d:\GUProjects\winapps\gu6\exe\vc\Memdefrag\soucecode\memdefrag\MemDefrag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80.exe
Resource
win10v2004-20240802-en
General
-
Target
e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80
-
Size
386KB
-
MD5
29dd20dee894b4c805e2ef527df72225
-
SHA1
a2bb26aad7fe7954afd5e2c7d385130938334cdf
-
SHA256
e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80
-
SHA512
f309fc058fd827253259c2eef5ebb23b7d4e0849e91b5ccd0fa802c60987560e46371ac9cc654c93bbb68fbf675e387d2873cb6899e6092bbe89214f06189305
-
SSDEEP
12288:mK5eCIeuX5JPQR0jEuFy01TGCCm3r3LKf:mK5ON5NQR0jEuFh1TGCb7LKf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80
Files
-
e09feaefef879113366aa4f4aabab31cc59dea3e96db4e377f23f2bd96b4fa80.exe windows:5 windows x86 arch:x86
03bbc543430e0354e69cc7e6f0ce5471
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90u
ord778
ord1779
ord1708
ord3627
ord750
ord1782
ord1715
ord3648
ord772
ord4992
ord4967
ord4043
ord589
ord794
ord4211
ord6482
ord6604
ord6022
ord785
ord3670
ord4905
ord3115
ord6018
ord5663
ord5680
ord4996
ord4347
ord2447
ord5676
ord5674
ord2087
ord4213
ord5830
ord6741
ord5548
ord1048
ord4179
ord6035
ord2206
ord2251
ord4747
ord6803
ord4173
ord6801
ord4423
ord4448
ord265
ord2286
ord1786
ord1722
ord4663
ord3278
ord3661
ord1108
ord1492
ord6577
ord6476
ord2069
ord524
ord744
ord5182
ord6065
ord4543
ord2593
ord2360
ord4815
ord4527
ord4774
ord1599
ord1298
ord4405
ord939
ord935
ord3953
ord4044
ord367
ord636
ord337
ord613
ord3486
ord1183
ord2106
ord3543
ord3488
ord1354
ord1353
ord6091
ord3537
ord6096
ord3654
ord2097
ord3622
ord6095
ord4541
ord4410
ord799
ord4512
ord2282
ord1809
ord3353
ord1357
ord6666
ord333
ord525
ord2141
ord5653
ord4682
ord6579
ord2694
ord813
ord4131
ord2904
ord600
ord296
ord5008
ord3217
ord6187
ord2901
ord4741
ord2470
ord4000
ord1938
ord775
ord3651
ord1716
ord1783
ord654
ord3528
ord4664
ord611
ord595
ord797
ord3489
ord4681
ord4910
ord4348
ord2891
ord4071
ord4081
ord4080
ord3286
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord2771
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord4660
ord1719
ord2283
ord1313
ord3515
ord814
ord2597
ord1317
ord1330
ord1316
ord2697
ord316
ord306
ord601
ord818
ord821
ord820
ord938
ord5979
ord4519
ord3422
ord6830
ord290
ord2537
ord1137
ord811
ord5632
ord4631
ord5167
ord5324
ord2208
ord6547
ord1810
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord3577
ord1675
ord2074
ord5602
ord2130
ord6408
ord4652
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord1665
ord2274
ord639
ord374
ord1272
ord3794
ord2596
ord801
msvcr90
_CxxThrowException
__CxxFrameHandler3
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
wcscpy_s
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
memmove_s
swprintf_s
strstr
_strlwr_s
_wtoi
_beginthread
free
wcsstr
memset
kernel32
FreeLibrary
GetFileAttributesW
GetCommandLineW
SetEvent
LoadLibraryW
GetModuleFileNameW
WaitForSingleObject
GetProcAddress
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
VirtualFree
VirtualAlloc
GlobalSize
ResetEvent
Sleep
LoadLibraryA
CreateEventA
GlobalMemoryStatusEx
lstrlenW
user32
GetMenuItemCount
EnableMenuItem
GetMenuItemID
GetCursorPos
ModifyMenuW
GetSubMenu
LoadMenuW
FillRect
LoadBitmapW
EnumClipboardFormats
GetClipboardData
GetClipboardOwner
GetWindowTextA
ChangeClipboardChain
InvalidateRect
DrawIcon
GetSystemMetrics
IsIconic
SetTimer
SetClipboardViewer
GetClientRect
GetWindowRect
AppendMenuW
GetSystemMenu
LoadIconW
SetForegroundWindow
ShowWindow
FindWindowW
CloseClipboard
EmptyClipboard
OpenClipboard
SendMessageW
EnableWindow
CopyRect
gdi32
GetTextExtentPoint32W
CreateFontW
CreatePen
SelectObject
BitBlt
GetBitmapBits
CreateCompatibleBitmap
CreateCompatibleDC
CreatePatternBrush
GetObjectW
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegOpenKeyExA
RegDeleteValueW
shell32
Shell_NotifyIconW
comctl32
InitCommonControlsEx
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
crashreport
ord1
guwndmanager
WindowsPosHookWnd
WindowsPosInitialize
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE