?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6b556c85bb746902939ce629721541a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_6b556c85bb746902939ce629721541a0.exe
Resource
win10v2004-20231215-en
Target
VirusShare_6b556c85bb746902939ce629721541a0
Size
100KB
MD5
6b556c85bb746902939ce629721541a0
SHA1
08c168d11e2708fdd85ff8b460ffb5ef2db5a0bd
SHA256
fa5fad2fc610a7a3e3361bc32246045a27c8592ed02d368480ac62cdaf1ccbd4
SHA512
c89ee96db8288972053a0defebb8ac129bd7db2e512b91049a16f15d2adc97475a679e0d1fbac62af19da31facf239f2fb08b8f486771c232003824f3fb5c13d
SSDEEP
1536:fHY/S0Ax3IQumqpl9cy4veQzOtLKCDcDYPLv8gDEgRolO:vnZ3azcy4veQzO9DtPomEgRu
Checks for missing Authenticode signature.
resource |
---|
VirusShare_6b556c85bb746902939ce629721541a0 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ