H:\Downloads\niggerlose\KeyAuth-ImGui-Example-main\x64\Release\example.pdb
Static task
static1
General
-
Target
hPsn342fsMldm1wepK8.exe
-
Size
863KB
-
MD5
1be59cb327fb7a2ad69a055d921b0499
-
SHA1
5e7097efa50fbb6edb26e7e5ef58cb794a00618a
-
SHA256
8c397b676503de9ab8f833da4aa698de2237bc69baa084ae5ca42614e7f52ac6
-
SHA512
8fa362f050e52f3e507a38741df388ce1cbc469da16b0d5f3f91d9c519da812f8073128b3f50779064bba327cf0140a8ffe688150d099ea58cfce3affd6a88fc
-
SSDEEP
24576:JWlHtvKIjN0E6iNKdiVxRofrrF+ZPiAwnGPP9Gf:J+HtvKIjN7rcoafvcq7nG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hPsn342fsMldm1wepK8.exe
Files
-
hPsn342fsMldm1wepK8.exe.exe windows:6 windows x64 arch:x64
97de89c594565cfd514de5f8db7114ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
PeekNamedPipe
ReadFile
GetFileType
GetStdHandle
GetEnvironmentVariableA
WaitForSingleObjectEx
MoveFileExA
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
SetEvent
GetTickCount
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VerifyVersionInfoA
GetSystemDirectoryA
GetFileSizeEx
LeaveCriticalSection
EnterCriticalSection
FormatMessageA
SetLastError
LocalFree
CloseHandle
GetProcessHeap
DeleteCriticalSection
HeapDestroy
HeapAlloc
CreateThread
HeapReAlloc
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
OutputDebugStringW
GetSystemTimeAsFileTime
CreateFileA
SleepEx
WaitForMultipleObjects
GetLastError
AllocConsole
Sleep
QueryPerformanceCounter
VerifyVersionInfoW
FreeLibrary
HeapSize
InitializeCriticalSectionEx
GetCurrentProcess
ResetEvent
VerSetConditionMask
GetProcAddress
QueryPerformanceFrequency
LoadLibraryA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
HeapFree
MultiByteToWideChar
GetCurrentThreadId
user32
PeekMessageA
PostQuitMessage
GetDesktopWindow
TranslateMessage
UpdateWindow
GetWindowLongW
MessageBoxA
AdjustWindowRectEx
GetKeyState
LoadCursorA
DestroyWindow
GetWindowRect
DispatchMessageA
FindWindowA
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
ReleaseDC
SetCursorPos
IsIconic
SetForegroundWindow
ReleaseCapture
RegisterClassExA
UnregisterClassA
GetClientRect
SetWindowLongW
SetCursor
GetDC
SetWindowPos
MonitorFromWindow
EnumDisplayMonitors
ScreenToClient
SetWindowTextW
WindowFromPoint
ShowWindow
GetCapture
SetWindowLongA
ClientToScreen
IsChild
GetMonitorInfoA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
SetFocus
BringWindowToTop
SetCapture
gdi32
GetDeviceCaps
advapi32
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
IsValidSid
OpenProcessToken
GetLengthSid
GetTokenInformation
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptGenRandom
shell32
ShellExecuteA
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??Bid@locale@std@@QEAA_KXZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?_Xlength_error@std@@YAXPEBD@Z
_Query_perf_frequency
?_Throw_Cpp_error@std@@YAXH@Z
?_Throw_C_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
_Thrd_sleep
_Query_perf_counter
_Thrd_detach
_Xtime_get_ticks
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Xbad_function_call@std@@YAXXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
d3d9
Direct3DCreate9
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord33
ord35
ord79
ord32
ord27
ord30
ord26
ord22
ord41
ord50
ord45
ord60
ord211
ord46
ord217
ord143
ord200
ord301
crypt32
CertGetCertificateChain
CertFreeCertificateChainEngine
CertFreeCertificateChain
PFXImportCertStore
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CryptQueryObject
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CertCreateCertificateChainEngine
ws2_32
ntohl
gethostname
sendto
recvfrom
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
htons
WSASetLastError
socket
setsockopt
ntohs
WSAIoctl
closesocket
recv
send
WSAGetLastError
bind
connect
getpeername
getsockname
getsockopt
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
strstr
strchr
__std_exception_destroy
__std_exception_copy
__C_specific_handler
memcpy
_CxxThrowException
__current_exception_context
__current_exception
memchr
memcmp
memmove
strrchr
memset
api-ms-win-crt-stdio-l1-1-0
fgetc
_lseeki64
__stdio_common_vsscanf
fread
fgets
fgetpos
__stdio_common_vsprintf
_set_fmode
ftell
feof
__acrt_iob_func
fputs
fputc
fflush
fopen
fclose
_read
_write
_close
_open
fseek
fwrite
_wfopen
_get_stream_buffer_pointers
_fseeki64
__p__commode
setvbuf
fsetpos
ungetc
api-ms-win-crt-string-l1-1-0
strcspn
strncmp
strncpy
strspn
strcmp
isupper
tolower
_strdup
strpbrk
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
malloc
free
calloc
_callnewh
realloc
_set_new_mode
api-ms-win-crt-convert-l1-1-0
atoi
strtoul
strtol
strtoull
strtoll
strtod
api-ms-win-crt-runtime-l1-1-0
__sys_nerr
strerror
_invalid_parameter_noinfo
_errno
_invalid_parameter_noinfo_noreturn
_register_thread_local_exe_atexit_callback
abort
_c_exit
terminate
_exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
system
_set_app_type
_beginthreadex
_getpid
_seh_filter_exe
_resetstkoflw
_cexit
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
exit
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
api-ms-win-crt-filesystem-l1-1-0
_fstat64
_access
_unlink
remove
_stat64
_lock_file
_unlock_file
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
localeconv
api-ms-win-crt-math-l1-1-0
cosf
fmodf
_dclass
acosf
sqrtf
__setusermatherr
sinf
ceilf
Sections
.text Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ