Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fptw64.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fptw64.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
idrvdll32e.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
idrvdll32e.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
pmxdll32e.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
pmxdll32e.dll
Resource
win10v2004-20240611-en
Target
fptbios.zip
Size
253KB
MD5
2bc02f3d5ab4f963f28e58bbe2f092af
SHA1
2c8dc8df1626745f318f811711b47dd8a9822c86
SHA256
055bc066bd55839ecdb77a1cb6f4d3cf25bd9655631ed8c5b3c9199619d3fb74
SHA512
5a4705119ba6494680748694b0c88ec78132901255a9c23bd175e0c5053de2cb6a7d83e4ce3b087287fb1edb13d8baea17e0626976bf3e882a28829849b8b76f
SSDEEP
6144:nfoueCNeNw32QlWU3FRLwVN3t8+cD0ZfKgD/lVItZfxoBzEh8:/5cw3lWUVcN3e16lotPKzG8
Checks for missing Authenticode signature.
resource |
---|
unpack001/idrvdll32e.DLL |
unpack001/pmxdll32e.DLL |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PMxGetLastError
PMxPCI
PMxInit
PMxDestroy
PMxIO
PMxMapPhys
PMxUnmapPhys
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetStdHandle
GetStringTypeW
GetCurrentProcess
GetLastError
CloseHandle
GetVersion
SetErrorMode
SetConsoleTextAttribute
GetStdHandle
GetConsoleScreenBufferInfo
GetDiskFreeSpaceExA
CreateFileA
WriteConsoleW
GetNativeSystemInfo
LoadResource
WriteFile
SizeofResource
GetSystemDirectoryA
GetProcAddress
LockResource
GetModuleHandleA
WaitForSingleObject
FormatMessageA
Sleep
CreateEventA
ReadFile
GetOverlappedResult
DeviceIoControl
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
RaiseException
FindResourceA
GetCommandLineA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
HeapReAlloc
RtlPcToFileHeader
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
WideCharToMultiByte
HeapSetInformation
HeapCreate
GetModuleHandleW
ExitProcess
GetModuleFileNameW
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
LCMapStringW
MultiByteToWideChar
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetConsoleCP
SetFilePointer
FlushFileBuffers
CreateFileW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LoadLibraryW
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
InitiateSystemShutdownA
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
CloseHandle
GetLastError
CreateFileA
GetVersionExA
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetProcAddress
GetModuleHandleA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
Sleep
HeapSetInformation
HeapCreate
HeapDestroy
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
LoadLibraryA
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
VirtualProtect
GetSystemInfo
VirtualQuery
CloseServiceHandle
ControlService
OpenSCManagerA
OpenServiceA
CreateServiceA
StartServiceA
IDRVDestroy
IDRVGetLastError
IDRVInit
IDRVInstallDriver
IDRVRemoveDriver
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
WaitForMultipleObjects
SetEvent
GetLastError
Sleep
SetThreadAffinityMask
GetCurrentThread
_local_unwind
CreateEventA
CreateSemaphoreA
CloseHandle
GetCurrentProcess
GetWindowsDirectoryA
GetVersionExA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
ReleaseSemaphore
__C_specific_handler
GetProcessAffinityMask
DeviceIoControl
ExitThread
GetCurrentThreadId
CreateThread
HeapAlloc
HeapFree
GetCommandLineA
GetProcessHeap
WriteFile
FlushFileBuffers
DeleteCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ExitProcess
GetProcAddress
GetModuleHandleA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
HeapSetInformation
HeapCreate
HeapDestroy
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
RaiseException
SetStdHandle
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
VirtualProtect
GetSystemInfo
VirtualQuery
IDRVGetLastError
IDRVInstallDriver
IDRVRemoveDriver
IDRVInit
timeGetTime
timeEndPeriod
timeBeginPeriod
PMxAllocatePhys
PMxCPUID
PMxDestroy
PMxFreePhys
PMxGetLastError
PMxINV
PMxIO
PMxInit
PMxLinLock
PMxLinUnlock
PMxMP3
PMxMapPhys
PMxPCI
PMxRDCR
PMxRDCR64
PMxRDDR
PMxRDDR64
PMxRDIDT
PMxRDMSR
PMxRDPAGE
PMxRDPAGE64
PMxRDSEL
PMxUnmapPhys
PMxWRCR
PMxWRCR64
PMxWRDR
PMxWRDR64
PMxWRIDT
PMxWRMSR
PMxWRMSRDirect
PMxWRPAGE
PMxWRPAGE64
PMxWRSEL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ