E:\Q Drive\ActivationEMSバージョンアップ\ClassWizEmulator 最新版\ClassWizEmulator\Release_Cy251_991DEX\ClassWizEmulator.pdb
Static task
static1
Behavioral task
behavioral1
Sample
777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48.exe
Resource
win10v2004-20240508-en
General
-
Target
777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48
-
Size
1.5MB
-
MD5
3d8d387cacf5e5fd1689c1e845dd284d
-
SHA1
584d3246e1ba0dc5dd49e362ba36ca702fd039e2
-
SHA256
777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48
-
SHA512
b918bbec62645259c30b848ece2e743b138ace9ce57afddba26f6df6ae50faec9eb6d0c8d17a7c2b723f6fcfc22c847116e8bf5ce296662189263e8319e82574
-
SSDEEP
24576:B+Y4Z9Prc7Xu2fjlERE7ut0/9qknJYevCIGx2c2R8sSKu73eI4r:BcvfE7uuPnW6R8sn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48
Files
-
777f46d70b34f6f706ddb193c981f3d8a104513cc1ce27b98b356307eac5aa48.exe windows:5 windows x86 arch:x86
f8d32b4727db88eb45a88af8528a6091
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
simu8
SetRomWindowSize
SetCodeMemoryDefaultCode
SetCallbackFunc
SetWait
SetDataMemorySize
SimStart
SimReset
WriteBitDataMemory
WriteCodeMemory
SetCodeMemorySize
SetMemoryModel
SetInterruptTable
WriteDataMemory
SimStop
ReadDataMemory
classwiz_p12
ord3
ord4
ord6
ord5
ord8
ord9
ord18
ord15
ord17
ord14
ord12
ord19
ord10
ord2
ord16
ord11
activationfx
ord14
ord11
ord13
ord12
opencv_core2410
?deallocate@Mat@cv@@QAEXXZ
?flip@cv@@YAXABV_InputArray@1@ABV_OutputArray@1@H@Z
??4Mat@cv@@QAEAAV01@ABV?$Scalar_@N@1@@Z
??0_OutputArray@cv@@QAE@AAVMat@1@@Z
??0_InputArray@cv@@QAE@ABVMat@1@@Z
?fastFree@cv@@YAXPAX@Z
?_interlockedExchangeAdd@cv@@YAHPAHH@Z
?create@Mat@cv@@QAEXHPBHH@Z
opencv_imgproc2410
?resize@cv@@YAXABV_InputArray@1@ABV_OutputArray@1@V?$Size_@H@1@NNH@Z
mfc100u
ord2614
ord1905
ord1934
ord4359
ord7973
ord12948
ord13391
ord3985
ord1944
ord788
ord1212
ord10081
ord4355
ord374
ord945
ord2184
ord5799
ord2185
ord11982
ord337
ord11997
ord8043
ord13047
ord8550
ord343
ord1945
ord3675
ord8497
ord5830
ord11838
ord879
ord1280
ord880
ord1282
ord457
ord1006
ord2848
ord2773
ord2062
ord4358
ord12206
ord12176
ord12203
ord2307
ord7707
ord6131
ord5458
ord3397
ord11090
ord10724
ord4412
ord11162
ord13370
ord11070
ord2283
ord10780
ord2308
ord3648
ord3710
ord3737
ord3776
ord3805
ord3779
ord3406
ord7507
ord11401
ord7348
ord8133
ord12817
ord2947
ord5189
ord8599
ord12821
ord3428
ord3495
ord7967
ord7529
ord6080
ord11998
ord845
ord1956
ord1957
ord12783
ord4758
ord12785
ord12321
ord4759
ord12786
ord12322
ord7006
ord6172
ord3413
ord2220
ord3996
ord6190
ord6179
ord7528
ord1313
ord6615
ord1244
ord6870
ord7903
ord3754
ord5900
ord3482
ord2188
ord13181
ord1861
ord2135
ord2155
ord11682
ord287
ord4511
ord8509
ord13214
ord13220
ord6633
ord3763
ord2844
ord8273
ord1266
ord5855
ord7929
ord3846
ord12186
ord12871
ord4356
ord341
ord919
ord6711
ord381
ord6344
ord11123
ord8179
ord10412
ord3627
ord2981
ord2980
ord2756
ord5556
ord12606
ord2417
ord8277
ord11164
ord8372
ord8347
ord10058
ord12951
ord7618
ord4805
ord9525
ord6713
ord3261
ord950
ord5801
ord5862
ord3446
ord296
ord902
ord4290
ord1987
ord948
ord917
ord897
ord5802
ord8346
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord5468
ord4623
ord4794
ord4645
ord5143
ord4901
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1440
ord7624
ord7548
ord11784
ord13854
ord4744
ord2164
ord11476
ord11477
ord13381
ord7108
ord13387
ord8530
ord3684
ord3625
ord11864
ord7126
ord1739
ord14162
ord10976
ord13267
ord11469
ord7179
ord13570
ord13567
ord13572
ord13569
ord13571
ord13568
ord3416
ord5261
ord11228
ord11236
ord4086
ord7391
ord9498
ord11240
ord11209
ord11845
ord5118
ord9328
ord6140
ord1476
ord1479
ord4360
ord12753
ord849
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11210
ord8112
ord13380
ord10937
ord3402
ord11081
ord8264
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2418
ord7385
ord2884
ord2887
ord12610
ord5558
ord2746
ord3746
ord385
ord6346
ord1312
ord1300
ord2089
ord1298
ord7176
ord1292
ord890
ord6869
ord266
ord286
ord265
ord280
ord1310
ord2064
ord11163
ord11999
ord12413
ord3489
msvcr100
_onexit
wcscat_s
memcpy_s
swprintf_s
_wtoi
__CxxFrameHandler3
memset
memcpy
_CxxThrowException
strncpy_s
strcpy_s
_itoa_s
_wfopen_s
fclose
wcsncpy_s
sprintf_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
wcscpy_s
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
kernel32
GetLocaleInfoW
GetSystemDefaultLCID
GetVersionExW
lstrlenW
MultiByteToWideChar
ActivateActCtx
GetProcAddress
GetModuleHandleW
LoadLibraryW
DeactivateActCtx
SetLastError
Sleep
CreateMutexW
ReleaseMutex
FormatMessageW
GetLastError
WideCharToMultiByte
GlobalLock
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalUnlock
ResumeThread
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
ReadFile
GetFileSize
WriteFile
CreateFileW
CloseHandle
CreateProcessW
DeleteFileW
GetTempFileNameW
GetTempPathW
user32
OpenClipboard
SendMessageW
PostMessageW
GetWindowRect
MessageBoxW
FindWindowW
SetForegroundWindow
RegisterWindowMessageW
LoadIconW
GetSystemMenu
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetDC
ReleaseDC
SetCursor
LoadCursorW
WaitForInputIdle
PostThreadMessageW
GetKeyState
ClientToScreen
LoadMenuW
GetParent
RegisterClipboardFormatW
SetFocus
GetFocus
CloseClipboard
SetClipboardData
EmptyClipboard
EnableWindow
PtInRect
CopyRect
EnumDisplayMonitors
GetMonitorInfoW
InvalidateRect
UpdateWindow
LoadBitmapW
SetRect
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
IsZoomed
FillRect
SetActiveWindow
gdi32
CreateFontIndirectW
CreateCompatibleBitmap
SetStretchBltMode
CreatePen
GetTextExtentPoint32W
PatBlt
SetBrushOrgEx
StretchBlt
DeleteDC
SetBitmapBits
CreateBitmap
GetBitmapBits
DeleteObject
GetObjectW
CreateSolidBrush
EnumFontsW
GetDeviceCaps
BitBlt
SelectObject
CreateCompatibleDC
advapi32
CryptGetUserKey
CryptGenKey
CryptDestroyKey
CryptReleaseContext
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDeriveKey
CryptEncrypt
CryptDecrypt
CryptAcquireContextW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteW
FindExecutableW
comctl32
InitCommonControlsEx
_TrackMouseEvent
winhttp
WinHttpCrackUrl
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpCheckPlatform
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpOpenRequest
WinHttpSetStatusCallback
WinHttpGetProxyForUrl
WinHttpSetOption
WinHttpReceiveResponse
WinHttpSendRequest
Sections
.text Size: 923KB - Virtual size: 923KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 604KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ