C:\p4\sgpu\main\docs\specifications\architectural_specs\unit_specs\graphics\ccv\code\Debug\ccv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1a2854d8e50657e46d60528750cc1a40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1a2854d8e50657e46d60528750cc1a40N.exe
Resource
win10v2004-20240709-en
General
-
Target
1a2854d8e50657e46d60528750cc1a40N.exe
-
Size
41KB
-
MD5
1a2854d8e50657e46d60528750cc1a40
-
SHA1
f127d25b8c6a223a847aca4dc7dafbab814446b4
-
SHA256
cb8d99ad09a069532ade0f3fc442d6c183ea19cdc09810b1539c731da73838eb
-
SHA512
2285832ff92a1cf9364a00ad66f0de55fee53ee7be7b4f607e5f537caa93c1ee7c37a0e8ae3ac73ad21eec56ee7bec4abe8e15b79a75f0d5810bb27431b67529
-
SSDEEP
768:u6EwpEjMxBL9eKqg2daFfLfYfOXLiYp3RfW:u6Ew+jk9eu2d+fLfYfOXmYpl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a2854d8e50657e46d60528750cc1a40N.exe
Files
-
1a2854d8e50657e46d60528750cc1a40N.exe.exe windows:6 windows x86 arch:x86
fe83d821637c67e4b7afe0f7e82ea260
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr110d
_lock
_unlock
_calloc_dbg
__dllonexit
_onexit
__crtSetUnhandledExceptionFilter
_controlfp_s
_except_handler4_common
wcscpy_s
_wmakepath_s
_wsplitpath_s
?terminate@@YAXXZ
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_commode
_fmode
__winitenv
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
_CrtSetCheckCount
_CrtDbgReportW
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_CRT_RTC_INITW
_invoke_watson
printf
kernel32
GetModuleFileNameW
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
GetTickCount64
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
lstrlenA
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
IsDebuggerPresent
EncodePointer
GetModuleHandleW
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ