?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_06e50cc47055d9c02f686dedb792a500.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_06e50cc47055d9c02f686dedb792a500.exe
Resource
win10v2004-20240508-en
Target
VirusShare_06e50cc47055d9c02f686dedb792a500
Size
100KB
MD5
06e50cc47055d9c02f686dedb792a500
SHA1
b0bf8e4a75a130eabb6cf8aafb0630b5c2c0af20
SHA256
0da2e130edc92e6e5e9c9f4a9cb1953d060bd44a6942a8750e9ed9b1b0980355
SHA512
1454eb99509438215db7643ee8c7a23ea3db3ec7210d493cd828d21fcf612d0beba65ee6e542732c240e827e23a4890a3aca10c4913fdffae148cb64bfec6fec
SSDEEP
1536:fHP/S0Ax3IQumqpl9cy4veQzOtLKCDoDYPLv8gDEgRalO:viZ3azcy4veQzO9D5PomEgRo
Checks for missing Authenticode signature.
resource |
---|
VirusShare_06e50cc47055d9c02f686dedb792a500 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ