AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
b62dfcb979cc8386c4b872c1d5b3b4cddd5dfc89459e5b65406e97ac4ff81bc5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b62dfcb979cc8386c4b872c1d5b3b4cddd5dfc89459e5b65406e97ac4ff81bc5.exe
Resource
win10v2004-20231215-en
Target
b62dfcb979cc8386c4b872c1d5b3b4cddd5dfc89459e5b65406e97ac4ff81bc5
Size
1.4MB
MD5
dfd293678426403ba5191bb2f37b210c
SHA1
b26685886c724110734894978a4f4bbf4e76aa97
SHA256
b62dfcb979cc8386c4b872c1d5b3b4cddd5dfc89459e5b65406e97ac4ff81bc5
SHA512
1ad664b908017d5ca0cca1eda3f0954dda563a9f35c0075e01fbc554e46712f7385cfcd1af62f5607f7256338e23a5267888fcdddd112e487fac0e876464cde8
SSDEEP
24576:VcVkehFYgfNxmcDSQNP+noJ0u0ny3bvqJUjPouvK72WyweCHMub0+VbACb:eVkehFYgfN1DXP+Xu04rqJIouvK5bNsS
Checks for missing Authenticode signature.
resource |
---|
b62dfcb979cc8386c4b872c1d5b3b4cddd5dfc89459e5b65406e97ac4ff81bc5 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
VerSetConditionMask
NtQueryInformationProcess
NtCallbackReturn
NtMapViewOfSection
NtUnmapViewOfSection
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadVirtualMemory
NtOpenProcess
NtCreateSection
NtQueryVirtualMemory
NtQuerySystemInformation
NtQueryValueKey
RtlNtStatusToDosError
RtlFreeHeap
NtClose
RtlInitUnicodeString
NtOpenKey
RtlAllocateHeap
NtEnumerateKey
TlsGetValue
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
HeapFree
DeviceIoControl
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetVersionExW
MultiByteToWideChar
LoadLibraryW
QueryDosDeviceW
GetModuleFileNameW
GetLogicalDriveStringsW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcess
GetLastError
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleW
IsWow64Process
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
LoadLibraryA
Process32FirstW
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsW
GetSystemDirectoryW
WriteProcessMemory
VirtualProtect
ReadProcessMemory
GetCurrentThreadId
ResumeThread
ExitThread
GetCurrentThread
TerminateThread
Thread32Next
Thread32First
SuspendThread
GetCurrentProcessId
OpenThread
TerminateProcess
WaitForMultipleObjects
CreateThread
VirtualAlloc
VirtualQuery
TlsSetValue
VirtualFree
GetCommandLineW
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
OpenFileMappingW
UnmapViewOfFile
TlsAlloc
GetWindowsDirectoryW
ExitProcess
CreateProcessW
FreeLibrary
VerifyVersionInfoW
GetSystemTimeAsFileTime
CreateFileMappingW
MapViewOfFile
GetProcessTimes
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
LoadLibraryExW
InterlockedFlushSList
RaiseException
SetThreadContext
GetThreadContext
HeapReAlloc
GetThreadPriority
SetThreadPriority
HeapCreate
CreateMutexA
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsFree
LCMapStringW
GetLocaleInfoW
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
GetClassNameW
GetModuleFileNameExW
sendto
socket
getaddrinfo
WSAStartup
htonl
htons
freeaddrinfo
WSACleanup
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ