@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
4466916076666ec3116d8eec9b284c6e66da5203690b57daed3fe6ff4ca4cd10.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4466916076666ec3116d8eec9b284c6e66da5203690b57daed3fe6ff4ca4cd10.exe
Resource
win10v2004-20230703-en
Target
4466916076666ec3116d8eec9b284c6e66da5203690b57daed3fe6ff4ca4cd10
Size
487KB
MD5
793f0bc0f6765e35dd8eec7f69de7018
SHA1
8b838e3d0e1a6c5fc4f4829e143b5eb0b3ba5723
SHA256
4466916076666ec3116d8eec9b284c6e66da5203690b57daed3fe6ff4ca4cd10
SHA512
d071437ea3ba6b2451a9466db0af20a8b078c2759bb11b486750e8d0f04cd48c2d2028376da2243d3641d6ca7295fa66417fa165bf122b7714e2df17b8cbd04d
SSDEEP
12288:3M87ulvaCowzPOTtFI6eUt5KOdNCybj3Soms:881R5ThyOdQyJms
Checks for missing Authenticode signature.
resource |
---|
4466916076666ec3116d8eec9b284c6e66da5203690b57daed3fe6ff4ca4cd10 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GlobalUnlock
GetLocalTime
WriteFile
RaiseException
EnterCriticalSection
GlobalMemoryStatus
InitializeCriticalSection
DosDateTimeToFileTime
SetConsoleCtrlHandler
RemoveDirectoryA
GetFileType
GetLastError
CreateFileA
GetModuleFileNameA
LocalFileTimeToFileTime
GetModuleHandleA
GetTickCount
UnhandledExceptionFilter
SetFileTime
GetStartupInfoA
RtlUnwind
GetProcAddress
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalGetAtomNameA
ExitProcess
CloseHandle
GetCommandLineA
DeleteFileA
GetPrivateProfileStringA
SetHandleCount
LeaveCriticalSection
GetCurrentThreadId
WinExec
VirtualFree
GetTempPathA
GetEnvironmentStrings
GetStdHandle
VirtualAlloc
SetFilePointer
GetFileAttributesA
CreateDirectoryA
GetVersion
WritePrivateProfileStringA
_lclose
_lcreat
_llseek
_lopen
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
GlobalLock
DeleteObject
CreateSolidBrush
CreatePen
TextOutA
SetBkMode
SelectObject
Rectangle
MoveToEx
LineTo
GetTextExtentPoint32A
UpdateWindow
wsprintfA
SetWindowPos
SendMessageA
RegisterClassA
PostMessageA
MessageBoxA
LoadIconA
LoadCursorA
InvalidateRect
GetSystemMetrics
GetMessageA
GetClientRect
GetClassNameA
EnumWindows
EnumThreadWindows
EndPaint
DispatchMessageA
PostQuitMessage
DefWindowProcA
CreateWindowExA
BeginPaint
LZOpenFileA
LZCopy
LZClose
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ