c:\Users\Mr.Anderson\Desktop\2008\13.8.20\cgridlistctrlex-master\vs2003\Release\CGridListCtrlEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6250d1d8d79ff4bb6e9e41be76b404d9fec4ff5a122d07fc119981ae159ea221.exe
Resource
win7-20240708-en
General
-
Target
6250d1d8d79ff4bb6e9e41be76b404d9fec4ff5a122d07fc119981ae159ea221
-
Size
618KB
-
MD5
00db620a0687978bfd76e472f4da1a3c
-
SHA1
1a5075abfb3ff356f86442528645fc2cc76ed056
-
SHA256
6250d1d8d79ff4bb6e9e41be76b404d9fec4ff5a122d07fc119981ae159ea221
-
SHA512
cf56a87e8aa3a8084748771f55740e03874878cdf587c879f4edec41bee12a5b928d19be7029dc94dc02ca978f5100ce20e24d953b6fca96428a3d123df4cb32
-
SSDEEP
12288:yXTEnejfEqrrSTw1ww2Yo0MCx1HXqxklNG6cyprjVDRAwxEP+10:YIgfT2sO6t3HXqeGejx10
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6250d1d8d79ff4bb6e9e41be76b404d9fec4ff5a122d07fc119981ae159ea221
Files
-
6250d1d8d79ff4bb6e9e41be76b404d9fec4ff5a122d07fc119981ae159ea221.exe windows:5 windows x86 arch:x86
3268d862cb50ce830dc4c241423e5ea4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
HeapCreate
GetFileTime
VirtualFree
GetStdHandle
LCMapStringA
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetFileSizeEx
GetFileAttributesA
SetErrorMode
FileTimeToLocalFileTime
GetModuleHandleW
GetOEMCP
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetProfileIntA
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
CopyFileA
GlobalSize
FormatMessageA
LocalFree
lstrlenW
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrcpynA
FreeLibrary
VerSetConditionMask
VerifyVersionInfoA
MultiByteToWideChar
lstrlenA
RaiseException
DebugBreak
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
SetLastError
ExitProcess
user32
LoadCursorA
ReleaseCapture
SetCapture
SetRect
IsRectEmpty
WindowFromPoint
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
TrackPopupMenu
SetMenu
GetScrollRange
GetScrollPos
SetForegroundWindow
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetWindowContextHelpId
MapDialogRect
SetWindowPos
RegisterClipboardFormatA
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetSystemMetrics
DrawIcon
AppendMenuA
SendMessageA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
CharNextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
PostThreadMessageA
CharUpperA
GetSysColorBrush
MapWindowPoints
GetSystemMenu
IsIconic
GetClientRect
EnableWindow
LoadIconA
GetFocus
PostMessageA
GetDC
ReleaseDC
UpdateWindow
InvalidateRect
GetWindow
GetParent
PtInRect
InflateRect
OffsetRect
FillRect
GetWindowRect
GetSysColor
GetDesktopWindow
GetKeyState
GetMessagePos
SetClipboardData
CloseClipboard
EmptyClipboard
DrawTextA
CreatePopupMenu
GetMenuItemCount
ScreenToClient
OpenClipboard
CopyRect
EqualRect
DrawFocusRect
PostQuitMessage
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
LoadBitmapA
SetPropA
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
GetDeviceCaps
CreatePen
CreateSolidBrush
CopyMetaFileA
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
GetTextExtentPoint32A
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
DeleteObject
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
GetCurrentObject
GetObjectA
PtVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
CoGetClassObject
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleFlushClipboard
OleIsCurrentClipboard
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
DoDragDrop
oleaut32
SystemTimeToVariantTime
VarBstrFromDate
SysFreeString
VarUdateFromDate
VarDateFromStr
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
VariantTimeToSystemTime
Sections
.text Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ