/stix_to_ecs.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 320 unit: def download_dll() file: tools/warmcookie/warmcookie_http.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0 id: 321 unit: def decrypt_string() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 2 id: 322 unit: def get_xrefs() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 2 LOC McCabe index: 2 number of parameters: 1 id: 323 unit: def get_encrypted_string() file: tools/warmcookie/warmcookie_str_decrypt.py start line: 0 end line: 0 size: 2 LOC McCabe index: 1 number of parameters: 0