?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_513029040dbfffe354a4d5af1d0c68e0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_513029040dbfffe354a4d5af1d0c68e0.exe
Resource
win10v2004-20240426-en
Target
VirusShare_513029040dbfffe354a4d5af1d0c68e0
Size
93KB
MD5
513029040dbfffe354a4d5af1d0c68e0
SHA1
f20ef0c6368eefcbc17e74c7c3d2840f75b76328
SHA256
57bb949b176a94f2d84004426db3c538be363b8eaf94f2b6eb15f3b11e5a5dd0
SHA512
add2e33da047cf305bcb6fd2982adb7a8f543d8eeddfccfcde47fa42a0393fb23416b4644f607d3a65e954c100fdc18e969e4be2d980f0389ef5b6ddbb56673a
SSDEEP
1536:fH2/S0Ax3IQumqpl9cy4veQzOtLKCDDDYPLv8gDEgRql6:vRZ3azcy4veQzO9DIPomEgRY6
Checks for missing Authenticode signature.
resource |
---|
VirusShare_513029040dbfffe354a4d5af1d0c68e0 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ