C:\Users\nasri\OneDrive\Рабочий стол\MY OLDERS\cheat\cheat rust\cheat\паста бин\Новая папка\CHEAT MAIN\SpaseWare\gop stop\x64\Release\deses1sdf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W64.ABRisk.LDYV-4748.11449.13965.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W64.ABRisk.LDYV-4748.11449.13965.dll
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.W64.ABRisk.LDYV-4748.11449.13965.exe
-
Size
537KB
-
MD5
46af692a0e8bf6b845603956b570b327
-
SHA1
f786b5b63468866d9274c38f4aafcdee59993b98
-
SHA256
3dae77665cd92bd6c3c5cb172a987b7f974ab2d6d6b96c8732113f01060c3e6a
-
SHA512
7d652050506ba467eb53a9aa51dab0ba1be2ab0939867bac45fdb73acb9bae171346e1e78fd6f3af5172616dbd94e40afb59f589f3d996376d3f5ab642fefa13
-
SSDEEP
6144:QisQ/XV2rNPpXE8V9HOFPxKHCB8Duk4VFHLanJYW1vYoWTRtncnJEZdFuZCI1NV:QbQ/X4V9HopgyanJYgQoWTRtnnZqHNV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.W64.ABRisk.LDYV-4748.11449.13965.exe
Files
-
SecuriteInfo.com.W64.ABRisk.LDYV-4748.11449.13965.exe.dll windows:6 windows x64 arch:x64
4488c5280bc8e7d929e3368105988105
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcp140
_Query_perf_counter
_Query_perf_frequency
_Thrd_sleep
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
_Xtime_get_ticks
d3dcompiler_43
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
user32
GetWindowLongPtrW
GetSystemMetrics
GetAsyncKeyState
OpenClipboard
RegisterClassExA
CallWindowProcW
DefWindowProcW
LoadCursorW
CloseClipboard
SetWindowLongPtrW
SetClipboardData
GetClipboardData
EmptyClipboard
IsChild
GetKeyState
GetCapture
SetCapture
ReleaseCapture
GetForegroundWindow
GetClientRect
SetCursorPos
SetCursor
GetCursorPos
ClientToScreen
ScreenToClient
CreateWindowExA
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
kernel32
GetLastError
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
SetLastError
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TerminateProcess
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetProcAddress
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
OpenThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
HeapCreate
CloseHandle
VirtualQuery
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
Beep
Sleep
CreateThread
GetCurrentThread
VirtualProtect
DisableThreadLibraryCalls
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
QueryPerformanceCounter
QueryPerformanceFrequency
MultiByteToWideChar
GetSystemInfo
vcruntime140
__C_specific_handler
strstr
__std_exception_copy
__std_exception_destroy
_CxxThrowException
memcmp
memcpy
memmove
memset
memchr
__std_type_info_destroy_list
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_execute_onexit_table
_crt_atexit
_cexit
system
_register_onexit_function
_initterm_e
_initterm
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-heap-l1-1-0
_callnewh
free
malloc
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsscanf
__stdio_common_vsprintf
fwrite
ftell
fseek
fread
fflush
_wfopen
__stdio_common_vfprintf
__stdio_common_vswprintf
__acrt_iob_func
fclose
api-ms-win-crt-math-l1-1-0
fmodf
atan2f
powf
pow
asinf
acosf
api-ms-win-crt-string-l1-1-0
strcmp
strncpy
api-ms-win-crt-convert-l1-1-0
atof
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ