@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
chemcad6 crack/MAGNiTUDE/CC6_Calc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
chemcad6 crack/MAGNiTUDE/CC6_Calc.exe
Resource
win10v2004-20231215-en
Target
4fe3430331176c98d0191acf45269ecd
Size
73KB
MD5
4fe3430331176c98d0191acf45269ecd
SHA1
4013110c79ff4356c998f9c1c294b568022fbb7f
SHA256
e0d34e4e53ad1fef9d2e46d45f8810282cccfca0f03e3dacf5dd47ed081934c7
SHA512
461d31a88984eed66809c36c1f6f6a5c9ecb4a2e8dcfede8752dcc5ab63af213c448c5c49b6c8f39ec5f9f586a8ef6e36d57d4e28c85b2ccede9280ee0cc4015
SSDEEP
1536:vBqUCGCMtTChTM/YY/wTq91C7KyxL7vi9AD+H4nTdc0v/Z+:ZqeZ5Y0wTqrC79xL76cXNnZ+
Checks for missing Authenticode signature.
resource |
---|
unpack001/chemcad6 crack/MAGNiTUDE/CC6_Calc.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetTimeZoneInformation
GetModuleHandleA
GetProcAddress
VirtualProtect
MessageBoxA
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE