C:\Users\andre_000\Documents\Visual Studio 2015\Code\TestMFCDocView\Debug\TestMFCDocView.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4.exe
Resource
win10v2004-20240426-en
General
-
Target
db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4
-
Size
238KB
-
MD5
883be5b85c9fc43dcedd67a1b3be3b13
-
SHA1
f6927fc79146dc8f6460eb0c0652206b51af2839
-
SHA256
db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4
-
SHA512
a0f935be60989092a63dc5c9b8ec2ff277ff1c439757be493bbc8b4c5503c2bc0c6211eda25327a1af0e18d22339bc54caabfd8836263d59b194d12ae103efa7
-
SSDEEP
3072:zGuo6WF0heuuatheYpGXD9F/pstBaDqwONnct437Bl3N2Uvd:zGuo6au9GRD9F/p/uwONct43j92U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4
Files
-
db73925303864412aaab636a7cbdb5aba1d9c17b879185b82e5697e2c25fadc4.exe windows:6 windows x86 arch:x86
d5e72b70ffb3622cbfea3da517756419
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc140ud
ord12113
ord12114
ord12112
ord17378
ord3313
ord12081
ord3899
ord3902
ord16164
ord7549
ord3763
ord5992
ord5993
ord7426
ord14518
ord7224
ord16090
ord16100
ord7229
ord16098
ord7228
ord3088
ord5392
ord13333
ord10618
ord11166
ord1266
ord9875
ord11021
ord13716
ord6486
ord4483
ord5499
ord11046
ord14041
ord13398
ord12231
ord8686
ord604
ord3780
ord9232
ord2965
ord5083
ord14067
ord10128
ord4595
ord14144
ord2046
ord13718
ord7252
ord13723
ord4473
ord9025
ord4596
ord2045
ord5268
ord4685
ord7251
ord11115
ord8689
ord607
ord3873
ord9371
ord2966
ord5084
ord14069
ord10129
ord11167
ord14146
ord13725
ord11024
ord13719
ord4485
ord5994
ord16101
ord16099
ord4474
ord11048
ord5266
ord1060
ord15974
ord1579
ord1078
ord10216
ord1592
ord9006
ord11970
ord11973
ord11977
ord9164
ord1176
ord11017
ord12076
ord6994
ord14085
ord7225
ord16093
ord17154
ord16776
ord3089
ord5393
ord4477
ord14049
ord9876
ord3752
ord3751
ord4017
ord4016
ord4759
ord12304
ord13299
ord12901
ord10840
ord1223
ord2928
ord5037
ord11018
ord3312
ord16160
ord7547
ord14092
ord14183
ord14233
ord9885
ord14215
ord7198
ord4493
ord391
ord1183
ord8268
ord1095
ord10202
ord16367
ord15450
ord7728
ord6832
ord7729
ord17262
ord7727
ord17260
ord9592
ord14599
ord17050
ord2136
ord13920
ord13921
ord2379
ord13968
ord14222
ord9533
ord15117
ord4757
ord4819
ord11212
ord17188
ord9511
ord17182
ord14609
ord14610
ord2887
ord6470
ord10024
ord12111
ord9589
ord5501
ord15030
ord15098
ord12265
ord14223
ord10108
ord1606
ord3024
ord5153
ord10210
ord868
ord2686
ord2693
ord2708
ord2564
ord1225
ord7941
ord493
ord14137
ord11044
ord9012
ord1645
ord2520
ord4490
ord10008
ord8632
ord512
ord16570
ord16260
ord3426
ord9928
ord16119
ord6776
ord7520
ord10884
ord4504
ord12860
ord12910
ord13168
ord11005
ord14944
ord6741
ord14715
ord13153
ord10123
ord9168
ord3410
ord15618
ord3092
ord14475
ord14808
ord5624
ord11301
ord3257
ord15134
ord14054
ord5044
ord2935
ord1240
ord4805
ord4755
ord17099
ord6495
ord6485
ord12263
ord12077
ord12564
ord13028
ord13029
ord11177
ord13664
ord11797
ord11020
ord6996
ord11975
ord11976
ord9160
ord9896
ord11065
ord14184
ord8943
ord1090
ord4797
ord10000
ord13177
ord13180
ord11326
ord11341
ord11331
ord11804
ord11809
ord11343
ord13008
ord12341
ord10721
ord10711
ord13667
ord13036
ord11868
ord1601
ord5152
ord3023
ord3219
ord8289
ord11034
ord14084
ord14048
ord13644
ord13645
ord10945
ord13868
ord17181
ord10763
ord4739
ord8456
ord12887
ord3857
ord16316
ord14245
ord14241
ord1978
ord2000
ord2026
ord2012
ord2033
ord5894
ord5961
ord5906
ord5924
ord5918
ord5912
ord5971
ord5955
ord5900
ord5977
ord5932
ord5870
ord5885
ord5946
ord5405
ord7021
ord11511
ord5391
ord3635
ord17183
ord9512
ord17189
ord8290
ord13636
ord3220
ord3976
ord3977
ord3856
ord14132
ord6303
ord6711
ord6991
ord11164
ord6679
ord6306
ord5352
ord12115
ord6537
ord6282
ord9264
ord9265
ord9254
ord6535
ord9889
ord15341
ord1662
ord1652
ord1660
ord9022
ord17261
ord2616
ord1653
ord2804
kernel32
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
OutputDebugStringA
DecodePointer
SetLastError
GetProcessHeap
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
FreeLibrary
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
CloseHandle
LoadLibraryW
GetProcAddress
GetLastError
user32
PostQuitMessage
PeekMessageW
UnregisterClassW
gdi32
DeleteDC
comctl32
InitCommonControlsEx
oleaut32
SysFreeString
gdiplus
GdiplusShutdown
vcruntime140d
memset
_purecall
__CxxFrameHandler3
__telemetry_main_return_trigger
__vcrt_InitializeCriticalSectionEx
_except_handler4_common
__std_type_info_destroy_list
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
memmove
__telemetry_main_invoke_trigger
ucrtbased
__stdio_common_vswprintf_s
__stdio_common_vsnwprintf_s
free
malloc
_CrtDbgReportW
_CrtDbgReport
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_seh_filter_dll
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_controlfp_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
_invalid_parameter_noinfo
_errno
_recalloc
wcslen
wcscpy_s
__stdio_common_vswprintf
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 329B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ