Overview
overview
10Static
static
7Bat_To_Exe...er.exe
windows7-x64
7Bat_To_Exe...er.exe
windows10-2004-x64
7help.chm
windows7-x64
1help.chm
windows10-2004-x64
1HorrorTroj...on.vbs
windows7-x64
6HorrorTroj...on.vbs
windows10-2004-x64
7Vbs To Exe...xe.exe
windows7-x64
7Vbs To Exe...xe.exe
windows10-2004-x64
7Vbs To Exe...4).exe
windows7-x64
7Vbs To Exe...4).exe
windows10-2004-x64
7bobcreep/bobcreep.exe
windows7-x64
1bobcreep/bobcreep.exe
windows10-2004-x64
1gdifuncs/g...rm.vbs
windows7-x64
1gdifuncs/g...rm.vbs
windows10-2004-x64
1gdifuncs/g...cs.exe
windows7-x64
10gdifuncs/g...cs.exe
windows10-2004-x64
10gdifuncs/g...ui.vbs
windows7-x64
1gdifuncs/g...ui.vbs
windows10-2004-x64
1gdifuncs/g...ge.vbs
windows7-x64
1gdifuncs/g...ge.vbs
windows10-2004-x64
1gdifuncs/g...64.vbs
windows7-x64
1gdifuncs/g...64.vbs
windows10-2004-x64
1jeffpopup/...up.exe
windows7-x64
1jeffpopup/...up.exe
windows10-2004-x64
1mbr.exe
windows7-x64
6mbr.exe
windows10-2004-x64
6tools.cmd
windows7-x64
5tools.cmd
windows10-2004-x64
5HorrorTroj...on.exe
windows7-x64
10HorrorTroj...on.exe
windows10-2004-x64
10bin/HorrorTrojan.exe
windows7-x64
7bin/HorrorTrojan.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
Bat_To_Exe_Converter.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Bat_To_Exe_Converter.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
help.chm
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
HorrorTrojan Ultimate Edition.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
HorrorTrojan Ultimate Edition.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Vbs To Exe/Vbs_To_Exe.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Vbs To Exe/Vbs_To_Exe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Vbs To Exe/Vbs_To_Exe_(x64).exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
Vbs To Exe/Vbs_To_Exe_(x64).exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
bobcreep/bobcreep.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
bobcreep/bobcreep.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
gdifuncs/gdifuncs/MainForm.vbs
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
gdifuncs/gdifuncs/MainForm.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
gdifuncs/gdifuncs/bin/Release/gdifuncs.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
gdifuncs/gdifuncs/bin/Release/gdifuncs.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
gdifuncs/gdifuncs/majorsgui.vbs
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
gdifuncs/gdifuncs/majorsgui.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
gdifuncs/gdifuncs/pinksavage.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
gdifuncs/gdifuncs/pinksavage.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
gdifuncs/gdifuncs/protection64.vbs
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
gdifuncs/gdifuncs/protection64.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
jeffpopup/jeffpopup.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
jeffpopup/jeffpopup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
mbr.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
mbr.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
tools.cmd
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
tools.cmd
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
HorrorTrojan-main/HorrorTrojan Ultimate Edition.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
HorrorTrojan-main/HorrorTrojan Ultimate Edition.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
bin/HorrorTrojan.exe
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
bin/HorrorTrojan.exe
Resource
win10v2004-20240508-en
General
-
Target
HorrorTrojan-main.zip
-
Size
46.3MB
-
MD5
f40cfd8ad6e12a92990085f58c59fc04
-
SHA1
83e5a09614bc65baab01ac5db204b47db30ba7f3
-
SHA256
716f5bc38980dbdad25ff050050e0c6e1491c57b841e959c068e9f8907e79d89
-
SHA512
b5bfcb4b399b076bd57c16ab7caf56e6e7c9663d4613b755ae6935a38b51641eeb981c873e898c10b46809099ced455ae322418274fffdeb6d8c56d7df5eb874
-
SSDEEP
786432:sPawwFaXXahP3X5eGaRXN2yQhFr4HPSgaxJghyY0yy1nLt8Qx53eulyA+:sPawwWahP3peGaL25SeJayY0DZL3Z1+
Malware Config
Signatures
-
resource yara_rule static1/unpack007/src/flasher.exe aspack_v212_v242 static1/unpack007/src/screenscrew.exe aspack_v212_v242 -
resource yara_rule static1/unpack002/Bat_To_Exe_Converter.exe upx static1/unpack004/Vbs To Exe/Vbs_To_Exe.exe upx static1/unpack004/Vbs To Exe/Vbs_To_Exe_(x64).exe upx static1/unpack007/bin/HorrorTrojan.exe upx -
Unsigned PE 14 IoCs
Checks for missing Authenticode signature.
resource unpack002/Bat_To_Exe_Converter.exe unpack004/Vbs To Exe/Vbs_To_Exe.exe unpack004/Vbs To Exe/Vbs_To_Exe_(x64).exe unpack004/bobcreep/bobcreep.exe unpack004/gdifuncs/gdifuncs/bin/Release/gdifuncs.exe unpack004/jeffpopup/jeffpopup.exe unpack004/mbr.exe unpack001/HorrorTrojan-main/HorrorTrojan Ultimate Edition.exe unpack007/bin/HorrorTrojan.exe unpack007/bin/unpacked/HorrorTrojan.exe unpack007/src/CLWCP.exe unpack007/src/flasher.exe unpack007/src/melter.exe unpack007/src/screenscrew.exe
Files
-
HorrorTrojan-main.zip.zip
-
HorrorTrojan-main/Bat To Exe Converter.rar.rar
-
Bat_To_Exe_Converter.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 548KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 396KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
help.chm.chm
-
settings.ini
-
HorrorTrojan-main/HorrorTrojan Ultimate Edition Sources.zip.zip
-
Aha-Soft-Desktop-Halloween-Ghost.ico
-
HorrorTrojan Ultimate Edition.vbs
-
Vbs To Exe/Vbs_To_Exe.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Vbs To Exe/Vbs_To_Exe_(x64).exe.exe windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Vbs To Exe/license.txt
-
bg.bmp
-
bobcreep/Form1.frm
-
bobcreep/Form1.frx
-
bobcreep/Project1.vbp
-
bobcreep/Project1.vbw
-
bobcreep/bob.jpg.jpg
-
bobcreep/bobcreep.exe.exe windows:4 windows x86 arch:x86
5c4d602843f54570889588b32f7af650
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
_adj_fdiv_m64
_adj_fprem1
_adj_fdiv_m32
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
_CIatan
_allmul
_CItan
_CIexp
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
gdifuncs/gdifuncs.sln
-
gdifuncs/gdifuncs/MainForm.Designer.cs
-
gdifuncs/gdifuncs/MainForm.cs
-
gdifuncs/gdifuncs/MainForm.resx.vbs
-
gdifuncs/gdifuncs/Program.cs
-
gdifuncs/gdifuncs/Properties/AssemblyInfo.cs
-
gdifuncs/gdifuncs/app.config
-
gdifuncs/gdifuncs/bin/Release/gdifuncs.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
gdifuncs/gdifuncs/bin/Release/gdifuncs.exe.config
-
gdifuncs/gdifuncs/gdifuncs.csproj
-
gdifuncs/gdifuncs/majorsgui.Designer.cs
-
gdifuncs/gdifuncs/majorsgui.cs
-
gdifuncs/gdifuncs/majorsgui.resx.vbs
-
gdifuncs/gdifuncs/pinksavage.Designer.cs
-
gdifuncs/gdifuncs/pinksavage.cs
-
gdifuncs/gdifuncs/pinksavage.resx.vbs
-
gdifuncs/gdifuncs/protection64.Designer.cs
-
gdifuncs/gdifuncs/protection64.cs
-
gdifuncs/gdifuncs/protection64.resx.vbs
-
gdifuncs/note.txt
-
jeffpopup/Form1.frm
-
jeffpopup/Form1.frx
-
jeffpopup/Project1.vbp
-
jeffpopup/Project1.vbw
-
jeffpopup/jeffpopup.exe.exe windows:4 windows x86 arch:x86
5c4d602843f54570889588b32f7af650
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
_adj_fdiv_m64
_adj_fprem1
_adj_fdiv_m32
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
_adj_fdivr_m32
_adj_fdiv_r
ord100
_CIatan
_allmul
_CItan
_CIexp
Sections
.text Size: 768KB - Virtual size: 767KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
jeffpopup/scream.bmp
-
mainbgtheme.wav
-
mbr.cpp
-
mbr.exe.exe windows:4 windows x86 arch:x86
6949a645e7e360763e98a0f3e98b069b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FindAtomA
FreeConsole
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
ReleaseMutex
ReleaseSemaphore
ResetEvent
ResumeThread
SetCriticalSectionSpinCount
SetEvent
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
msvcrt
__dllonexit
__doserrno
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__pioinfo
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthreadex
_cexit
_endthreadex
_errno
_fdopen
_filelengthi64
_fileno
_fileno
_fmode
_fstat64
_ftime
_initterm
_iob
_lock
_lseeki64
_onexit
_read
_setjmp3
_strnicmp
_unlock
_write
_write
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getenv
getwc
isspace
iswctype
localeconv
longjmp
malloc
memchr
memcmp
memmove
printf
putc
putwc
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strerror
strftime
strncmp
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
ntdll
memcpy
memset
strlen
Sections
.text Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
tools.cmd
-
HorrorTrojan-main/HorrorTrojan Ultimate Edition.exe.exe windows:4 windows x86 arch:x86
a8f9817be32c1d5589680a5066ebff5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsicmp
wcslen
wcscpy
wcscmp
memcpy
tolower
wcscat
malloc
free
kernel32
GetModuleHandleW
HeapCreate
GetStdHandle
HeapDestroy
ExitProcess
WriteFile
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
GetExitCodeProcess
EnumResourceNamesW
GetTempFileNameW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetNativeSystemInfo
GetShortPathNameW
GetWindowsDirectoryW
GetSystemDirectoryW
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
Sleep
GetProcAddress
GetVersionExW
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
DeleteFileW
GetTempPathW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
InterlockedCompareExchange
InterlockedExchange
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
DuplicateHandle
RegisterWaitForSingleObject
user32
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
DestroyWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
EnableWindow
GetSystemMetrics
CreateWindowExW
SetWindowLongW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
gdi32
GetStockObject
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
winmm
timeBeginPeriod
ole32
CoInitialize
CoTaskMemFree
shlwapi
PathQuoteSpacesW
PathAddBackslashW
PathRenameExtensionW
PathRemoveArgsW
PathRemoveBackslashW
Sections
.code Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.9MB - Virtual size: 14.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
HorrorTrojan-main/HorrorTrojan.zip.zip
-
bin/HorrorTrojan.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 6.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
bin/unpacked/HorrorTrojan.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.2MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
src/CLWCP.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 433KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 52B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
src/bg.bmp
-
src/flasher.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 198KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
src/horror.bat
-
src/melter.cpp
-
src/melter.exe.exe windows:4 windows x86 arch:x86
13ec8566b612ad048337cc1d273db7c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BitBlt
kernel32
GetTickCount
GetModuleHandleA
GetStartupInfoA
user32
PostQuitMessage
SetTimer
LoadCursorA
RegisterClassA
CreateWindowExA
MessageBoxA
PeekMessageA
TranslateMessage
DispatchMessageA
GetAsyncKeyState
DestroyWindow
DefWindowProcA
GetDC
ReleaseDC
ValidateRect
KillTimer
ShowWindow
GetSystemMetrics
msvcrt
srand
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
rand
Sections
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
src/scream.bmp
-
src/screenscrew.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 84KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
HorrorTrojan-main/README.md