C:\Users\Max\Application Data\foobar2000-v2\user-components\foo_input_sacd\foo_input_sacd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6.dll
Resource
win10v2004-20231215-en
General
-
Target
569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6
-
Size
4.6MB
-
MD5
3ea7cea05917d84d80164c259f476708
-
SHA1
2047ca46c8c1bc7b8247bc143f0b31c8639df74c
-
SHA256
569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6
-
SHA512
275fb4426cc972118496f8b6ac67d11aa45d27d6d068cee1dca1ebfa4cc4d932ecfa5a116acf773ba5313e8b1e85b5bbbdefc31930cabd86edc8e05f772fadcd
-
SSDEEP
49152:58KR+RS9Ya+cb7bmmvSuuv7pGdl683qOdOa1TiccsgO+mBfEd/h6uVqpyOqdus/a:+RMY1cWeSLjT86O8a4m2dA/F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6
Files
-
569723e0e2269b666eec14fdf6229fa01595aca27dbdb1f40b562e64748c4bf6.dll windows:6 windows x86 arch:x86
641146221517dd663c845cfca66a83d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shared
_uReplaceStringAdd@32
?scale@audio_math@@YGXPBMIPAMM@Z
_uPrintfV@12
??1uCallStackTracker@@QAE@XZ
_stricmp_utf8_ex@16
_GetInfiniteWaitEvent@0
??0uCallStackTracker@@QAE@PBD@Z
_uBugCheck@0
_uFormatSystemErrorMessage@8
_uExceptFilterProc@4
_stricmp_utf8@8
_uPrintCrashInfo_OnEvent@8
kernel32
IsDebuggerPresent
GetSystemTimeAsFileTime
AcquireSRWLockShared
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseSRWLockExclusive
MulDiv
LoadLibraryExW
lstrlenW
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
GlobalFree
GlobalAlloc
GlobalSize
GetFileSize
EncodePointer
InterlockedPopEntrySList
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
VirtualProtect
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
HeapFree
InitializeCriticalSectionEx
HeapSize
GetTickCount64
GetLastError
HeapReAlloc
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
ReadFile
SetFilePointer
CreateFileW
MultiByteToWideChar
GetDriveTypeW
GetFileSizeEx
CloseHandle
SetFilePointerEx
GetFileTime
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
GetModuleHandleA
TerminateProcess
GetProcAddress
GetCurrentProcess
K32GetModuleInformation
GetModuleHandleW
GetTickCount
OutputDebugStringW
DisableThreadLibraryCalls
LocalFree
FormatMessageA
GetThreadLocale
FlushInstructionCache
GlobalLock
GlobalUnlock
InterlockedPushEntrySList
CreateEventW
user32
AdjustWindowRect
NotifyWinEvent
MessageBeep
IsRectEmpty
GetMessagePos
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
GetNextDlgTabItem
InvalidateRgn
ScrollWindowEx
SetScrollPos
SetScrollInfo
SetGestureConfig
CloseGestureInfoHandle
GetGestureInfo
GetScrollInfo
GetClassInfoExW
RegisterClassExW
SetTimer
ShowWindow
KillTimer
PostMessageW
SetLayeredWindowAttributes
DrawEdge
MapWindowPoints
GetIconInfo
CreateWindowExW
GetFocus
GetDC
SetFocus
ScreenToClient
GetCursorPos
TrackMouseEvent
UpdateWindow
SetCapture
SetCursor
GetMenuStringW
FillRect
FrameRect
DrawIcon
DrawIconEx
DrawFocusRect
DrawTextW
ClientToScreen
GetWindow
PtInRect
CallWindowProcW
DrawFrameControl
GetDlgCtrlID
OffsetRect
CopyRect
GetWindowRect
GetMenuBarInfo
InflateRect
IntersectRect
SystemParametersInfoW
ReleaseDC
GetWindowDC
SetWindowPos
RegisterWindowMessageW
IsWindowEnabled
RedrawWindow
EndPaint
BeginPaint
GetClientRect
WindowFromPoint
CloseClipboard
OpenClipboard
GetKeyState
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
GetClipboardData
GetClassNameW
GetParent
CharLowerW
GetSysColor
GetWindowLongW
CreateDialogParamW
DefWindowProcW
DestroyWindow
SendMessageW
SetDlgItemTextW
RegisterClassW
GetDlgItemTextW
SendDlgItemMessageW
LoadCursorW
SetWindowLongW
GetDlgItem
InvalidateRect
EnableWindow
UnregisterClassW
SetRectEmpty
gdi32
SetDCBrushColor
SetDCPenColor
LineTo
MoveToEx
SetBkMode
GetTextColor
GetBkColor
OffsetRgn
CombineRgn
CreateRectRgnIndirect
CreateCompatibleDC
GetTextMetricsW
OffsetWindowOrgEx
SetWindowOrgEx
IntersectClipRect
CreateCompatibleBitmap
SetViewportOrgEx
BitBlt
GetTextExtentPoint32W
CreatePolygonRgn
FrameRgn
FillRgn
CreateRectRgn
GetCurrentObject
ExtTextOutW
CreatePen
SetBkColor
GetDeviceCaps
RestoreDC
SaveDC
SetTextColor
SelectObject
GetStockObject
DeleteDC
CreateFontIndirectW
DeleteObject
GetObjectW
LPtoDP
comdlg32
GetSaveFileNameW
GetOpenFileNameW
shell32
ord74
ole32
DoDragDrop
ReleaseStgMedium
RevokeDragDrop
RegisterDragDrop
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
VariantInit
SysAllocString
VariantClear
msvcp140
_Cnd_do_broadcast_at_thread_exit
_Thrd_hardware_concurrency
_Thrd_join
_Thrd_id
?_Xlength_error@std@@YAXPBD@Z
?_Throw_Cpp_error@std@@YAXH@Z
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_init_in_situ
_Mtx_unlock
?_Xbad_function_call@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
msvcp140_atomic_wait
__std_bulk_submit_threadpool_work
__std_wait_for_threadpool_work_callbacks
__std_close_threadpool_work
__std_atomic_notify_one_direct
__std_create_threadpool_work
__std_parallel_algorithms_hw_threads
__std_atomic_wait_direct
comctl32
ImageList_DrawEx
ImageList_GetIconSize
ord410
ord413
uxtheme
IsThemePartDefined
CloseThemeData
GetThemePartSize
OpenThemeData
DrawThemeTextEx
DrawThemeBackground
SetWindowTheme
msimg32
GradientFill
dwmapi
DwmSetWindowAttribute
oleacc
LresultFromObject
AccessibleObjectFromWindow
gdiplus
GdiplusStartup
GdipCreatePen1
GdipDeletePen
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdiplusShutdown
vcruntime140
_except_handler4_common
__std_type_info_destroy_list
__current_exception_context
memcmp
__current_exception
memset
memcpy
_CxxThrowException
memmove
strstr
_purecall
__std_exception_copy
__std_exception_destroy
__std_terminate
__CxxFrameHandler3
api-ms-win-crt-heap-l1-1-0
_recalloc
_aligned_malloc
_callnewh
_aligned_realloc
calloc
malloc
_aligned_free
realloc
_expand
free
api-ms-win-crt-runtime-l1-1-0
terminate
_seh_filter_dll
_configure_narrow_argv
_invalid_parameter_noinfo
_initialize_narrow_environment
_errno
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_invalid_parameter_noinfo_noreturn
_initterm
exit
_controlfp_s
_cexit
_initterm_e
_beginthreadex
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-string-l1-1-0
strncpy
_stricmp
strcat_s
wcsncpy_s
strlen
isdigit
isalnum
_wcsicmp
_wcsnicmp
wcsnlen
strcmp
strncmp
wcscpy_s
api-ms-win-crt-stdio-l1-1-0
ferror
fflush
fwrite
_wfopen_s
fclose
__stdio_common_vfprintf
feof
fgetws
__stdio_common_vfwprintf
__stdio_common_vswscanf
__stdio_common_vswprintf_s
_fseeki64
fread
ungetc
fopen
_ftelli64
__stdio_common_vsprintf
_fileno
_wfopen
__acrt_iob_func
_setmode
_chsize_s
_get_osfhandle
api-ms-win-crt-math-l1-1-0
llround
lround
floor
_libm_sse2_pow_precise
__libm_sse2_pow
log2
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-filesystem-l1-1-0
_fstat64i32
api-ms-win-crt-environment-l1-1-0
getenv
Exports
Exports
foobar2000_get_interface
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
asmcode Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IPPCODE Size: 594KB - Virtual size: 593KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.movehcs Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE