F:\ShareFolder\ParamSpecEditor2_v1.1.0.11\Debug\ParamSpecEditor2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16.exe
Resource
win10v2004-20240611-en
General
-
Target
8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16
-
Size
201KB
-
MD5
7f62a368f318b4d45a78fc13b619c38d
-
SHA1
79a605b112493a4036ceed7ec5dc100adcca32f5
-
SHA256
8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16
-
SHA512
4fc371aae898e517d5c59484b7369ce8cc984d6f49f11682c7b421bc4cc6789be2d98e8b5ab5e1c87caf63bc647a90e13198e0931dae1e0c30c71396ab3f9645
-
SSDEEP
1536:rzTsHWEMTHcH2ha4PCHaWFSBaQX8IaBF00rL4iogjIqLN5QmYqr6RqNU981RGXJI:HcMi7QmY9QMOzl/5cwU9x3OREPgGHO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16
Files
-
8e00e959b44df969460e7d3fb7a1b846b9270152fef8fdafd7c3f8985614ff16.exe windows:5 windows x86 arch:x86
10440c4b209779fd353df9f66c7f65bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90ud
ord4008
ord6816
ord2166
ord5530
ord6772
ord690
ord5054
ord1857
ord3140
ord6707
ord4323
ord8152
ord7603
ord7638
ord6804
ord5991
ord3337
ord7628
ord7626
ord4474
ord2716
ord5781
ord7868
ord9297
ord7462
ord1389
ord5747
ord8169
ord2861
ord2906
ord6537
ord9368
ord5738
ord9366
ord6121
ord6164
ord930
ord8902
ord1453
ord5779
ord6142
ord1476
ord4899
ord2565
ord3231
ord5835
ord8633
ord7044
ord872
ord4013
ord3761
ord8266
ord5062
ord598
ord5990
ord6093
ord8111
ord286
ord8054
ord5948
ord963
ord6270
ord6271
ord3378
ord1189
ord1408
ord5998
ord5300
ord333
ord2174
ord4426
ord9152
ord291
ord4477
ord935
ord1651
ord753
ord7569
ord6407
ord7029
ord7203
ord2863
ord2411
ord2410
ord2251
ord2250
ord4659
ord8780
ord2032
ord7593
ord6466
ord3033
ord1769
ord406
ord5281
ord5487
ord1561
ord4358
ord5841
ord6282
ord9105
ord8553
ord2717
ord2723
ord7115
ord335
ord5196
ord9215
ord714
ord6879
ord8199
ord9161
ord4398
ord5195
ord6306
ord8588
ord8926
ord3790
ord292
ord2255
ord2954
ord6440
ord487
ord504
ord6147
ord812
ord823
ord5329
ord3377
ord3462
ord961
ord1140
ord7201
ord9073
ord6864
ord5673
ord1133
ord8692
ord9110
ord950
ord4661
ord8783
ord2339
ord2336
ord5987
ord2033
ord6446
ord7538
ord2701
ord7420
ord9365
ord6377
ord7604
ord3245
ord1900
ord2849
ord5197
ord7015
ord6487
ord2307
ord8868
ord7644
ord7642
ord1218
ord1223
ord1227
ord1225
ord1229
ord3551
ord3571
ord3555
ord3561
ord3559
ord3557
ord3574
ord3569
ord1665
ord952
ord1628
ord1626
ord1654
ord1553
ord9196
ord1504
ord1617
ord2713
ord5342
ord425
ord942
ord1523
ord1664
ord1662
ord1516
ord1423
ord1503
ord336
ord948
ord715
ord3553
ord3576
ord3564
ord3546
ord3548
ord3566
ord3256
ord3243
ord2209
ord9367
ord5739
ord9369
ord5071
ord7299
ord8730
ord4493
ord1968
ord7562
ord2782
ord2385
ord2384
ord2306
ord7590
ord3804
ord4122
ord4320
ord6518
ord4097
ord4348
ord3807
ord3996
ord3796
ord5598
ord5599
ord5589
ord3994
ord5994
ord6712
ord6465
ord3143
ord1860
ord8287
ord427
ord302
ord354
ord2493
ord768
ord701
ord723
ord5294
ord5531
ord6531
ord7400
ord5497
ord2942
ord943
ord1663
msvcr90d
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
_CxxThrowException
_time64
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??_V@YAXPAX@Z
_mktime64
_gmtime64_s
_localtime64_s
__CxxFrameHandler3
_snprintf_s
_errno
_CrtDbgReportW
free
strcpy
wcscpy
_vsnprintf_s
memset
_vsnwprintf_s
_snwprintf_s
wcscpy_s
strcpy_s
calloc
_recalloc
memcmp
_wcsicmp
memmove_s
wcslen
_invalid_parameter
_wfopen_s
fread
fclose
wcscat_s
wcsncpy_s
exit
_wtof
_wtoi
_CrtDbgReport
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_CRT_RTC_INITW
_initterm_e
_initterm
_CrtSetCheckCount
_wcmdln
_cexit
_XcptFilter
_exit
__wgetmainargs
_amsg_exit
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
kernel32
WritePrivateProfileStringW
LocalFree
LocalAlloc
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
InterlockedDecrement
InterlockedIncrement
OpenFileMappingA
GetCurrentThread
CreateFileMappingA
MapViewOfFile
GetSystemInfo
UnmapViewOfFile
VirtualAlloc
GetLastError
OutputDebugStringW
OutputDebugStringA
OpenEventA
SetEvent
CloseHandle
GetPrivateProfileStringW
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapFree
HeapAlloc
VirtualQuery
FreeLibrary
LocalFileTimeToFileTime
GetProcessHeap
GetModuleFileNameW
user32
GetSystemMetrics
GetCursorPos
GetMessagePos
CopyRect
IsRectEmpty
PtInRect
SetRect
SetRectEmpty
EqualRect
InflateRect
OffsetRect
IntersectRect
SubtractRect
UnionRect
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
oleaut32
SysFreeString
msvcp90d
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Container_base_secure@std@@QAE@XZ
?_Orphan_all@_Container_base_secure@std@@QBEXXZ
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?_Debug_message@std@@YAXPB_W0I@Z
??0_Container_base_secure@std@@QAE@XZ
advapi32
RevertToSelf
SetThreadToken
OpenThreadToken
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ