Static task
static1
General
-
Target
NFS MW Key Gen.exe
-
Size
8KB
-
MD5
5a55ee7bd95943c1ee9b01da94bda75e
-
SHA1
55cd6126fe5e8644cd71cd123f3482cae33e39ef
-
SHA256
8bf79b50da8a78fbc122f72eab2dbaeef3cccd93dfa07352482c53293304dcd3
-
SHA512
01c9c6dddaf06553cff00023b983cbc3e143d6d6899744028fea989085f47699e4cd27a5d23dffb25bc573840b20ff5dbabed1b3ba034f9352722f031fedfb3b
-
SSDEEP
48:OEPi8xCdq2pmL3L0Jacr6P0EC4/24kiRb4rP4lhbLHyJJd1MZsZ2BxJt3G4Mgbuy:nPv0Ujg0uw4z4lQMZsZ23JtOPwl
Malware Config
Signatures
Files
-
NFS MW Key Gen.exe.exe windows x86
db8514a2903fd590f9e52da16beab4fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
ExitProcess
GetTickCount
msvcrt
rand
strlen
strncpy
user32
GetDlgItem
EnumWindows
SetWindowTextA
SendMessageA
EndDialog
SendDlgItemMessageA
GetWindowTextA
DialogBoxParamA
Sections
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ