@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.703cd4de521d75913d8a236c22644c80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.703cd4de521d75913d8a236c22644c80.exe
Resource
win10v2004-20231023-en
Target
NEAS.703cd4de521d75913d8a236c22644c80.exe
Size
89KB
MD5
703cd4de521d75913d8a236c22644c80
SHA1
d90f42cee179476b0ac8f4a10100d071483a1ee8
SHA256
c70cff851d6a4e7b17a07490cdbdf2dbf77cbe5d7fefc8315e4859ccf79bfe8a
SHA512
df5b0747a0e6f1c614d4b9c6ccf4ca2c25d2cec8fb0fe98df6c70cad0cd5c5ee1a7d9fbb1deb5f7b70cfc168aa59f66535a7b47a66b632141d151875f9506415
SSDEEP
1536:KcewjyqYthvnfHqasHwNlSI5iNuo2v2DvV4ft1+G0G5vtF2VqNYhZ5CiT:bzyqc9qaDSuiNl14ft1tF2VqNYhZ5Cu
Checks for missing Authenticode signature.
resource |
---|
NEAS.703cd4de521d75913d8a236c22644c80.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
_SQLClose
_SQLCode
_SQLError
_SQLExecute
_SQLFetch
_SQLOpen
_SQLRelease
_Connexion_Base
_EDIClose
_EDIEtiquette
_EDIGoto
_EDIOpen
_EDIPrintf
_EDISkip
_MEMFree
_MEMMalloc
_MEMSourceLine
_MEMSourceName
_PARGet
_PARIndice
_PARInit
_PARObligatoire
_PARPresent
_debug
_strcasestr
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ