hpproduct.pdb
Overview
overview
10Static
static
5amadka.exe
windows7-x64
10amadka.exe
windows10-2004-x64
10amadka.exe
windows11-21h2-x64
10hpproduct.exe
windows7-x64
8hpproduct.exe
windows10-2004-x64
10hpproduct.exe
windows11-21h2-x64
10random.exe
windows7-x64
10random.exe
windows10-2004-x64
10random.exe
windows11-21h2-x64
10random/random.exe
windows7-x64
3random/random.exe
windows10-2004-x64
7random/random.exe
windows11-21h2-x64
3streamer.exe
windows7-x64
1streamer.exe
windows10-2004-x64
10streamer.exe
windows11-21h2-x64
5tuman.exe
windows7-x64
10tuman.exe
windows10-2004-x64
10tuman.exe
windows11-21h2-x64
10Static task
static1
Behavioral task
behavioral1
Sample
amadka.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
amadka.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
amadka.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
hpproduct.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
hpproduct.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
hpproduct.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
random.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
random.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
random.exe
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
random/random.exe
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
random/random.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
random/random.exe
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
streamer.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
streamer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
streamer.exe
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
tuman.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
tuman.exe
Resource
win10v2004-20240709-en
General
-
Target
inv.zip
-
Size
12.6MB
-
MD5
7a8ce0d01d8e873dca82ca9c7377c377
-
SHA1
fffd64b43b3810a7390ac9ceb640d3b3b9ee80a1
-
SHA256
461cded4b93a8deb76810154e7d6eeb8330fb6e0d7b8e462860b1c4f7f42a138
-
SHA512
374c2a435858f283373f977bc8c79f5dedd898d6988045b9e7e80a3f517378c325b921951b65a3c0eec48a5aed3a96c25947d8bfe80966ac31870e5ba7e915dc
-
SSDEEP
393216:dB66OcY0MyA4HFsyg0EB+4ZI+6jUoGoxUrUIg0EB+40:dY6OAM/ytYtR9KGUItf
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack001/random/random.exe autoit_exe -
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack001/amadka.exe unpack001/hpproduct.exe unpack001/random.exe unpack001/random/random.exe unpack001/streamer.exe unpack001/tuman.exe
Files
-
inv.zip.zip
-
amadka.exe.exe windows:6 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zbjpduxe Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vekcqctx Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
hpproduct.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
random.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
���ê�d eG��� Z���L�qRO��1�����nZ��:;�\4+C��"m�K��up��V����MO��w�؝�����RP6�e+u�x#8l`+0^K����=�i��+_}�!��`���.j��p:�2cN�/��Ep9}k�sw���J��~3���^��^�Ɏ��ݲ �1澝3�ͽzh����c����=�C��<���]��m�`N/�CH#Fk���� ip_���)�;m�����_9fy�T�\7�����\R� ���@�M�Xlzɽ�'������f9�~�RH��v6�*z����<C�U�i0�� eN����8����|40��1���Sy�)�)��y���������z3@�-�*�Co:z�6��hJ6����QQ!-]%Z�7�rA_���-P��g�I�V���H�S�ǚ�\��A�A�{�(�,���/�*9�ž{���ah�?���i���r/���d�Q���$�����ˀ�`��A���i��61�:W5�7t�Y��xe������L�Xu���)!�3�����o�������ȭ����Ͽ?���9���x��R� ������6�N�m� �q�㋡ �p�������L��G�y �f�g:&"kQH�{`]�[^��-�`�� �����2:d�8�.o��Y�5Yr3Ό�#]���5�{�0-)�ibt{�����^*i0�MzoP���K,:��/$]��쒞Ae���w�}Z�Uh���߂�*'�`-�ʰs"��j�V �X+%)���b>�����YC!�WC�<�wQ�� <��+ Z�Od��!�PE)�;)���mIT�n�^٢��z@�4���-��W�j�iP��%�rid_ٴwݖ����]� ����s������:��O#� �=<�3(Ƕ�r��C*�Ν:���y�C��=?R�A�ǣf�A}<� �ȇ�=�����`��B�� ��0��QId�Ģ�gB�1�Bm�`璅{��r�Z��4ca��#$r��`j�B!`�*���Ws{��`����@ud�P�I��%�@�+�s���AУ�ZʻlV+�� F���Y7*s2����N�r���!�s��z�ȑ�Yt��rRtĜ�ߘ|��i:ܔ�͖��*?:۱(�x.O'-a�����H%h�=ƙ����E����y-|��L^�Ǣ�6lk���NOP\.�ޟ���ġ��Qh����bǛ�b�� =-�R��#n冖S��f\$��dz[cM�6�����ո��(�2I'Di��ٿ��������)4r�.�]����t��L6J���/P��kuq~$�: a�C"�&���42.��UvP��u��Q;n;�Ŗ$/�<���j��q��̒�wXxv�jI"�mzR74]�Xw� �o9F����` x#�9�J-~�x�kf��,y�X*�:Q��T�)Љ�������8������r�֞�0����Y)>G�&�<ؑ_��83��o�)���F�@ԯa��Ϊ��M ����=�+�ܿ�T�H��kEπǍk��&ͪ3����<�Z*�e��y D��퉥�|�|������ ���W��HsBl��-�w& ���עM�E��������1���T�|G�����6qs�qSS1��!��=�͢Y��Fb8��\� 6 D�&e-����{F���۹��I� uO��{��"�Q���##>�Hw0��SYy��a�U�#"�}� ��<ŕd�U�M�Uz�"�U�0����`;n�BA��M����PR$s�J)�3TuH��j���2��iXe�C ����)��X�X�c)��>u��q��������9��^g�WFsL��AjX����Y �I�dy!����uJ�Ʉ������㍴���`b1���km�������Ѧ��U��V<X�"i�,\�B��B��-/n�t�S L���%��`����@�i�(ˆ���0��;43��e�Gdz��Й��[C��R�bzLW��Pk|%]��/X�����>s<�����X 5��Wz�E�y��~��=(��F��Q �@k�ܔ^��.���b�,��'eUOL���CӡZ��hvqخ���$L�r�� �(� ?F[������Q��vL�x��!=Sd?1����3hS��+�ʕ��4��m.q����xk~]����,qA���#p��f^���nIoT�O����&�7ȡ[��0:���S��oK;M%z��� ��Ȕ����aɥ/}��@#CÑօL��,����PG�f�Cr �¯Е�ѹ6���A�n�:��Nu���%�T�<*]�ڝ8C@�k���2�7=H���Y��B�u�G��t� �Mg�#�uo�'A��!1�B:�>��'Ɯ!�hG����Ow*�W�{[�7.��+��Y�"M�8���PK�.���3���2n�/]�G��}(�Veq��*)8bi����[A(��!� �G����?c�� 7m�i�g�u���[�����z+b ��G ���H�QA�M+��NW�!�vA}CY��6�6��lÙJ��E/Y�[�n�4m�jBӯ|O�p4��~��i)���o@����hF�a��/-�mI�'��1����Ӑ�K$OgfW E�!����#�P�d����W#e�ml�h�q���T"���:�� :�$��y���s^��|���P/��l��˿�&鱦+`�hD<�YȨxs���}r�C�7S<\漆��f��91o��0%� C@6s���2�U�Ҹ���^xf�p�=[���ž�ݶU�� �cXVPg K�����5��~k{���M�[�:b�s&�B ����|�`�5��A �Ԍ{����Jg&4$����*G[�Y�R22x�5;��)�Q��]���d��oM��%Cx��om$W�T�u����X-��4"y�f�-y�h����L��HPT8�GK��x��s�`f7�).��8_̫���:jP۲{�m���I��8�fbfo.�?]�_��W4S?����MIm�ۏI��-uT#83 vآ#�R�h�~М����y]D�w�?���8yvfI�I�f3/D��[�;�P�#Ǐ��`���듮Z��7� ��qTv����4!^Ӑ����~I�{�� �v�r���Q����ߎ ɖ��x� #�y��ƹ�>KJ�C��r�%�n������ĥU�UNZ���n �{��z��=���Lsa�̲��J`�Y-���I��/.Dm���d��+���/A �M�����3Ӌ̌�1Oa�u^@h� �-_<$b�y�1�M|�K������m*n �d�0������)d@w"�K��̕��#��Gf�`o��I�A-玐XDg� �y-����E��Lm��a����1}(S%�`��0B��AԞ�f��v-���sʯ���&,k��ԱHj�����������%��>̋���wkbcY���CM��'��u�x��:�� ������5,��0v�h�X(� �д�F����ϊ����\u��Ծ�MF����by�/�CSP:��p�"dwǢo�r|W�fF~ļE�Ќ9������2��[x����嬣��F����;���ae3�D���B>q��W��$��u��u������(8�����Tml�G����.X��'�:����S\��I� ����e�t���+�Nn��-�i�� �r��v[�T�h٫�edf��6r���b��:�2�� ����"6�FGA۟��I�[ݷ����铞� 2=����ZL�Q��9,~�
Sections
Size: 41KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 17KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
random/random.exe.exe windows:5 windows x86 arch:x86
c4540f421523fe2dc591e50be5ad7d0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
gethostbyname
recv
send
socket
inet_ntoa
setsockopt
ntohs
WSACleanup
WSAStartup
sendto
htons
__WSAFDIsSet
select
accept
listen
bind
inet_addr
ioctlsocket
recvfrom
WSAGetLastError
closesocket
gethostname
connect
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
InitCommonControlsEx
ImageList_Create
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetUseConnectionW
WNetAddConnection2W
wininet
HttpOpenRequestW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetQueryOptionW
InternetConnectW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetReadFile
InternetQueryDataAvailable
psapi
GetProcessMemoryInfo
iphlpapi
IcmpSendEcho
IcmpCloseHandle
IcmpCreateFile
userenv
DestroyEnvironmentBlock
LoadUserProfileW
CreateEnvironmentBlock
UnloadUserProfile
uxtheme
IsThemeActive
kernel32
DuplicateHandle
CreateThread
WaitForSingleObject
HeapAlloc
GetProcessHeap
HeapFree
Sleep
GetCurrentThreadId
MultiByteToWideChar
MulDiv
GetVersionExW
IsWow64Process
GetSystemInfo
FreeLibrary
LoadLibraryA
GetProcAddress
SetErrorMode
GetModuleFileNameW
WideCharToMultiByte
lstrcpyW
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
SetEndOfFile
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
GetLongPathNameW
GetShortPathNameW
DeleteFileW
IsDebuggerPresent
CopyFileExW
MoveFileW
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
QueryPerformanceFrequency
LoadResource
LockResource
SizeofResource
OutputDebugStringW
GetTempPathW
GetTempFileNameW
DeviceIoControl
LoadLibraryW
GetLocalTime
CompareStringW
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
LoadLibraryExW
FindResourceExW
CopyFileW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
SetFileAttributesW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
HeapReAlloc
HeapSize
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
GetProcessId
SetPriorityClass
VirtualAlloc
GetCurrentDirectoryW
lstrcmpiW
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
GetFullPathNameW
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
ExitProcess
GetModuleHandleExW
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetACP
GetDateFormatW
GetTimeFormatW
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetCurrentDirectoryW
FindNextFileW
WriteConsoleW
user32
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
CallWindowProcW
ReleaseCapture
SetCapture
PeekMessageW
GetInputState
UnregisterHotKey
CharLowerBuffW
MonitorFromPoint
MonitorFromRect
LoadImageW
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
ClientToScreen
GetCursorPos
DeleteMenu
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
LockWindowUpdate
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
RegisterHotKey
GetCursorInfo
SetWindowPos
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
TrackPopupMenuEx
GetMessageW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
DispatchMessageW
keybd_event
TranslateMessage
ScreenToClient
gdi32
EndPath
DeleteObject
GetTextExtentPoint32W
ExtCreatePen
StrokeAndFillPath
GetDeviceCaps
SetPixel
CloseFigure
LineTo
AngleArc
MoveToEx
Ellipse
CreateCompatibleBitmap
CreateCompatibleDC
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
SelectObject
StretchBlt
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
CreateDCW
GetPixel
DeleteDC
GetDIBits
StrokePath
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
GetAce
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
RegCreateKeyExW
GetSecurityDescriptorDacl
GetAclInformation
GetUserNameW
AddAce
SetSecurityDescriptorDacl
InitiateSystemShutdownExW
shell32
DragFinish
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHEmptyRecycleBinW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateShellItem
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
oleaut32
CreateStdDispatch
CreateDispTypeInfo
UnRegisterTypeLi
UnRegisterTypeLibForUser
RegisterTypeLibForUser
RegisterTypeLi
LoadTypeLibEx
VariantCopyInd
SysReAllocString
SysFreeString
VariantChangeType
SafeArrayDestroyData
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SafeArrayCreateVector
SysStringLen
QueryPathOfRegTypeLi
SysAllocString
VariantInit
VariantClear
DispCallFunc
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
SafeArrayDestroyDescriptor
VariantCopy
OleLoadPicture
Sections
.text Size: 619KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 323KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
streamer.exe.exe windows:6 windows x64 arch:x64
5929190c8765f5bc37b052ab5c6c53e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateFileA
CreateIoCompletionPort
CreateMutexA
CreateSemaphoreA
CreateThread
CreateWaitableTimerExW
DeleteAtom
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FindAtomA
FormatMessageA
FreeEnvironmentStringsW
GetAtomNameA
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetErrorMode
GetHandleInformation
GetLastError
GetProcAddress
GetProcessAffinityMask
GetQueuedCompletionStatusEx
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PostQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
RaiseFailFastException
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetConsoleCtrlHandler
SetErrorMode
SetEvent
SetLastError
SetProcessAffinityMask
SetProcessPriorityBoost
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SuspendThread
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WerGetFlags
WerSetFlags
WideCharToMultiByte
WriteConsoleW
WriteFile
__C_specific_handler
msvcrt
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthread
_beginthreadex
_cexit
_commode
_endthreadex
_errno
_fmode
_initterm
_lock
_memccpy
_onexit
_setjmp
_strdup
_ultoa
_unlock
abort
calloc
exit
fprintf
fputc
free
fwrite
localeconv
longjmp
malloc
memcpy
memmove
memset
printf
realloc
signal
strerror
strlen
strncmp
vfprintf
wcslen
Exports
Exports
_cgo_dummy_export
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 365KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
tuman.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
���ê�d eG��� Z���L�qRO��1�����nZ��:;�\4+C��"m�K��up��V����MO��w�؝�����RP6�e+u�x#8l`+0^K����=�i��+_}�!��`���.j��p:�2cN�/��Ep9}k�sw���J��~3���^��^�Ɏ��ݲ �1澝3�ͽzh����c����=�C��<���]��m�`N/�CH#Fk���� ip_���)�;m�����_9fy�T�\7�����\R� ���@�M�Xlzɽ�'������f9�~�RH��v6�*z����<C�U�i0�� eN����8����|40��1���Sy�)�)��y���������z3@�-�*�Co:z�6��hJ6����QQ!-]%Z�7�rA_���-P��g�I�V���H�S�ǚ�\��A�A�{�(�,���/�*9�ž{���ah�?���i���r/���d�Q���$�����ˀ�`��A���i��61�:W5�7t�Y��xe������L�Xu���)!�3�����o�������ȭ����Ͽ?���9���x��R� ������6�N�m� �q�㋡ �p�������L��G�y �f�g:&"kQH�{`]�[^��-�`�� �����2:d�8�.o��Y�5Yr3Ό�#]���5�{�0-)�ibt{�����^*i0�MzoP���K,:��/$]��쒞Ae���w�}Z�Uh���߂�*'�`-�ʰs"��j�V �X+%)���b>�����YC!�WC�<�wQ�� <��+ Z�Od��!�PE)�;)���mIT�n�^٢��z@�4���-��W�j�iP��%�rid_ٴwݖ����]� ����s������:��O#� �=<�3(Ƕ�r��C*�Ν:���y�C��=?R�A�ǣf�A}<� �ȇ�=�����`��B�� ��0��QId�Ģ�gB�1�Bm�`璅{��r�Z��4ca��#$r��`j�B!`�*���Ws{��`����@ud�P�I��%�@�+�s���AУ�ZʻlV+�� F���Y7*s2����N�r���!�s��z�ȑ�Yt��rRtĜ�ߘ|��i:ܔ�͖��*?:۱(�x.O'-a�����H%h�=ƙ����E����y-|��L^�Ǣ�6lk���NOP\.�ޟ���ġ��Qh����bǛ�b�� =-�R��#n冖S��f\$��dz[cM�6�����ո��(�2I'Di��ٿ��������)4r�.�]����t��L6J���/P��kuq~$�: a�C"�&���42.��UvP��u��Q;n;�Ŗ$/�<���j��q��̒�wXxv�jI"�mzR74]�Xw� �o9F����` x#�9�J-~�x�kf��,y�X*�:Q��T�)Љ�������8������r�֞�0����Y)>G�&�<ؑ_��83��o�)���F�@ԯa��Ϊ��M ����=�+�ܿ�T�H��kEπǍk��&ͪ3����<�Z*�e��y D��퉥�|�|������ ���W��HsBl��-�w& ���עM�E��������1���T�|G�����6qs�qSS1��!��=�͢Y��Fb8��\� 6 D�&e-����{F���۹��I� uO��{��"�Q���##>�Hw0��SYy��a�U�#"�}� ��<ŕd�U�M�Uz�"�U�0����`;n�BA��M����PR$s�J)�3TuH��j���2��iXe�C ����)��X�X�c)��>u��q��������9��^g�WFsL��AjX����Y �I�dy!����uJ�Ʉ������㍴���`b1���km�������Ѧ��U��V<X�"i�,\�B��B��-/n�t�S L���%��`����@�i�(ˆ���0��;43��e�Gdz��Й��[C��R�bzLW��Pk|%]��/X�����>s<�����X 5��Wz�E�y��~��=(��F��Q �@k�ܔ^��.���b�,��'eUOL���CӡZ��hvqخ���$L�r�� �(� ?F[������Q��vL�x��!=Sd?1����3hS��+�ʕ��4��m.q����xk~]����,qA���#p��f^���nIoT�O����&�7ȡ[��0:���S��oK;M%z��� ��Ȕ����aɥ/}��@#CÑօL��,����PG�f�Cr �¯Е�ѹ6���A�n�:��Nu���%�T�<*]�ڝ8C@�k���2�7=H���Y��B�u�G��t� �Mg�#�uo�'A��!1�B:�>��'Ɯ!�hG����Ow*�W�{[�7.��+��Y�"M�8���PK�.���3���2n�/]�G��}(�Veq��*)8bi����[A(��!� �G����?c�� 7m�i�g�u���[�����z+b ��G ���H�QA�M+��NW�!�vA}CY��6�6��lÙJ��E/Y�[�n�4m�jBӯ|O�p4��~��i)���o@����hF�a��/-�mI�'��1����Ӑ�K$OgfW E�!����#�P�d����W#e�ml�h�q���T"���:�� :�$��y���s^��|���P/��l��˿�&鱦+`�hD<�YȨxs���}r�C�7S<\漆��f��91o��0%� C@6s���2�U�Ҹ���^xf�p�=[���ž�ݶU�� �cXVPg K�����5��~k{���M�[�:b�s&�B ����|�`�5��A �Ԍ{����Jg&4$����*G[�Y�R22x�5;��)�Q��]���d��oM��%Cx��om$W�T�u����X-��4"y�f�-y�h����L��HPT8�GK��x��s�`f7�).��8_̫���:jP۲{�m���I��8�fbfo.�?]�_��W4S?����MIm�ۏI��-uT#83 vآ#�R�h�~М����y]D�w�?���8yvfI�I�f3/D��[�;�P�#Ǐ��`���듮Z��7� ��qTv����4!^Ӑ����~I�{�� �v�r���Q����ߎ ɖ��x� #�y��ƹ�>KJ�C��r�%�n������ĥU�UNZ���n �{��z��=���Lsa�̲��J`�Y-���I��/.Dm���d��+���/A �M�����3Ӌ̌�1Oa�u^@h� �-_<$b�y�1�M|�K������m*n �d�0������)d@w"�K��̕��#��Gf�`o��I�A-玐XDg� �y-����E��Lm��a����1}(S%�`��0B��AԞ�f��v-���sʯ���&,k��ԱHj�����������%��>̋���wkbcY���CM��'��u�x��:�� ������5,��0v�h�X(� �д�F����ϊ����\u��Ծ�MF����by�/�CSP:��p�"dwǢo�r|W�fF~ļE�Ќ9������2��[x����嬣��F����;���ae3�D���B>q��W��$��u��u������(8�����Tml�G����.X��'�:����S\��I� ����e�t���+�Nn��-�i�� �r��v[�T�h٫�edf��6r���b��:�2�� ����"6�FGA۟��I�[ݷ����铞� 2=����ZL�Q��9,~�
Sections
Size: 41KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 17KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE