d:\(◆開発用ディレクトリ)\[▼作業用]プログラム\RPGドライブプログラム+◆Editor - 20180525_ver2.24版_SteamKit版込\Rpgドライブプログラム\Release\Game2.25.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bfa2f162df38f24ab650339122304b46eab27c81ef66e7d9585fcae6f82d7cb8.exe
Resource
win7-20241023-en
General
-
Target
bfa2f162df38f24ab650339122304b46eab27c81ef66e7d9585fcae6f82d7cb8
-
Size
6.7MB
-
MD5
f03b14e62c74d3b050140ff9a7015f13
-
SHA1
7aa17bf3b1ae7327a63c80f77d265bbfd2a2e578
-
SHA256
bfa2f162df38f24ab650339122304b46eab27c81ef66e7d9585fcae6f82d7cb8
-
SHA512
c06bcc4f0a113d44580d71308503795d53ccdb93d86c99fde6432706f95a737dd3b0931a835cb6c5c99257d7457373f3db22cc549dc9b84876094f22ca96a600
-
SSDEEP
98304:5kaWsAYtVm8xoZV/Cypkj2JY7kXeYfmFao4PWjJ8MjY0:5kaWsAYbZawypka4lYbMJ8MjY0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bfa2f162df38f24ab650339122304b46eab27c81ef66e7d9585fcae6f82d7cb8
Files
-
bfa2f162df38f24ab650339122304b46eab27c81ef66e7d9585fcae6f82d7cb8.exe windows:4 windows x86 arch:x86
8de570c6f6a58a1f8da36bc81f19bf75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsA
PathIsDirectoryA
psapi
GetProcessMemoryInfo
kernel32
GetProcAddress
LoadLibraryW
GetModuleFileNameW
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetTickCount
CreateDirectoryA
SetCurrentDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentDirectoryA
GetModuleFileNameA
lstrcpyA
GlobalAlloc
GlobalUnlock
GlobalLock
DeleteFileA
CopyFileA
RemoveDirectoryA
CloseHandle
Sleep
GetExitCodeThread
GlobalMemoryStatusEx
OpenProcess
GetCurrentProcessId
GetDiskFreeSpaceExA
lstrlenA
CreateFileA
GetLastError
FreeLibrary
FlushFileBuffers
InitializeCriticalSection
DeleteCriticalSection
RaiseException
GetFileAttributesA
SetUnhandledExceptionFilter
InterlockedDecrement
InterlockedIncrement
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
GetSystemInfo
VirtualProtect
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
VirtualQuery
UnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetOEMCP
GetCPInfo
WriteFile
IsBadWritePtr
VirtualAlloc
GetProcessHeap
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetModuleHandleA
TerminateProcess
GetCurrentProcess
MoveFileA
MultiByteToWideChar
LoadLibraryA
DebugBreak
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
user32
SendMessageA
MessageBoxA
ShowWindow
SetWindowPos
GetWindowRect
CreateDialogParamA
SendDlgItemMessageA
GetDC
ReleaseDC
GetCursorPos
MonitorFromPoint
EnumDisplayMonitors
GetMonitorInfoA
ClientToScreen
ClipCursor
GetSystemMetrics
GetScrollPos
GetAsyncKeyState
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DestroyWindow
GetDlgItem
SetFocus
gdi32
RemoveFontResourceExA
AddFontResourceExA
GetDeviceCaps
shell32
ShellExecuteA
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
winmm
timeGetTime
advapi32
RegCloseKey
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 628KB - Virtual size: 627KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�+hx�ue Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE