H:\Ma Pengcheng\project\VS2010\My_EPI_Depth\Debug\My_EPI_Depth.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03d8d26848d51de7675d2d81c7dd90e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
03d8d26848d51de7675d2d81c7dd90e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
03d8d26848d51de7675d2d81c7dd90e0N.exe
-
Size
64KB
-
MD5
03d8d26848d51de7675d2d81c7dd90e0
-
SHA1
50d5f1b9d0eb6d071123e75907c7c65cd5fab157
-
SHA256
beae667a3d0128dbf3ead4357b5a24f4364545f126607adacc090843a8d4f33b
-
SHA512
5dbe138af6ed3e1063a98c660c7fcdebad402b829de115891f2add27c2b00b73491ed70324d8664ab0ceb9e83595e23d8a5ca88aa1e16530ff412f63d28643f4
-
SSDEEP
768:YVOn6h9+ToR3MBPuUcSPFuaavUHU9J9MKOrdikm:YbiG8FuFStuaavUHUj7OXm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03d8d26848d51de7675d2d81c7dd90e0N.exe
Files
-
03d8d26848d51de7675d2d81c7dd90e0N.exe.exe windows:5 windows x86 arch:x86
355c1dbb8122318f837a56449c3e1b96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
opencv_imgproc246d
cvPyrDown
opencv_core246d
cvCreateImage
cvReleaseImage
opencv_highgui246d
cvShowImage
cvSaveImage
cvLoadImage
cvNamedWindow
cvDestroyWindow
cvWaitKey
msvcp100d
??1_Container_base12@std@@QAE@XZ
?_Orphan_all@_Container_base12@std@@QAEXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Debug_message@std@@YAXPB_W0I@Z
??0_Container_base12@std@@QAE@XZ
msvcr100d
sqrt
ceil
_CRT_RTC_INITW
_unlock
__dllonexit
??3@YAXPAX@Z
_onexit
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_amsg_exit
__getmainargs
_exit
_XcptFilter
_cexit
exit
__initenv
abs
_CrtDbgReportW
_initterm
_initterm_e
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
memmove
memcpy
strlen
__CxxFrameHandler3
system
free
malloc
floor
strcpy
sprintf
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
_CrtSetCheckCount
_CxxThrowException
_lock
kernel32
FreeLibrary
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LoadLibraryW
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
IsProcessorFeaturePresent
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ