GetHandleVerifier
GetNtLoaderAPI
IsSandboxedProcess
NativeNtBlockSet_Write
Static task
static1
Behavioral task
behavioral1
Sample
4c5e66d24c5d506bacab68bda84f7a865a94fbfd10824f05165bf8f9529e66d7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4c5e66d24c5d506bacab68bda84f7a865a94fbfd10824f05165bf8f9529e66d7.exe
Resource
win10v2004-20230703-en
Target
4c5e66d24c5d506bacab68bda84f7a865a94fbfd10824f05165bf8f9529e66d7
Size
1.6MB
MD5
4996949d5c473281c9d2e76734b531b6
SHA1
f9b50af0029359a091afaf5890fc6105c8fad523
SHA256
4c5e66d24c5d506bacab68bda84f7a865a94fbfd10824f05165bf8f9529e66d7
SHA512
54f15c738b858072ab764dd832cf47e3eeb92bb748cd91ce4b1cda88b39e089fcba9964cac2e467cb10283cfeefeba325c36978fd5acb067ae33253d37cdfc37
SSDEEP
24576:7irgQz6ZxjHoLnH+SBVYZBBUuw4pa3lNU:mrgk6ZxjFSBVYZwrl
Checks for missing Authenticode signature.
resource |
---|
4c5e66d24c5d506bacab68bda84f7a865a94fbfd10824f05165bf8f9529e66d7 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_Z23DllBlocklist_Initializej
_ZN13CrashReporter30RegisterRuntimeExceptionModuleEv
_ZN13CrashReporter32UnregisterRuntimeExceptionModuleEv
_ZN7mozilla12PrintfTarget6vprintEPKcPc
_ZN7mozilla12PrintfTargetC2Ev
_ZN7mozilla12baseprofiler13profiler_initEPv
_ZN7mozilla12baseprofiler14ProfilingStack18ensureCapacitySlowEv
_ZN7mozilla12baseprofiler17AutoProfilerLabel17GetProfilingStackEv
_ZN7mozilla12baseprofiler17profiler_shutdownEv
_ZN7mozilla12baseprofiler26profiler_current_thread_idEv
_ZN7mozilla12baseprofiler6detail12RacyFeatures19IsActiveAndUnpausedEv
_ZN7mozilla12baseprofiler9AddMarkerINS0_7markers10TextMarkerEJNSt3__112basic_stringIcNS4_11char_traitsIcEENS4_9allocatorIcEEEEEEENS_23ProfileBufferBlockIndexERKNS_18ProfilerStringViewIcEERKNS_14MarkerCategoryEONS_13MarkerOptionsET_DpRKT0_
_ZN7mozilla18IsWin32kLockedDownEv
_ZN7mozilla19MapRemoteViewOfFileEPvS0_yS0_ymm
_ZN7mozilla19SetGeckoProcessTypeEPKc
_ZN7mozilla21CleanupProcessRuntimeEv
_ZN7mozilla24WindowsDpiInitializationEv
_ZN7mozilla26PollPreXULSkeletonUIEventsEv
_ZN7mozilla27SetWin32kLockedDownInPolicyEv
_ZN7mozilla30CreateAndStorePreXULSkeletonUIEP11HINSTANCE__iPPc
_ZN7mozilla5mscom6detail21EndProcessRuntimeInitEv
_ZN7mozilla5mscom6detail23BeginProcessRuntimeInitEv
_ZN7mozilla6detail9MutexImpl4lockEv
_ZN7mozilla6detail9MutexImpl6unlockEv
_ZN7mozilla6detail9MutexImplD2Ev
_ZN7mozilla7startup17sChildProcessTypeE
_ZN7mozilla9TimeStamp3NowEb
_ZNK17double_conversion23DoubleToStringConverter20ToShortestIeeeNumberEdPNS_13StringBuilderENS0_8DtoaModeE
_ZNK7mozilla14TimeStampValuemiERKS0_
_aligned_free
_aligned_malloc
_strdup
_wcsdup
calloc
free
malloc
moz_xmalloc
mozalloc_abort
realloc
strdup
NtMapViewOfSection
NtOpenFile
NtQueryInformationProcess
NtQueryVirtualMemory
NtReadVirtualMemory
NtUnmapViewOfSection
RtlAcquireSRWLockExclusive
RtlAcquireSRWLockShared
RtlAddFunctionTable
RtlAllocateHeap
RtlAnsiStringToUnicodeString
RtlCaptureStackBackTrace
RtlCompareMemory
RtlCompareUnicodeString
RtlDuplicateUnicodeString
RtlEqualUnicodeString
RtlFreeHeap
RtlFreeUnicodeString
RtlGetLastWin32Error
RtlGetVersion
RtlInitAnsiString
RtlInitUnicodeString
RtlLookupFunctionEntry
RtlNtStatusToDosError
RtlQueryPerformanceCounter
RtlReAllocateHeap
RtlReleaseSRWLockExclusive
RtlReleaseSRWLockShared
RtlRestoreContext
RtlRunOnceExecuteOnce
RtlRunOnceInitialize
RtlSetLastWin32Error
RtlUnwindEx
RtlVirtualUnwind
VerSetConditionMask
memcmp
memcpy
memmove
memset
_ltoa_s
_strtod_l
_strtoi64_l
_strtoui64_l
mbrtowc
mbsrtowcs
strtod
strtof
strtol
strtoll
strtoul
strtoull
wcrtomb
wcrtomb_s
wcstod
wcstol
wcstoul
__p__environ
__p__wenviron
_putenv
_wgetenv
getenv
__setusermatherr
_fdopen
__C_specific_handler
memchr
strrchr
wcschr
__p___argc
__p___argv
__p___wargv
__sys_nerr
_assert
_beginthreadex
_cexit
_configure_narrow_argv
_configure_wide_argv
_crt_at_quick_exit
_crt_atexit
_errno
_exit
_initialize_narrow_environment
_initialize_wide_environment
_initterm
_register_thread_local_exe_atexit_callback
_set_app_type
_set_invalid_parameter_handler
abort
exit
signal
strerror_s
__acrt_iob_func
__p__commode
__p__fmode
__stdio_common_vfprintf
__stdio_common_vfwprintf
__stdio_common_vsnprintf_s
__stdio_common_vsnwprintf_s
__stdio_common_vsprintf
__stdio_common_vsscanf
__stdio_common_vswprintf
_dup
_fileno
_fseeki64
_ftelli64
_get_osfhandle
_wfopen
_write
fclose
fflush
fgets
fopen
fputc
fputs
fread
freopen
fseek
fwrite
_isctype_l
_iswalpha_l
_iswcntrl_l
_iswdigit_l
_iswlower_l
_iswprint_l
_iswpunct_l
_iswspace_l
_iswupper_l
_iswxdigit_l
_strcoll_l
_stricmp
_strnicmp
_strxfrm_l
_tolower_l
_toupper_l
_towlower_l
_towupper_l
_wcscoll_l
_wcsicmp
_wcsnicmp
_wcsxfrm_l
isspace
iswctype
iswspace
isxdigit
mbrlen
strcmp
strcpy
strlen
strncmp
tolower
toupper
towlower
wcscmp
wcscpy
wcscpy_s
wcslen
wcsncmp
wcsncpy
wcspbrk
wcstok_s
rand_s
AcquireSRWLockExclusive
AssignProcessToJobObject
AttachConsole
CloseHandle
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateJobObjectW
CreateMutexW
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateThread
CreateToolhelp32Snapshot
DebugBreak
DeleteCriticalSection
DeleteProcThreadAttributeList
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesEx
ExpandEnvironmentStringsW
FileTimeToSystemTime
FlsAlloc
FlsGetValue
FlsSetValue
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentProcessorNumber
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFileType
GetLastError
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetProcAddress
GetProcessHandleCount
GetProcessHeaps
GetProcessId
GetProductInfo
GetQueuedCompletionStatus
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadId
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetUserDefaultLangID
GetUserDefaultLocaleName
GetVersionExW
GetVolumePathNameW
HeapDestroy
HeapSetInformation
InitOnceExecuteOnce
InitializeCriticalSection
InitializeCriticalSectionEx
InitializeProcThreadAttributeList
IsDebuggerPresent
IsProcessorFeaturePresent
IsWow64Process
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
ProcessIdToSessionId
QueryFullProcessImageNameW
QueryPerformanceCounter
QueryPerformanceFrequency
QueryThreadCycleTime
RaiseException
ReadFile
ReadProcessMemory
RegisterWaitForSingleObject
ReleaseSRWLockExclusive
ResetEvent
ResumeThread
SearchPathW
SetDllDirectoryW
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetHandleInformation
SetInformationJobObject
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadPriority
SetUnhandledExceptionFilter
SignalObjectAndWait
Sleep
SleepConditionVariableSRW
SwitchToThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateJobObject
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
TryEnterCriticalSection
TzSpecificLocalTimeToSystemTime
UnmapViewOfFile
UnregisterWait
UnregisterWaitEx
UpdateProcThreadAttribute
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteProcessMemory
lstrcmpiA
lstrlenW
___lc_codepage_func
___mb_cur_max_func
__pctype_func
_configthreadlocale
_create_locale
_free_locale
localeconv
setlocale
__daylight
__timezone
__tzname
_strftime_l
_tzset
_mbtowc_l
_set_new_mode
GetHandleVerifier
GetNtLoaderAPI
IsSandboxedProcess
NativeNtBlockSet_Write
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ