HuaxiaVolcanoInstall
InitCfg
begin_game
Static task
static1
Behavioral task
behavioral1
Sample
781d50ff2dde724d8ece451d8cf2c3a2454f0ae365297d3c630d325038180b85.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
781d50ff2dde724d8ece451d8cf2c3a2454f0ae365297d3c630d325038180b85.dll
Resource
win10v2004-20230915-en
Target
781d50ff2dde724d8ece451d8cf2c3a2454f0ae365297d3c630d325038180b85
Size
851KB
MD5
cda49ee14e462be9ca9bb35c81b214b1
SHA1
07bbdb3002a44c4fe012d6bb625f3f2a0e9a536e
SHA256
781d50ff2dde724d8ece451d8cf2c3a2454f0ae365297d3c630d325038180b85
SHA512
fa3ef20962ab047220d2cbd783e71e0c1206a8097771c392e489f5395a9161247774fe72adeb310ec53a4d15baed68b1f70b81f1f5374e3937fddbf1dc1ea0c4
SSDEEP
12288:Ci1qY0ZAwAjxM5ZtguN7UMq9f0clcGi5qtkRQNRK4BL6FuOddbXxSF07cWkhqKLG:7n0ZIlcGi5qtkRu+4rLtVzwok
Checks for missing Authenticode signature.
resource |
---|
781d50ff2dde724d8ece451d8cf2c3a2454f0ae365297d3c630d325038180b85 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
QueryPerformanceCounter
HeapFree
GetProcessHeap
InitializeCriticalSection
OpenProcess
TerminateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
Beep
RaiseException
FreeLibraryAndExitThread
GetLastError
HeapSize
EnterCriticalSection
LoadLibraryA
DecodePointer
GetSystemInfo
GetModuleFileNameA
QueryFullProcessImageNameA
DeleteCriticalSection
GetCurrentThreadId
GetVersionExA
CloseHandle
GetCurrentProcessId
CreateThread
WritePrivateProfileStructA
GlobalLock
GlobalAlloc
GlobalUnlock
GetPrivateProfileStructA
VirtualFree
VirtualAlloc
VirtualProtect
IsBadCodePtr
SetUnhandledExceptionFilter
SetEndOfFile
ReadConsoleW
ReadFile
CreateFileW
WriteConsoleW
HeapAlloc
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
LoadLibraryExW
GetModuleFileNameW
WriteFile
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetEnvironmentVariableA
SetLastError
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
AreFileApisANSI
GetModuleHandleExW
IsProcessorFeaturePresent
IsDebuggerPresent
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
EncodePointer
HeapReAlloc
ExitProcess
GetProcAddress
GetModuleHandleA
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
GetPrivateProfileIntA
IsBadReadPtr
OutputDebugStringW
GetTickCount
EnableWindow
GetDlgCtrlID
GetDlgItemTextA
SetWindowTextA
PostMessageA
IsWindow
GetDlgItem
SetDlgItemTextA
GetForegroundWindow
SetActiveWindow
CloseClipboard
PtInRect
EmptyClipboard
OpenClipboard
SetClipboardData
ClientToScreen
DestroyWindow
GetMessageA
GetClassNameA
SetTimer
GetWindowRect
CreateDialogParamA
GetTopWindow
GetSubMenu
GetFocus
GetParent
LoadMenuA
LoadIconA
MessageBeep
GetClientRect
SetForegroundWindow
TrackPopupMenuEx
SetWindowLongA
GetWindowLongA
EndDialog
SendMessageTimeoutA
GetDesktopWindow
SetWindowPos
ShowWindow
DispatchMessageA
IsWindowVisible
DestroyMenu
DestroyIcon
GetMessageTime
GetWindowThreadProcessId
GetWindow
ScreenToClient
GetCursorPos
GetActiveWindow
GetDlgItemInt
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
GetWindowTextA
GetAsyncKeyState
MessageBoxA
SetBkMode
GetStockObject
SetTextColor
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
StrStrIA
WSAStartup
recvfrom
select
sendto
InitCommonControlsEx
timeGetTime
timeSetEvent
PlaySoundA
GetModuleInformation
HuaxiaVolcanoInstall
InitCfg
begin_game
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ