?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_54dfc29fc42caf6af1c5f30a55238a70.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_54dfc29fc42caf6af1c5f30a55238a70.exe
Resource
win10v2004-20240426-en
Target
VirusShare_54dfc29fc42caf6af1c5f30a55238a70
Size
100KB
MD5
54dfc29fc42caf6af1c5f30a55238a70
SHA1
3513059c7ccfea44d205fb7bf1a77f8b597eee92
SHA256
bb685539c59d667f34b30fdccbe2a6eb78486a530383e6edf940a4b6b7a82bda
SHA512
88449c57cc26049f073ba571264c025285d7ff0d8bc8c0b9a9e6e01be1daa086fbe71e176ddd6830f72d05f84b10fc5f4c3188b4f60b31fa0aa2ce1a279bfa81
SSDEEP
1536:fHC/S0Ax3IQumqpl9cy4veQzOtLKCDlDYPLv8gDEgRqlO:vlZ3azcy4veQzO9D2PomEgRY
Checks for missing Authenticode signature.
resource |
---|
VirusShare_54dfc29fc42caf6af1c5f30a55238a70 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ