F:\WorkFolder\Glarysoft\gu6\exe\vc\FileEncrypt\sourcecode\Release\FileEncrypt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3.exe
Resource
win10v2004-20240802-en
General
-
Target
2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3
-
Size
521KB
-
MD5
1fa0074f92474c6c91a2c0adbcc8b810
-
SHA1
b36e45fcbf59f7a4ddcf933b327b145ce7c5b473
-
SHA256
2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3
-
SHA512
409fb5f0e65236b418cbf8383c85e95166cea554d2fffcfa69056305d2f303d86b2442e7da2183835dc3f804c0772a336d0f40832ef09365824fe659986b637f
-
SSDEEP
6144:vqB/J4TCHjxNDT6WqFFyOlwUIMle76fSWbgkpIetbzRjuVH:qJ4GHjxN9q/L7IM47EhbgkpTbzRjqH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3
Files
-
2c785e825f1ed5abe0b6058eae4dcc89b739ee66a6aadaf9dd1b7d8c655e1ae3.exe windows:5 windows x86 arch:x86
9bff8ae8630d4d1c86227de94ff2831d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90u
ord6577
ord3187
ord2478
ord3768
ord586
ord790
ord814
ord2097
ord337
ord613
ord1047
ord6780
ord3842
ord2280
ord4658
ord693
ord4010
ord3742
ord2141
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord3115
ord4905
ord3670
ord785
ord6482
ord1098
ord4211
ord794
ord589
ord4043
ord4967
ord1314
ord1599
ord4815
ord5078
ord6666
ord2596
ord1329
ord1137
ord6686
ord2907
ord2593
ord2592
ord744
ord524
ord6273
ord6171
ord6514
ord686
ord782
ord580
ord615
ord3496
ord4654
ord1667
ord2277
ord4510
ord1601
ord2103
ord775
ord3651
ord1716
ord1783
ord1248
ord2676
ord287
ord935
ord938
ord5938
ord5939
ord2479
ord5979
ord6687
ord6013
ord5632
ord4631
ord5167
ord5324
ord2208
ord1810
ord1809
ord1675
ord3353
ord6408
ord1492
ord4664
ord4682
ord4774
ord6311
ord280
ord4262
ord1552
ord5770
ord6079
ord5535
ord3729
ord663
ord404
ord3399
ord3338
ord3361
ord2209
ord664
ord405
ord436
ord792
ord587
ord2130
ord3577
ord2282
ord4512
ord333
ord4527
ord4044
ord3637
ord1063
ord1088
ord290
ord4410
ord4541
ord6095
ord3622
ord3488
ord6096
ord3537
ord6547
ord6091
ord1354
ord3543
ord2106
ord1183
ord3486
ord1353
ord636
ord367
ord2470
ord400
ord3646
ord3559
ord2953
ord2959
ord5943
ord3515
ord5182
ord4268
ord1108
ord3661
ord3278
ord4663
ord1722
ord1786
ord2286
ord1603
ord4442
ord2702
ord5851
ord5653
ord2069
ord2360
ord2901
ord2597
ord3165
ord286
ord4131
ord811
ord4516
ord2326
ord813
ord6579
ord2537
ord600
ord296
ord4543
ord6065
ord2904
ord6604
ord5008
ord6187
ord4741
ord4000
ord1938
ord611
ord595
ord3489
ord4681
ord4910
ord4348
ord2891
ord4071
ord4081
ord4080
ord3286
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord2771
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord801
ord799
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord1166
ord1357
ord3231
ord4405
ord4652
ord1493
ord1250
ord1254
ord6275
ord6813
ord4345
ord1751
ord1754
ord6411
ord3355
ord1665
ord2274
ord639
ord374
ord3794
ord266
ord1272
ord265
msvcr90
_wcsicmp
wprintf_s
?what@exception@std@@UBEPBDXZ
memmove_s
_wcsnicmp
memcpy_s
free
_itoa_s
swprintf_s
memset
srand
_time64
rand
_localtime64_s
ceil
wcsftime
_purecall
malloc
_resetstkoflw
_CxxThrowException
memcpy
__CxxFrameHandler3
_invalid_parameter_noinfo
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
atoi
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_wtof
??0exception@std@@QAE@ABQBD@Z
kernel32
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
LockResource
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GlobalUnlock
GlobalLock
SetLastError
SizeofResource
LoadResource
FindResourceW
GetModuleFileNameW
GetModuleHandleW
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
GetLongPathNameW
LocalFree
FormatMessageW
CreateThread
MultiByteToWideChar
GlobalAlloc
GlobalFree
WideCharToMultiByte
GetWindowsDirectoryW
CloseHandle
GetLastError
InitializeCriticalSection
DeleteCriticalSection
Sleep
CopyFileW
DeleteFileW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpynW
QueryPerformanceCounter
user32
GetParent
GetWindowRect
SetTimer
ReleaseCapture
GetSysColor
LoadCursorW
SetCursor
GetMenuItemInfoW
UnionRect
GetMenuBarInfo
LoadMenuW
CheckMenuItem
ModifyMenuW
GetMenuState
GetMenuItemID
GetMenuItemCount
FillRect
SetRect
InvalidateRect
EnableWindow
OffsetRect
FrameRect
CopyRect
DrawIcon
GetSystemMetrics
IsIconic
AppendMenuW
GetSystemMenu
LoadIconW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetCursorPos
EnableMenuItem
GetSubMenu
ReleaseDC
GetDC
KillTimer
GetClientRect
SetWindowLongW
GetWindowLongW
GetWindow
SendMessageW
gdi32
CreateRoundRectRgn
CreatePen
CreatePatternBrush
CreateSolidBrush
GetBkMode
CreateFontW
GetTextExtentPoint32W
GetCurrentObject
CreateCompatibleBitmap
GetObjectW
SetDIBColorTable
SelectObject
GetDIBColorTable
FrameRgn
FillRgn
BitBlt
StretchBlt
DeleteObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
GetStockObject
SetBrushOrgEx
msimg32
GradientFill
TransparentBlt
AlphaBlend
advapi32
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
shell32
SHBrowseForFolderW
SHCreateDirectoryExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
CommandLineToArgvW
DragFinish
DragQueryFileW
SHGetFileInfoW
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathIsDirectoryW
PathFindExtensionW
PathFileExistsW
PathFindFileNameW
ole32
CreateStreamOnHGlobal
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
VarDateFromStr
VarUdateFromDate
msvcp90
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
?erase@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@II@Z
?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?find_first_not_of@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?find_last_not_of@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXAAV12@@Z
??$?9_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@PB_W@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
gdiplus
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusShutdown
crashreport
ord1
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
lockdll
ord6
guwndmanager
WindowsPosInitialize
WindowsPosHookWnd
languages
ord9
ord8
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE