AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
5596646a6cd15514fa401310283ac723e0aec13b85f27afd2e4307c390f3685d.exe
Resource
win7-20240215-en
Target
5596646a6cd15514fa401310283ac723e0aec13b85f27afd2e4307c390f3685d
Size
8.8MB
MD5
8f6ecd2edaefd0e7764ec08b66dca417
SHA1
854ee5eddff2e8156486ed9f41e57b8b43f16f99
SHA256
5596646a6cd15514fa401310283ac723e0aec13b85f27afd2e4307c390f3685d
SHA512
1da54fd042daf7ac95916b60f100f62e26e8d94eea2bc5fd0aac7bdf799e9c8f8047942db83140205ad7dc03d7d6f190f3fcd362824c306d911512d211d20f37
SSDEEP
196608:0TRXv97H41yYXvHg6Rd64M7Vjc6tAeLdwc:gvB4loA67u6tNv
Checks for missing Authenticode signature.
resource |
---|
5596646a6cd15514fa401310283ac723e0aec13b85f27afd2e4307c390f3685d |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
VerSetConditionMask
NtQueryInformationProcess
NtCallbackReturn
NtMapViewOfSection
NtUnmapViewOfSection
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadVirtualMemory
NtOpenProcess
NtCreateSection
NtQueryVirtualMemory
NtQuerySystemInformation
NtQueryValueKey
RtlNtStatusToDosError
RtlFreeHeap
NtClose
RtlInitUnicodeString
NtOpenKey
RtlAllocateHeap
NtEnumerateKey
TlsGetValue
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
HeapFree
DeviceIoControl
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetVersionExW
MultiByteToWideChar
LoadLibraryW
QueryDosDeviceW
GetModuleFileNameW
GetLogicalDriveStringsW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcess
GetLastError
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleW
IsWow64Process
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
LoadLibraryA
Process32FirstW
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsW
GetSystemDirectoryW
WriteProcessMemory
VirtualProtect
ReadProcessMemory
GetCurrentThreadId
ResumeThread
ExitThread
GetCurrentThread
TerminateThread
Thread32Next
Thread32First
SuspendThread
GetCurrentProcessId
OpenThread
TerminateProcess
WaitForMultipleObjects
CreateThread
VirtualAlloc
VirtualQuery
TlsSetValue
VirtualFree
GetCommandLineW
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetEnvironmentVariableW
GetFileAttributesW
OpenFileMappingW
UnmapViewOfFile
TlsAlloc
GetWindowsDirectoryW
ExitProcess
CreateProcessW
FreeLibrary
VerifyVersionInfoW
GetSystemTimeAsFileTime
CreateFileMappingW
MapViewOfFile
GetProcessTimes
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
LoadLibraryExW
InterlockedFlushSList
RaiseException
SetThreadContext
GetThreadContext
HeapReAlloc
GetThreadPriority
SetThreadPriority
HeapCreate
CreateMutexA
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsFree
LCMapStringW
GetLocaleInfoW
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
GetClassNameW
GetModuleFileNameExW
sendto
socket
getaddrinfo
WSAStartup
htonl
htons
freeaddrinfo
WSACleanup
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE