__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
60539c35c13963ce481dbc4af53522f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60539c35c13963ce481dbc4af53522f4.exe
Resource
win10v2004-20231215-en
Target
60539c35c13963ce481dbc4af53522f4
Size
373KB
MD5
60539c35c13963ce481dbc4af53522f4
SHA1
a03e784b9bcb9b61fa3158cb32c711b7f3cb7702
SHA256
c611fa4d3a8fed593e8f94ad9d32fec2be9fe25cecbe417aba5645f12d7305e9
SHA512
81f05c1104d2401d1edb6936cb444bee0921e5e405f46798bdaf661d5b09f4b35af8e58207824d4cd282ef73247bbfd798b1131f21960973b02cd7b8f28a09d8
SSDEEP
6144:ig27GeGnAV+ZE7LiF2MMWq1mTnPP9Cn52YWfm30dOc1CzzWKTQg2ewHmETG5Edjw:n27GfAA3FHn0n5fRVHa
Checks for missing Authenticode signature.
resource |
---|
60539c35c13963ce481dbc4af53522f4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CompareStringA
CopyFileA
CreateEventA
CreateFileA
CreateFileMappingA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FreeConsole
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetThreadLocale
GetTimeZoneInformation
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OutputDebugStringA
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetEvent
SetFilePointer
SetHandleCount
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcpynA
lstrlenA
ShellExecuteA
CharNextA
EnumThreadWindows
GetAsyncKeyState
GetForegroundWindow
GetKeyboardLayout
GetKeyboardType
GetSystemMetrics
GetWindowTextA
LoadStringA
MapVirtualKeyExA
MessageBoxA
wsprintfA
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ