C:\buildworker\steam_rel_client_win32\build\src\streaming\Release\streaming_client.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7N.exe
Resource
win10v2004-20240802-en
General
-
Target
3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7N
-
Size
9.3MB
-
MD5
ca0af36f76cd5a29818de6a5c669afe0
-
SHA1
bb33c9d94b088a3f4924d25ce18c7ae85b0192dd
-
SHA256
3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7
-
SHA512
a60e27ca070adbd8e20fe400d233561e0dd13b769f1771ec6278ce7773066c2a4910a6839f335c534aab92a87155f9033261f7d35e72f43543b6cee8ea2e9f5d
-
SSDEEP
196608:PhtquphsJkphIsD7YekrpPPj9JEP7j24ntQCz1m0lZMf:PhtvpskphIsD7Ye4pnjnETPSCpmUZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7N
Files
-
3fda57f846be1d2c179cb498a5a45a4599da3f10637d4f1a7607cfe6f480c3e7N.exe windows:6 windows x86 arch:x86
f844ab5fb3955f2e86a1526b07be532b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
GlobalAlloc
GlobalUnlock
GlobalLock
LocalAlloc
LocalFree
MoveFileExW
VerifyVersionInfoW
MultiByteToWideChar
RaiseException
GetCurrentThread
GetModuleHandleExW
WideCharToMultiByte
GetCurrentProcessId
Sleep
GetFullPathNameW
DeleteFileW
CreateDirectoryW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
SetLastError
WriteFile
SetThreadPriority
VerSetConditionMask
GlobalFree
GetFileAttributesW
FindFirstFileW
FindClose
CreateFileW
OutputDebugStringA
FormatMessageA
GetCurrentThreadId
GetCurrentProcess
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
LeaveCriticalSection
EnterCriticalSection
DeviceIoControl
GetModuleHandleA
OpenProcess
GetExitCodeProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetTimeZoneInformation
HeapValidate
HeapSize
SetFilePointerEx
SetConsoleCtrlHandler
ExitProcess
GetConsoleCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FreeLibraryAndExitThread
ExitThread
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
GetStringTypeW
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
TryAcquireSRWLockExclusive
GetTimeFormatW
GetDateFormatW
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSizeEx
GetFileInformationByHandle
GetFileAttributesExW
GetDriveTypeW
GetDiskFreeSpaceA
FlushFileBuffers
FindFirstFileExW
GetCurrentDirectoryW
FindNextFileW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GetStdHandle
GetEnvironmentVariableW
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
ConvertFiberToThread
ConvertThreadToFiber
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
InitializeCriticalSectionEx
QueryPerformanceFrequency
GetSystemDirectoryW
LoadLibraryW
WaitForSingleObjectEx
CompareFileTime
GetEnvironmentVariableA
ReadFile
PeekNamedPipe
SleepEx
GetSystemTime
SystemTimeToFileTime
InitializeCriticalSection
GetCommandLineW
TerminateProcess
GlobalMemoryStatusEx
VirtualAlloc
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetProcessAffinityMask
DuplicateHandle
TryEnterCriticalSection
SwitchToThread
CreateThread
OpenThread
GetExitCodeThread
SetThreadAffinityMask
SetUnhandledExceptionFilter
LoadLibraryExW
DebugBreak
GetProcessHeaps
SetProcessAffinityMask
SetEnvironmentVariableW
user32
SetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
GetDlgItem
MessageBoxA
GetDesktopWindow
GetWindowRect
EndDialog
DialogBoxParamA
OpenClipboard
wsprintfA
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
EnumWindows
GetWindowThreadProcessId
CloseClipboard
IsWindowVisible
SetClipboardData
SetWindowPos
EmptyClipboard
FlashWindowEx
GetWindowTextLengthA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
shell32
CommandLineToArgvW
ole32
CLSIDFromString
oleaut32
VariantClear
ws2_32
getsockname
htonl
WSAEnumNetworkEvents
WSAEventSelect
WSASendMsg
getaddrinfo
__WSAFDIsSet
ntohl
gethostname
WSAGetLastError
getsockopt
ntohs
WSACleanup
recv
send
WSASetLastError
accept
connect
listen
WSACloseEvent
WSACreateEvent
WSAIoctl
getpeername
WSAStartup
socket
setsockopt
sendto
recvfrom
htons
ioctlsocket
closesocket
bind
select
freeaddrinfo
psapi
GetProcessMemoryInfo
winmm
timeBeginPeriod
timeEndPeriod
sdl3_image
IMG_isSVG
IMG_Quit
IMG_Init
IMG_Load_IO
IMG_FreeAnimation
IMG_LoadAnimation_IO
bcrypt
BCryptGenRandom
wldap32
ord27
ord301
ord147
ord142
ord26
ord117
ord41
ord208
ord216
ord14
ord46
ord219
ord145
ord167
ord133
ord79
ord127
crypt32
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
Exports
Exports
CreateInterface
g_dwDllEntryThreadId
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 607KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 748KB - Virtual size: 752KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE