__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_7b0d388ff3c740f081b79fc579645d75.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_7b0d388ff3c740f081b79fc579645d75.exe
Resource
win10v2004-20240508-en
Target
VirusShare_7b0d388ff3c740f081b79fc579645d75
Size
104KB
MD5
7b0d388ff3c740f081b79fc579645d75
SHA1
4daea1f0199a4c40d98ed66b155c9279938bf1f9
SHA256
53bd8b7689bf439ff8787369ea7b57cc15c8719e77b2131c24b81ab485468a10
SHA512
0c78c559775d069df9d9407eb156701978ce73910b6c05559997693f2595fbdafddb20a1d2a6451bb5b466e586bc3b72b733387c623fd64e8e9cac5d012b53cf
SSDEEP
3072:TYbWVKiTDcScRWV4Q9Cjuc4BQ+a7cltB4fDDvKDd5V:UbWcifc9R3QYjlItB4f/udv
Checks for missing Authenticode signature.
resource |
---|
VirusShare_7b0d388ff3c740f081b79fc579645d75 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
ChangeDisplaySettingsW
CloseWindowStation
CreateMDIWindowW
DdeAccessData
DdeNameService
DdeSetUserHandle
DefFrameProcA
DrawFrameControl
EnumThreadWindows
FindWindowW
GetDlgItemTextA
GetGUIThreadInfo
GetKeyboardState
GetLastInputInfo
GetMenu
GetScrollBarInfo
IsCharLowerA
IsCharLowerW
IsDialogMessageA
IsDlgButtonChecked
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxIndirectA
MsgWaitForMultipleObjectsEx
RegisterClipboardFormatW
ReleaseDC
SetDlgItemInt
SetDoubleClickTime
SetWindowsHookExW
TranslateAcceleratorA
UnregisterHotKey
ValidateRgn
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ