C:\assemblage\Builds\2339228863432187689xxfnnpgjvd\Cpp-DirectX-DesktopDuplication-master\DirectX11app\assemblage_outdir_bin\DirectXDesktopDuplication.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62.exe
Resource
win10v2004-20240802-en
General
-
Target
0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62
-
Size
94KB
-
MD5
9560830d6c19c4c34cbb6814ad74c6d1
-
SHA1
e3452fe792ea0766977f89223edc9ee610c12120
-
SHA256
0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62
-
SHA512
a949343b23abc0fb144fd8f7bca4719f7c5799a731f4d117f1b8e04cdb50ab6f3ebd2820daacd384fff647d1070c1728bf8cbcd2763163a58d1e0702a3627189
-
SSDEEP
384:iVREbLDsT3e13KeTC+yFqKd2IkH8P17UnjcuTHZTPGUjBQOOOc+Qv:+6bXcwlyFqASy17UnjD7ZTPGUjqWc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62
Files
-
0b003501353da5643c30596cfc67b39609e51375d509cca28b1b9336e7e52c62.exe windows:6 windows x64 arch:x64
9cb414635e24fa9c4569432d6f1141c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
AdjustWindowRect
ShowWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
PeekMessageW
DispatchMessageW
LoadCursorW
TranslateMessage
d3d11
D3D11CreateDeviceAndSwapChain
vcruntime140d
__std_type_info_destroy_list
__C_specific_handler
ucrtbased
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
__p__commode
_set_new_mode
exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
_configthreadlocale
_set_fmode
_c_exit
_exit
_cexit
_register_thread_local_exe_atexit_callback
kernel32
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcessId
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 310B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 378B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ