C:\Users\egor0\source\repos\ColorPicker\src\ColorPicker\obj\Release\net45\ColorPicker.pdb
Overview
overview
3Static
static
3UUU_v514.zip
windows7-x64
1UUU_v514.zip
windows10-2004-x64
1UUU_v514/C...er.dll
windows7-x64
1UUU_v514/C...er.dll
windows10-2004-x64
1UUU_v514/I...nt.exe
windows7-x64
1UUU_v514/I...nt.exe
windows10-2004-x64
1UUU_v514/I...ng.ini
windows7-x64
3UUU_v514/I...ng.ini
windows10-2004-x64
3UUU_v514/I...ng.ini
windows7-x64
3UUU_v514/I...ng.ini
windows10-2004-x64
3UUU_v514/M...rs.dll
windows7-x64
1UUU_v514/M...rs.dll
windows10-2004-x64
1UUU_v514/M...ls.dll
windows7-x64
1UUU_v514/M...ls.dll
windows10-2004-x64
1UUU_v514/M...pf.dll
windows7-x64
1UUU_v514/M...pf.dll
windows10-2004-x64
1UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/P...preset
windows7-x64
3UUU_v514/P...preset
windows10-2004-x64
3UUU_v514/Readme.txt
windows7-x64
1UUU_v514/Readme.txt
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
UUU_v514.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
UUU_v514.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
UUU_v514/ColorPicker.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
UUU_v514/ColorPicker.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
UUU_v514/IGCSClient.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
UUU_v514/IGCSClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
UUU_v514/IGCSClientSettings_JOY-Win64-Shipping.ini
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
UUU_v514/IGCSClientSettings_JOY-Win64-Shipping.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
UUU_v514/IGCSClientSettings_Playtime_Chapter3-Win64-Shipping.ini
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
UUU_v514/IGCSClientSettings_Playtime_Chapter3-Win64-Shipping.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
UUU_v514/Microsoft.Xaml.Behaviors.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
UUU_v514/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
UUU_v514/ModernWpf.Controls.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
UUU_v514/ModernWpf.Controls.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
UUU_v514/ModernWpf.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
UUU_v514/ModernWpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
UUU_v514/PostProcessPresets/Bloom max quality.preset
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
UUU_v514/PostProcessPresets/Bloom max quality.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
UUU_v514/PostProcessPresets/Essentials.preset
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
UUU_v514/PostProcessPresets/Essentials.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
UUU_v514/PostProcessPresets/Less pronounced Old skool AO.preset
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
UUU_v514/PostProcessPresets/Less pronounced Old skool AO.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
UUU_v514/PostProcessPresets/Lumen max quality.preset
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
UUU_v514/PostProcessPresets/Lumen max quality.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
UUU_v514/PostProcessPresets/Oldskool Ambient Occlusion.preset
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
UUU_v514/PostProcessPresets/Oldskool Ambient Occlusion.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
UUU_v514/PostProcessPresets/Oldskool screenspace reflections.preset
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
UUU_v514/PostProcessPresets/Oldskool screenspace reflections.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
UUU_v514/PostProcessPresets/Ray-traced everything.preset
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
UUU_v514/PostProcessPresets/Ray-traced everything.preset
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
UUU_v514/Readme.txt
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
UUU_v514/Readme.txt
Resource
win10v2004-20240802-en
General
-
Target
UUU_v514.zip
-
Size
1.4MB
-
MD5
21b63c4b0f893b15e9542f8e0d05e16f
-
SHA1
dcc59afe181a8d01d5025d59ca5e4f9cf8ca9121
-
SHA256
666be4b8aaa879026c77d9a0a835223f8d18280caf7643a4eed8dbdb8ec61034
-
SHA512
effb8e18c9688d8f6bf85c143682146648f3aa9d05f7e845af8959d99d935e2344e0fb3c6112e145e7f7813d3e28050fff4fb455190e414e4fb65bf21f65b843
-
SSDEEP
24576:qUZ4yOiNniF2K9XyPTBXxWaWm10eC466bio86s1U2KOMKCnw83fr73Epxq83EnLi:fZ5oxCPTBBWatCIIvMKrGfr70xX3ULi
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/UUU_v514/ColorPicker.dll unpack001/UUU_v514/ModernWpf.Controls.dll unpack001/UUU_v514/ModernWpf.dll unpack001/UUU_v514/ToastNotifications.dll
Files
-
UUU_v514.zip.zip
Password: infected
-
UUU_v514/ColorPicker.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/IGCSClient.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
48:fc:93:b4:60:55:94:8d:36:a7:c9:8a:89:d6:94:16Certificate
IssuerCN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before25/05/2021, 00:00Not After31/12/2028, 23:59SubjectCN=Sectigo Public Code Signing Root R46,O=Sectigo Limited,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:d7:08:a8:91:40:53:19:e2:a5:bb:d3:39:b9:ad:6eCertificate
IssuerCN=Sectigo Public Code Signing Root R46,O=Sectigo Limited,C=GBNot Before22/03/2021, 00:00Not After21/03/2036, 23:59SubjectCN=Sectigo Public Code Signing CA EV R36,O=Sectigo Limited,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
46:e8:5c:06:f2:4a:71:f1:7d:f6:6b:72:4f:3a:eb:20Certificate
IssuerCN=Sectigo Public Code Signing CA EV R36,O=Sectigo Limited,C=GBNot Before25/01/2024, 00:00Not After24/01/2025, 23:59SubjectSERIALNUMBER=27162659,CN=Solutions Design BV,O=Solutions Design BV,ST=Zuid-Holland,C=NL,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#13024e4cExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
30:b9:4b:ac:0a:39:c2:2f:3f:dc:8a:af:e9:b6:8f:3e:25:0b:88:76:4c:f9:b7:55:2d:80:6b:72:bc:2f:14:e4Signer
Actual PE Digest30:b9:4b:ac:0a:39:c2:2f:3f:dc:8a:af:e9:b6:8f:3e:25:0b:88:76:4c:f9:b7:55:2d:80:6b:72:bc:2f:14:e4Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\frans.SD\Documents\GitHub\PrivateIGCS\Cameras\UUU5\IGCSClient\obj\Release\IGCSClient.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/IGCSClientSettings_JOY-Win64-Shipping.ini
-
UUU_v514/IGCSClientSettings_Playtime_Chapter3-Win64-Shipping.ini
-
UUU_v514/Microsoft.Xaml.Behaviors.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:01:87:72:17:72:15:59:40:c7:09:00:00:00:00:01:87Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04/03/2020, 18:39Not After03/03/2021, 18:39SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
91:c1:1b:94:af:34:a1:fa:13:e4:42:4e:6f:e2:3d:04:ab:ac:ed:3f:e1:02:19:ad:b6:4a:5a:ac:b3:97:27:bbSigner
Actual PE Digest91:c1:1b:94:af:34:a1:fa:13:e4:42:4e:6f:e2:3d:04:ab:ac:ed:3f:e1:02:19:ad:b6:4a:5a:ac:b3:97:27:bbDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\A\1\97\s\src\Microsoft.Xaml.Behaviors\obj\Release\net45\Microsoft.Xaml.Behaviors.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/ModernWpf.Controls.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\me\source\repos\ModernWpf\ModernWpf.Controls\obj\Release\net45\ModernWpf.Controls.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 682KB - Virtual size: 682KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/ModernWpf.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\me\source\repos\ModernWpf\ModernWpf\obj\Release\net45\ModernWpf.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 891KB - Virtual size: 890KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 820B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/PostProcessPresets/Bloom max quality.preset
-
UUU_v514/PostProcessPresets/Essentials.preset
-
UUU_v514/PostProcessPresets/Less pronounced Old skool AO.preset
-
UUU_v514/PostProcessPresets/Lumen max quality.preset
-
UUU_v514/PostProcessPresets/Oldskool Ambient Occlusion.preset
-
UUU_v514/PostProcessPresets/Oldskool screenspace reflections.preset
-
UUU_v514/PostProcessPresets/Ray-traced everything.preset
-
UUU_v514/Readme.txt
-
UUU_v514/System.ValueTuple.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Code Sign
33:00:00:00:c2:a0:09:c5:37:76:e9:f6:cd:00:00:00:00:00:c2Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/09/2016, 17:58Not After07/09/2018, 17:58SubjectCN=Microsoft Time-Stamp Service,OU=AOC+OU=Thales TSS ESN:C3B0-0F6A-4111,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:01:79:7c:2e:57:4e:52:e1:ca:d6:00:01:00:00:01:79Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:11Not After11/08/2018, 20:11SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:c4:e9:89:f8:7a:81:50:e9:ff:00:00:00:00:00:c4Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before11/08/2017, 20:20Not After11/08/2018, 20:20SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
50:0b:9b:f8:2d:1f:dc:2c:85:5f:8d:44:8e:f0:06:34:42:5d:c4:9a:fc:6f:51:5e:c7:96:0d:06:3c:1b:20:16Signer
Actual PE Digest50:0b:9b:f8:2d:1f:dc:2c:85:5f:8d:44:8e:f0:06:34:42:5d:c4:9a:fc:6f:51:5e:c7:96:0d:06:3c:1b:20:16Digest Algorithmsha256PE Digest Matchestruee0:5a:d1:da:4b:60:60:fb:28:f2:b5:1c:59:6c:d7:66:96:16:eb:e0Signer
Actual PE Digeste0:5a:d1:da:4b:60:60:fb:28:f2:b5:1c:59:6c:d7:66:96:16:eb:e0Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
E:\A\_work\39\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.ValueTuple\netstandard1.0\System.ValueTuple.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/ToastNotifications.dll.dll windows:4 windows x86 arch:x86
Password: infected
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\Mannelig\Dev\Projects\NET\WpfToastNotifications\Src\ToastNotifications\obj\Release\ToastNotifications.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/UniversalUE5Unlocker.dll.dll windows:6 windows x64 arch:x64
Password: infected
e58467ecede29360cf046f4254ecb86e
Code Sign
48:fc:93:b4:60:55:94:8d:36:a7:c9:8a:89:d6:94:16Certificate
IssuerCN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before25/05/2021, 00:00Not After31/12/2028, 23:59SubjectCN=Sectigo Public Code Signing Root R46,O=Sectigo Limited,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:d7:08:a8:91:40:53:19:e2:a5:bb:d3:39:b9:ad:6eCertificate
IssuerCN=Sectigo Public Code Signing Root R46,O=Sectigo Limited,C=GBNot Before22/03/2021, 00:00Not After21/03/2036, 23:59SubjectCN=Sectigo Public Code Signing CA EV R36,O=Sectigo Limited,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
46:e8:5c:06:f2:4a:71:f1:7d:f6:6b:72:4f:3a:eb:20Certificate
IssuerCN=Sectigo Public Code Signing CA EV R36,O=Sectigo Limited,C=GBNot Before25/01/2024, 00:00Not After24/01/2025, 23:59SubjectSERIALNUMBER=27162659,CN=Solutions Design BV,O=Solutions Design BV,ST=Zuid-Holland,C=NL,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#13024e4cExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
9c:3c:f1:5f:11:7b:09:34:e4:8d:d7:2f:5f:11:98:74:83:eb:3d:7a:67:fc:31:ea:ad:40:c4:19:15:2d:6c:a7Signer
Actual PE Digest9c:3c:f1:5f:11:7b:09:34:e4:8d:d7:2f:5f:11:98:74:83:eb:3d:7a:67:fc:31:ea:ad:40:c4:19:15:2d:6c:a7Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\frans.SD\Documents\GitHub\PrivateIGCS\Cameras\UUU5\bin\x64\Release\UniversalUE5Unlocker.pdb
Imports
xinput9_1_0
XInputGetState
XInputSetState
kernel32
WriteProcessMemory
OpenProcess
GetCurrentProcessId
GetLastError
GetProcAddress
GetModuleHandleW
K32EnumProcessModules
K32GetModuleInformation
K32GetModuleBaseNameA
AllocConsole
AttachConsole
SetConsoleTextAttribute
GetStdHandle
FreeConsole
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
Sleep
SetThreadPriority
FreeLibraryAndExitThread
DisableThreadLibraryCalls
CreateThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateFileW
CloseHandle
DisconnectNamedPipe
WriteFile
CreateNamedPipeW
ConnectNamedPipe
ReadFile
SetEndOfFile
SetWaitableTimer
WaitForSingleObject
LocalFree
GetModuleFileNameA
K32EnumProcessModulesEx
FlushInstructionCache
GetModuleFileNameW
FormatMessageA
WideCharToMultiByte
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetConsoleCtrlHandler
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
OutputDebugStringW
CreateWaitableTimerW
SetFileAttributesW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileSizeEx
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
HeapReAlloc
HeapAlloc
HeapDestroy
GetThreadContext
SetThreadContext
OpenThread
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetLocaleInfoEx
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
RtlUnwind
SetFileInformationByHandle
SetFileTime
GetTempPathW
AreFileApisANSI
DeviceIoControl
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
GetNativeSystemInfo
ReleaseSRWLockShared
AcquireSRWLockShared
TryAcquireSRWLockShared
EncodePointer
DecodePointer
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
CompareStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitThread
GetModuleHandleExW
ExitProcess
GetCurrentThread
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
user32
GetWindowTextLengthW
GetClassNameW
GetWindow
GetForegroundWindow
IsWindowVisible
GetWindowThreadProcessId
SetWindowLongPtrW
CallWindowProcW
EnumWindows
GetWindowRect
GetRawInputData
ScreenToClient
RegisterRawInputDevices
DestroyWindow
CloseWindow
CreateWindowExA
RegisterClassExA
GetAsyncKeyState
GetWindowTextW
IsWindow
ClipCursor
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
oleaut32
SetErrorInfo
SysFreeString
SysAllocString
VariantInit
CreateErrorInfo
VariantChangeType
VariantClear
GetErrorInfo
d3d11
D3D11CreateDeviceAndSwapChain
Exports
Exports
IGCS_EndScreenshotSession
IGCS_MoveCameraMultishot
IGCS_MoveCameraPanorama
IGCS_StartScreenshotSession
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
UUU_v514/UniversalUE5Unlocker.dll.log
-
UUU_v514/desktop.ini
-
UUU_v514/igcs.config.xml