c:\Users\AMERIUU\Desktop\Wr\Menu Source\Neuer Ordner\Neuer Ordner\Neuer Ordner\VIP Hack Menue\VIP Hack Menue\VIP Menu\Release\DarkHax.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c49545f42878630e7a6791463649d1ba.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c49545f42878630e7a6791463649d1ba.dll
Resource
win10v2004-20240226-en
General
-
Target
c49545f42878630e7a6791463649d1ba
-
Size
150KB
-
MD5
c49545f42878630e7a6791463649d1ba
-
SHA1
22af186be9d9679868ff493b5280da7ad81929e9
-
SHA256
e817d7891b38ea5cb7713e6977a14872a42482c770109b06033251119fef38e1
-
SHA512
2f28cf07de4bf7ab52f87af53cd72d2cbf66fc063c146f2eb880fd906eba359079896bea4642d357dcefc5e34ecba30c46837e361cfeda5385eecb5a32dee8d4
-
SSDEEP
3072:IlDUzpN1L7Nk+erbNd/RpBOVAIrHmWG/2yD4FvgEQeeaQeewQeesQee2dQeehQed:fdPNk+Mbr/DIrHvgEQeeaQeewQeesQe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c49545f42878630e7a6791463649d1ba
Files
-
c49545f42878630e7a6791463649d1ba.dll windows:5 windows x86 arch:x86
e708e1e879faef897c8b3e1d2fb9a0be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
GetSystemTimeAsFileTime
Sleep
IsProcessorFeaturePresent
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
GetPrivateProfileIntA
FlushInstructionCache
VirtualQuery
MulDiv
CreateThread
VirtualProtect
GetModuleHandleA
DisableThreadLibraryCalls
GetCurrentThreadId
VirtualAlloc
GetCurrentThread
GetCurrentProcess
GetCurrentProcessId
ExitProcess
UnhandledExceptionFilter
TerminateProcess
OutputDebugStringA
InterlockedExchange
InterlockedCompareExchange
user32
GetAsyncKeyState
SetCursorPos
FindWindowA
mouse_event
SetRect
GetCursorPos
keybd_event
GetKeyState
gdi32
SetTextColor
DeleteDC
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
SetMapMode
SetTextAlign
ExtTextOutA
GetTextExtentPoint32A
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
msvcr90
_except_handler4_common
__clean_type_info_names_internal
_crt_debugger_hook
malloc
sprintf
memcpy
memset
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler
_ftol
_finite
_CIacos
??3@YAXPAX@Z
strncpy
ceil
_mbsnbcpy
??2@YAPAXI@Z
_vsnprintf
_CIsqrt
msvcp90
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ