__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_02c8014deea0c9fdb92a41cf32e2ba5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_02c8014deea0c9fdb92a41cf32e2ba5c.exe
Resource
win10v2004-20240426-en
Target
VirusShare_02c8014deea0c9fdb92a41cf32e2ba5c
Size
75KB
MD5
02c8014deea0c9fdb92a41cf32e2ba5c
SHA1
97304235e6bc53f9a5f11996329fbeadf837125e
SHA256
816a269f312444306edef15f7becbb73f39bf188e60481b7cfb4236ed80c70be
SHA512
e98eb9bc9f2c5a6a6c46444d126394b2c6cb6fe47f38da9a52d0aecc4db831633a917cbb406e3a6700a3c8d5a055e4f3c7c30fbedfef289d3a2d0236b907d61d
SSDEEP
1536:jVPXcaK+mqmNaTcwTjx6n86kNv5s1xbGkGzmOjB6erl4zKD123OwKJBy:ZPMtHahrNhs1K/jg84zKD0exBy
Checks for missing Authenticode signature.
resource |
---|
VirusShare_02c8014deea0c9fdb92a41cf32e2ba5c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
EncryptFileA
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
AppendMenuA
CharLowerBuffA
CharNextA
CharNextW
CheckMenuRadioItem
ClientToScreen
CreateDesktopW
DdeDisconnectList
DdeFreeStringHandle
DdeQueryStringA
DestroyWindow
EnableMenuItem
EnumThreadWindows
ExitWindowsEx
GetClassInfoA
GetKeyboardLayout
GetMessageW
GetWindowLongA
IsCharAlphaA
IsChild
IsDlgButtonChecked
IsMenu
LoadKeyboardLayoutA
MapVirtualKeyW
MessageBoxA
OpenWindowStationA
RegisterClassA
ScreenToClient
ScrollWindow
SetCapture
SetCursorPos
SetTimer
SetWindowsHookW
ShowWindow
WaitForInputIdle
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ