__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_4cff51b85dbcb7f4ef4b51eb5edf7c83.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_4cff51b85dbcb7f4ef4b51eb5edf7c83.exe
Resource
win10v2004-20240508-en
Target
VirusShare_4cff51b85dbcb7f4ef4b51eb5edf7c83
Size
114KB
MD5
4cff51b85dbcb7f4ef4b51eb5edf7c83
SHA1
eef5d08a4a50982d26b37f1ee2bc010ff80a7d5a
SHA256
da41f0473651ffc04bec053c8bca6e7baad1f67be2635372aa8ec06d410fcd53
SHA512
860b858f54280ca65283e30e656c7caf84fd5415a3239c1f5e1caa4a39fdcf68edb3a97a99067c670c65e963c58d8c0c65c30d5b8fac1356dfe22dab3566c573
SSDEEP
3072:9YcTrz0ZDTUTeryrGd/GuAWBRpmqWFW0/v:ycTf01YT1GP5BMFW0/
Checks for missing Authenticode signature.
resource |
---|
VirusShare_4cff51b85dbcb7f4ef4b51eb5edf7c83 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MultiByteToWideChar
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpW
ChangeDisplaySettingsW
CreateDialogIndirectParamA
CreateIconFromResourceEx
DestroyMenu
EnableScrollBar
EnableWindow
EnumClipboardFormats
EnumThreadWindows
EnumWindowStationsW
GetCaretBlinkTime
GetClassLongW
GetClassWord
GetKeyboardState
GetKeyboardType
GetMenu
GetMenuItemInfoA
GetNextDlgGroupItem
GetUpdateRgn
GetUserObjectInformationA
GetWindow
IsWindowVisible
LoadAcceleratorsA
MapWindowPoints
MessageBoxA
PackDDElParam
RegisterClassExW
RegisterWindowMessageA
SendMessageA
SendMessageTimeoutW
SetMenu
SetProcessWindowStation
SetWindowWord
SetWindowsHookExA
ShowWindowAsync
ToAscii
TrackMouseEvent
WindowFromPoint
mouse_event
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE