__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_75581413c0e09810a1876caac7a64fc3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_75581413c0e09810a1876caac7a64fc3.exe
Resource
win10v2004-20240426-en
Target
VirusShare_75581413c0e09810a1876caac7a64fc3
Size
77KB
MD5
75581413c0e09810a1876caac7a64fc3
SHA1
b2cb172f1ff3604608a254415349dbd5dccf93d3
SHA256
0d26fa1ebf092abfdc330457d7680787d0b37df72c4b021f0a52a5139bf13b32
SHA512
e99cfa35e18446cbfd846ab48e36dd2adf4f557a8373da0c25fc8447eda49be6b531aca11fc4544e58885617efd9bbb2e5e474ecba093271689d6416d62d1140
SSDEEP
1536:jVPXcaK+mqmNaTcwTjx6n86kNv5s1xbGkGzmOjB6erl4zKD123OwKJBPk40:ZPMtHahrNhs1K/jg84zKD0exBPkD
Checks for missing Authenticode signature.
resource |
---|
VirusShare_75581413c0e09810a1876caac7a64fc3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
EncryptFileA
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
AppendMenuA
CharLowerBuffA
CharNextA
CharNextW
CheckMenuRadioItem
ClientToScreen
CreateDesktopW
DdeDisconnectList
DdeFreeStringHandle
DdeQueryStringA
DestroyWindow
EnableMenuItem
EnumThreadWindows
ExitWindowsEx
GetClassInfoA
GetKeyboardLayout
GetMessageW
GetWindowLongA
IsCharAlphaA
IsChild
IsDlgButtonChecked
IsMenu
LoadKeyboardLayoutA
MapVirtualKeyW
MessageBoxA
OpenWindowStationA
RegisterClassA
ScreenToClient
ScrollWindow
SetCapture
SetCursorPos
SetTimer
SetWindowsHookW
ShowWindow
WaitForInputIdle
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ