__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
73d1c008f0c1d0f15dd82e2034801a9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73d1c008f0c1d0f15dd82e2034801a9e.exe
Resource
win10v2004-20231215-en
Target
73d1c008f0c1d0f15dd82e2034801a9e
Size
213KB
MD5
73d1c008f0c1d0f15dd82e2034801a9e
SHA1
75b72bd52af13ec9f83982e223373845ba615002
SHA256
ea79ffc7a8a87e0c310731131d2f1648254b8d9988f7fd0118a296ac59330df5
SHA512
3902ae6141320f0f70996dfc31beb7ae6b2ff4c97db6ac3c469c101b81fb071ac9bd0256d346dbed72eb944efe3b60c7cdee72b4659fbbf78d504e91a5659443
SSDEEP
3072:XN375DqqYJ0wIWD/P9MrxdD4JC40fuLYfjGEhfL8BmSDe/2mKReFSQVn:XNr5DqqRwIuVod74iYWSEhfLSDl7Ret
Checks for missing Authenticode signature.
resource |
---|
73d1c008f0c1d0f15dd82e2034801a9e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
ConvertDefaultLocale
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FlushConsoleInputBuffer
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLargestConsoleWindowSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MapUserPhysicalPagesScatter
MultiByteToWideChar
ProcessIdToSessionId
RaiseException
ReadConsoleInputA
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleInputA
WriteFile
lstrcpyA
I_RpcBindingInqDynamicEndpointA
I_RpcSendReceive
I_RpcServerUseProtseqEp2A
FindTextA
GetOpenFileNameA
AttachThreadInput
CheckMenuItem
CreateIconFromResource
DdeNameService
DrawTextExA
EnumPropsExA
EnumThreadWindows
GetDlgItemInt
MessageBoxA
RegisterClassExA
SetActiveWindow
WaitForInputIdle
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ