@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
de726b2e13795b744d7d194535ecf754.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
de726b2e13795b744d7d194535ecf754.exe
Resource
win10v2004-20240226-en
Target
de726b2e13795b744d7d194535ecf754
Size
78KB
MD5
de726b2e13795b744d7d194535ecf754
SHA1
b50a3dbe015e5708b0e082138627d7d74a96d814
SHA256
eb0f311db225d001e87f6f1fb2634e5539e6762e8a97f42878303ecb1131b48a
SHA512
bd42d5f142e71126c622a49903e7b737685bd8a96b732767c6255e16e544936d76e547612863940c49a7fc9817bd751dbbf98c52e33ede9c7efcb7a14fce2f3e
SSDEEP
768:6gbqJ+HmGhqlINCoyufAaFT34M7TwUYRDmK+G94poiNAbHrE0/30/M5GQBJg:4J+GGAuC4fAaF77wHuGGNc/0Ugim
Checks for missing Authenticode signature.
resource |
---|
de726b2e13795b744d7d194535ecf754 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetCurrentDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetProcAddress
CreateDirectoryA
RtlUnwind
VirtualFree
SetFilePointer
GetStartupInfoA
CreateProcessA
GetVersionExA
GetModuleHandleA
SetConsoleCtrlHandler
GetTempPathA
GetLocalTime
WriteFile
UnhandledExceptionFilter
SetHandleCount
ExitProcess
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetModuleFileNameA
DeleteFileA
GetVersion
EnterCriticalSection
CreateFileA
CloseHandle
GetLastError
GetStdHandle
VirtualAlloc
Sleep
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
RaiseException
ReadFile
DeleteObject
CreateFontA
LoadStringA
WinHelpA
ShowWindow
SendMessageA
SendDlgItemMessageA
MessageBoxA
LoadIconA
IsDlgButtonChecked
EnumThreadWindows
EndDialog
DialogBoxParamA
CheckDlgButton
SetDlgItemTextA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetMalloc
SHFileOperationA
ShellExecuteA
OleUninitialize
OleInitialize
CoCreateInstance
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE