I:\WorkFolder\Glarysoft\winapps\5.0\dll\vc\MachineCode\sourcecode\Release\MachineCode.pdb
Static task
static1
Behavioral task
behavioral1
Sample
49dfcdb986d909614b5ad486cd8065668c6ddf7f.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
49dfcdb986d909614b5ad486cd8065668c6ddf7f.dll
Resource
win10v2004-20240508-en
General
-
Target
49dfcdb986d909614b5ad486cd8065668c6ddf7f
-
Size
561KB
-
MD5
ef5f6ac11b8490188afe5fd0a07d4e46
-
SHA1
49dfcdb986d909614b5ad486cd8065668c6ddf7f
-
SHA256
5c562f402c9a24012bd7d437c3b9c1d2dbdbaa16f0d2d61d900a1004c067155d
-
SHA512
91922afa545d6023bba72bae612538e9d3b11342be35a80b6ad2a6056e48faabdafe5fb7fc3f45958a793b42e53b6f2768177da778e506c17b98aea2c14cce99
-
SSDEEP
12288:1z/dcyHi8tH0jd4K6SYAv8Ahp550U31VZFv:1jTkYA0Op55DB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49dfcdb986d909614b5ad486cd8065668c6ddf7f
Files
-
49dfcdb986d909614b5ad486cd8065668c6ddf7f.dll windows:5 windows x86 arch:x86
5f61d48cbd2fe6358e13833e3dd30585
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
HeapSize
VirtualFree
HeapCreate
HeapDestroy
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetHandleCount
HeapFree
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetFileType
HeapAlloc
GetCPInfo
GlobalFindAtomA
lstrcmpW
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
GetModuleHandleW
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalGetAtomNameA
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcessId
GlobalAddAtomA
InterlockedDecrement
GetModuleFileNameW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
lstrlenA
GetComputerNameA
GetVersionExA
GetCurrentProcess
SetPriorityClass
CloseHandle
GetLastError
DeviceIoControl
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetStartupInfoA
SetLastError
user32
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
GetSystemMetrics
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
MessageBoxA
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
ClientToScreen
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
GetClipBox
DeleteDC
GetStockObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
ScaleWindowExtEx
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantChangeType
VariantClear
VariantInit
iphlpapi
GetAdaptersInfo
ws2_32
gethostbyname
WSACleanup
WSAStartup
gethostname
Exports
Exports
GetCPUID
GetEthernetMac
GetHardDriveSerialNumber
GetHash
GetModuleProp
GetMachineCode
GetMachineCodeEx
_SetMacAddressType@4
getComputerName
getUserName
Sections
.text Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
##XQedW Size: 236KB - Virtual size: 236KB
IMAGE_SCN_MEM_READ