GetGameData
Init
Static task
static1
Behavioral task
behavioral1
Sample
11b2aac107b8d69ec7a97ecf9b506dab9199aabea6d1a2d1ee746dd1a4dfa22c.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
11b2aac107b8d69ec7a97ecf9b506dab9199aabea6d1a2d1ee746dd1a4dfa22c.dll
Resource
win10v2004-20230221-en
Target
11b2aac107b8d69ec7a97ecf9b506dab9199aabea6d1a2d1ee746dd1a4dfa22c
Size
4.5MB
MD5
1adbc919f36a2fcc03c88950e3b050d8
SHA1
b4396fdb3cff27d3d9bb1ef50fa506b275ca14c4
SHA256
11b2aac107b8d69ec7a97ecf9b506dab9199aabea6d1a2d1ee746dd1a4dfa22c
SHA512
04bc2014efd256174e31b275a2a229c6b5703fd00f5671cf0fdfb29005321747afa93df87bd114d0b7714acfac10c4d5e64e816ce7bade1f4a1a4ce2e2b8a573
SSDEEP
98304:fvoalEXsWI+oIgG70hguV/XGyv0JnuU3lnWgRVdJh:f64PD7N+uUVnW4j
Checks for missing Authenticode signature.
resource |
---|
11b2aac107b8d69ec7a97ecf9b506dab9199aabea6d1a2d1ee746dd1a4dfa22c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetCommandLineA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetVersion
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
VirtualQuery
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GetFileSize
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
SetHandleCount
CloseHandle
GetCurrentProcessId
CreateThread
WriteProcessMemory
GetCurrentProcess
IsBadCodePtr
VirtualProtect
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
ShowWindow
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
SetWindowPos
SetWindowLongA
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
IsWindowVisible
EnumChildWindows
wsprintfA
MessageBoxA
CallWindowProcA
CheckMenuItem
PathFileExistsA
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
SetViewportExtEx
GetObjectA
Escape
ExtTextOutA
GetDeviceCaps
PtVisible
RectVisible
TextOutA
CreateBitmap
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
ord17
GetGameData
Init
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ