l:\Dev\eMule0.30e-LSD13h-Src\src\Release_Sockets_V2_AMD\emule.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9.exe
Resource
win10v2004-20240226-en
General
-
Target
6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9
-
Size
2.9MB
-
MD5
2a7b18484878cce44e37cb2c59681820
-
SHA1
5d8482ef3875575af2172abe0f43cf42de7bd7c3
-
SHA256
6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9
-
SHA512
75a08515758d18f8eee1e49a760a0e695ceff12d378795e847c5fb58bae4fe2de45c60f2f41cbdd450f57ec09cb0e1b6d241f537d9007906222f9fa3c7558cdd
-
SSDEEP
49152:+6qm9k54+XuwepUwrjxMJOu/3e4TlM3rbGiQT:+JMp+Xuw5CtMwu/3eDbyV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9
Files
-
6364707d3da46e65e3825ed5c5e3278bc857bc93bd395457b0a43b90c082d5d9.exe windows:4 windows x86 arch:x86
a010a4d32084f9b14802bd3aaa4d084b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WideCharToMultiByte
LCMapStringW
SizeofResource
LockResource
LoadResource
FindResourceA
WaitForSingleObject
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetLastError
GetCurrentThreadId
LCMapStringA
HeapSize
SetStdHandle
CreateThread
ExitThread
RtlUnwind
GetCommandLineA
GetStartupInfoA
GetLocalTime
GetFileType
PeekNamedPipe
GetFileInformationByHandle
VirtualQuery
GetSystemInfo
VirtualAlloc
TerminateProcess
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
HeapFree
GetOEMCP
GetCPInfo
GlobalFlags
SetErrorMode
GetPrivateProfileIntA
VirtualProtect
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetFileTime
GetTickCount
CreateFileA
GetFileSize
CopyFileA
lstrlenA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
RaiseException
LoadLibraryA
GetProcAddress
FreeLibrary
CreateMutexA
GlobalAlloc
GlobalLock
GlobalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
ReleaseMutex
SetLastError
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
lstrcpynA
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
ReadFile
SetFilePointer
SetEndOfFile
SuspendThread
ResetEvent
GetTimeFormatA
GetDateFormatA
IsDBCSLeadByte
FindNextFileA
GetWindowsDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
WriteFile
TerminateThread
WaitForMultipleObjects
CreateEventA
Sleep
SetEvent
GetShortPathNameA
GlobalUnlock
CreateDirectoryA
RemoveDirectoryA
MoveFileA
Beep
DeleteFileA
DeviceIoControl
GetFileAttributesA
FindClose
FindFirstFileA
OutputDebugStringA
GetNumberFormatA
LocalFree
GetDiskFreeSpaceA
FormatMessageA
ExitProcess
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
ResumeThread
WritePrivateProfileStringA
GetCurrentDirectoryA
GetModuleFileNameA
FindResourceExA
MulDiv
FreeResource
lstrlenW
GetVersion
CompareStringW
CompareStringA
lstrcmpiA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
user32
MapDialogRect
RegisterClipboardFormatA
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
SetMenuItemBitmaps
ModifyMenuA
GetMenuCheckMarkDimensions
WinHelpA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
TrackPopupMenu
GetScrollPos
SetScrollInfo
GetClassInfoA
RegisterClassA
SetWindowPlacement
GetDlgCtrlID
CallWindowProcA
SetWindowPos
IntersectRect
GetWindowPlacement
GetMenuState
GetMenuItemID
SetWindowsHookExA
CallNextHookEx
GetMessageA
ValidateRect
GetScrollInfo
GetClassLongA
GetWindowRgn
EndDeferWindowPos
DeferWindowPos
GetMenu
IsMenu
AdjustWindowRectEx
MessageBeep
IsRectEmpty
SubtractRect
GetMenuItemCount
RemoveMenu
FindWindowA
SetWindowRgn
DispatchMessageA
TranslateMessage
EqualRect
FindWindowExA
GetAsyncKeyState
GrayStringA
DrawTextExA
TabbedTextOutA
GetSysColorBrush
ScrollDC
DrawIconEx
MapWindowPoints
SetWindowContextHelpId
ShowScrollBar
LoadCursorA
UpdateWindow
GetKeyState
CheckMenuItem
EnableMenuItem
GetCaretPos
GetWindowDC
SetActiveWindow
GetClassNameA
GetWindow
FlashWindow
DrawIcon
IsIconic
CreateMenu
GetSystemMenu
GetCursorPos
LoadBitmapA
MapVirtualKeyA
ReleaseCapture
SetRect
GetMessagePos
GetCapture
SetCapture
SystemParametersInfoA
DrawFrameControl
PtInRect
SetMenuDefaultItem
CreatePopupMenu
ScreenToClient
RedrawWindow
IsWindowVisible
SetParent
InflateRect
OffsetRect
CreateIconIndirect
GetIconInfo
CopyRect
DrawStateA
GetClientRect
DrawFocusRect
FrameRect
TrackPopupMenuEx
GetSubMenu
GetWindowRect
GetActiveWindow
WindowFromPoint
SetCursor
GetParent
GetNextDlgTabItem
DestroyMenu
DestroyCursor
InvalidateRect
PeekMessageA
MsgWaitForMultipleObjects
GetFocus
EndDialog
CreateDialogIndirectParamA
BeginPaint
EndPaint
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
PostThreadMessageA
DrawTextA
DrawEdge
InsertMenuA
GetSysColor
UnregisterClassA
IsWindow
SetForegroundWindow
GetDlgItem
FillRect
ClientToScreen
IsCharAlphaA
AppendMenuA
ExitWindowsEx
wsprintfA
SetTimer
KillTimer
MessageBoxA
ReleaseDC
GetDesktopWindow
GetDC
CharUpperA
LoadIconA
LoadImageA
CopyIcon
DestroyIcon
GetClipboardData
IsClipboardFormatAvailable
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
SendMessageTimeoutA
SendMessageA
EnumWindows
GetSystemMetrics
RegisterWindowMessageA
EnableWindow
PostMessageA
DefWindowProcA
GetWindowLongA
DestroyWindow
SetWindowLongA
CreateWindowExA
RegisterClassExA
BeginDeferWindowPos
gdi32
SetBoundsRect
SetPixelV
CreatePolygonRgn
SetRectRgn
OffsetRgn
FillRgn
CreateDIBitmap
ExtSelectClipRgn
GetClipBox
SaveDC
RestoreDC
SetPolyFillMode
SetROP2
SetMapMode
ExcludeClipRect
LineTo
MoveToEx
SetTextAlign
SelectClipRgn
SetBitmapDimensionEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectPalette
GetRgnBox
EnumFontFamiliesExA
GetBitmapDimensionEx
CombineRgn
Escape
RectVisible
PtVisible
CreateRectRgn
GetViewportOrgEx
GetWindowOrgEx
GetBkColor
DPtoLP
GetViewportExtEx
GetWindowExtEx
GetMapMode
LPtoDP
CreateFontA
GetTextColor
SetBitmapBits
GetBitmapBits
GetTextExtentExPointA
TextOutA
GdiFlush
CreateRectRgnIndirect
CreatePen
RealizePalette
Rectangle
CreatePalette
CreateSolidBrush
Polygon
SetPixel
GetPixel
BitBlt
CreateBitmap
SetTextColor
SetBkMode
ExtTextOutA
SetBkColor
GetTextExtentPoint32A
CreateFontIndirectA
GetStockObject
CreateCompatibleBitmap
GetDeviceCaps
SetDIBColorTable
SelectObject
DeleteObject
CreateDIBSection
CreateCompatibleDC
GetObjectA
DeleteDC
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
ChooseFontA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
LookupPrivilegeValueA
shell32
ShellExecuteExA
ExtractIconExA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
SHGetFileInfoA
comctl32
ImageList_GetImageInfo
ImageList_Draw
_TrackMouseEvent
ord17
ImageList_SetBkColor
ImageList_GetIcon
ImageList_GetIconSize
ImageList_AddMasked
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragMove
ImageList_DragLeave
ImageList_EndDrag
ImageList_SetOverlayImage
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
PropertySheetA
DestroyPropertySheetPage
ImageList_ReplaceIcon
CreatePropertySheetPageA
shlwapi
PathIsRelativeA
PathRemoveFileSpecA
PathRemoveBackslashA
PathCanonicalizeA
PathFileExistsA
StrStrIA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathMatchSpecA
UrlUnescapeA
oledlg
ord8
ole32
CoRevokeClassObject
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
CoInitialize
CoTaskMemFree
CoUninitialize
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromProgID
CLSIDFromString
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
oleaut32
SysStringLen
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
VariantTimeToSystemTime
SysAllocString
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysAllocStringLen
OleLoadPicture
SystemTimeToVariantTime
ws2_32
sendto
recvfrom
gethostbyaddr
select
WSASocketA
WSAEnumNetworkEvents
WSAGetLastError
inet_addr
gethostbyname
htons
WSASetLastError
ntohs
socket
WSAAsyncSelect
htonl
bind
closesocket
WSACancelAsyncRequest
recv
send
WSAAsyncGetHostByName
connect
inet_ntoa
getpeername
shutdown
listen
accept
ioctlsocket
getsockopt
setsockopt
WSACleanup
WSAStartup
ntohl
gethostname
WSAEventSelect
wininet
InternetOpenA
InternetReadFile
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCloseHandle
InternetErrorDlg
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetStatusCallback
InternetConnectA
winmm
PlaySoundA
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 364KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 578KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 480KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ