C:\Users\delea\OneDrive\Escritorio\toxic imgui ofc\Max\examples\example_win32_directx11\Release\Toxic Externala.pdb
Static task
static1
General
-
Target
Toxic_Externala.exe
-
Size
2.3MB
-
MD5
ddc614be094c1619cb38e331c6ab57cc
-
SHA1
efe908cbcc30d766b3a0b4bf005883914b90fc28
-
SHA256
11a5bb0713a9d4446b52f239a6cc6fb59379e1c9301c7bdf2fb794d39fe4243d
-
SHA512
42bc82d21a65be2ea5229fa11fceceb55311e4e3112495c50ecf2708f62463816f491528bf1aaef6dbd0a79f3f56fd389349a37eb158093ec7ea9bd05c852599
-
SSDEEP
49152:MW6vh3MUFgPaXKYaGOuEMuwApWHZMjBPOil3jwVVABlfnP4S9GhZyk6PlYyf+:yvh3MUFgPaXKYaGOuEMuwApWHZMjBPOV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Toxic_Externala.exe
Files
-
Toxic_Externala.exe.exe windows:6 windows x64 arch:x64
b3e54cf5dfc77386dbc2527293ca0c8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_43
D3DCompile
kernel32
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
VirtualProtect
GetFileType
WaitForMultipleObjects
GetFileSizeEx
DeleteCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
VerifyVersionInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
GetSystemDirectoryA
SleepEx
LeaveCriticalSection
CreateFileMappingW
EnterCriticalSection
LocalFree
MapViewOfFile
FormatMessageA
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleW
QueryFullProcessImageNameW
VirtualQueryEx
IsDebuggerPresent
GetTickCount
VirtualFreeEx
CreateRemoteThread
VirtualAllocEx
Beep
GetLocalTime
CreateThread
Process32Next
GetProcessHeap
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
CreateFileA
Sleep
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
TerminateProcess
OutputDebugStringA
GetCurrentProcess
Process32First
GetModuleFileNameW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
CreateFileW
PeekNamedPipe
WriteFile
ReadFile
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
QueryPerformanceCounter
FreeLibrary
VerSetConditionMask
GetProcAddress
QueryPerformanceFrequency
LoadLibraryA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
MoveFileExA
GlobalAlloc
MultiByteToWideChar
InitializeCriticalSectionEx
SetLastError
user32
GetSystemMetrics
DestroyWindow
GetWindowRect
DispatchMessageA
CreateWindowExW
UnregisterClassW
ShowWindow
GetAsyncKeyState
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
SetWindowDisplayAffinity
SetCursorPos
ReleaseCapture
IsWindowUnicode
GetClientRect
SetCursor
SetCapture
GetForegroundWindow
TrackMouseEvent
ClientToScreen
GetCapture
ScreenToClient
LoadCursorA
GetKeyState
UpdateWindow
GetDesktopWindow
PostQuitMessage
PeekMessageA
LoadIconA
GetActiveWindow
MessageBoxA
MoveWindow
DefWindowProcA
RegisterClassExW
TranslateMessage
advapi32
ConvertSidToStringSidA
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
SetSecurityInfo
IsValidSid
InitializeAcl
GetLengthSid
GetTokenInformation
OpenProcessToken
AddAccessAllowedAce
shell32
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
msvcp140
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Xbad_function_call@std@@YAXXZ
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
_Thrd_detach
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
_Xtime_get_ticks
_Mtx_current_owns
_Cnd_init_in_situ
?_Throw_Cpp_error@std@@YAXH@Z
_Cnd_timedwait
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_init_in_situ
_Cnd_do_broadcast_at_thread_exit
_Mtx_unlock
_Cnd_broadcast
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
ImmSetCandidateWindow
dwmapi
DwmExtendFrameIntoClientArea
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
ntdll
NtSuspendProcess
RtlCaptureContext
RtlAdjustPrivilege
RtlLookupFunctionEntry
RtlVirtualUnwind
NtRaiseHardError
NtResumeProcess
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord30
ord50
ord45
ord60
ord211
ord46
ord217
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord301
ord200
ord143
crypt32
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertEnumCertificatesInStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertAddCertificateContextToStore
CertOpenStore
CertFindCertificateInStore
CertCloseStore
ws2_32
gethostname
sendto
recvfrom
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
getpeername
socket
setsockopt
ntohs
htons
getsockopt
getsockname
connect
bind
WSAGetLastError
send
recv
closesocket
ntohl
WSASetLastError
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
__current_exception
__C_specific_handler
strchr
memset
memmove
memcpy
strrchr
memcmp
__std_exception_destroy
__std_exception_copy
__std_terminate
strstr
_CxxThrowException
memchr
api-ms-win-crt-stdio-l1-1-0
_wfopen
__stdio_common_vsprintf
_lseeki64
fread
ftell
_set_fmode
__p__commode
feof
fputs
fputc
__acrt_iob_func
fflush
__stdio_common_vsscanf
fclose
fseek
_popen
_pclose
fgets
_open
__stdio_common_vswprintf
_close
__stdio_common_vfprintf
fopen
_write
_read
fwrite
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-string-l1-1-0
strncmp
strcpy_s
_strdup
tolower
strpbrk
strspn
strcmp
isupper
strcspn
strncpy
api-ms-win-crt-heap-l1-1-0
malloc
_msize
_set_new_mode
calloc
_callnewh
realloc
free
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_crt_atexit
_get_narrow_winmain_command_line
_initterm
_initterm_e
_exit
_wassert
_c_exit
_register_thread_local_exe_atexit_callback
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_seh_filter_exe
terminate
exit
_initialize_onexit_table
_initialize_narrow_environment
system
_cexit
_errno
strerror
__sys_nerr
_configure_narrow_argv
_invalid_parameter_noinfo
_resetstkoflw
_beginthreadex
_getpid
api-ms-win-crt-convert-l1-1-0
strtoll
strtol
strtod
atoi
strtoul
strtoull
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
api-ms-win-crt-multibyte-l1-1-0
_mbsicmp
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
localeconv
api-ms-win-crt-math-l1-1-0
acosf
fmodf
_dclass
ceilf
cosf
sqrtf
sinf
__setusermatherr
api-ms-win-crt-filesystem-l1-1-0
_stat64
_unlink
_fstat64
_access
Sections
.text Size: 768KB - Virtual size: 767KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 538KB - Virtual size: 537KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 995KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ