F:\개발\프로그램\2차표준화 테스트 프로그램\통합프로그램\SVES2_Test_150126(Cam해상도추가)\Release\SVES2_Test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8.exe
Resource
win10v2004-20240802-en
General
-
Target
929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8
-
Size
315KB
-
MD5
69680a6ae0911cb4499e2bdb04bb71eb
-
SHA1
5e46f294f713176a904444c6d4e4ba44055642dc
-
SHA256
929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8
-
SHA512
3626d79c6229f203f2954a19db896e51f8e7ffa32b371686097ec51081da0bfc7eb11834a7a8c29ba6d6f069939a9e7ba3d89b271228e4ad9a7dd2481b83a18c
-
SSDEEP
3072:yzL602qbg7R4eVYvOT910LDJvEuUWZlxy9RB8s1KTkO7NRXMF5mPVb6QyHmd0tOE:j0qfjANZlxy9RB8tTkO7NlMahPl7Pnw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8
Files
-
929c02aed73abc62708e73920c144ed7045f23e5fa4a68b37af9e1a5a2a769b8.exe windows:5 windows x86 arch:x86
06e91e1b9d62eee814be9f9222c04eba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc100
ord12535
ord2417
ord8222
ord11154
ord8351
ord5444
ord5777
ord895
ord915
ord3429
ord2613
ord7861
ord3741
ord2744
ord8224
ord5784
ord919
ord2936
ord2836
ord6088
ord1260
ord3744
ord8228
ord5302
ord5858
ord1012
ord493
ord1036
ord3254
ord3373
ord3251
ord3361
ord3241
ord6680
ord7206
ord13219
ord7311
ord12283
ord3390
ord2422
ord7211
ord12440
ord3354
ord4785
ord1855
ord7871
ord2611
ord2409
ord13280
ord3431
ord2614
ord7862
ord3743
ord2776
ord8227
ord5857
ord1011
ord9399
ord6835
ord888
ord1288
ord8330
ord7141
ord1890
ord849
ord12672
ord6112
ord11787
ord9449
ord4078
ord11180
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord3755
ord2838
ord8231
ord6090
ord1263
ord3758
ord11184
ord2841
ord8234
ord5432
ord6098
ord1271
ord1900
ord8776
ord4344
ord5534
ord7214
ord7933
ord12962
ord788
ord1210
ord10030
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12482
ord5253
ord2338
ord11060
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord5288
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8305
ord5805
ord2184
ord917
ord341
ord5774
ord3488
ord977
ord421
ord310
ord305
ord5242
ord2626
ord1316
ord3839
ord1313
ord3970
ord300
ord266
ord948
ord5776
ord5837
ord3439
ord4283
ord1982
ord11153
ord5098
ord9281
ord8304
ord11788
ord6671
ord4080
ord1291
ord893
ord6627
ord4464
ord11781
ord7487
ord11067
ord8137
ord10007
ord946
ord1294
ord265
ord901
ord10360
ord9475
ord2742
ord3738
ord385
ord6316
ord3409
ord5238
ord11172
ord11181
ord7355
ord7581
ord9450
ord3620
ord2974
ord2973
ord2752
ord5532
ord12531
ord2881
ord2878
ord7349
ord2416
ord14059
ord14061
ord14060
ord14058
ord14062
ord14045
ord13972
ord13973
ord8235
ord11025
ord3395
ord10883
ord13294
ord8070
ord11108
ord6217
ord2939
ord9994
ord316
ord2088
ord387
ord1929
ord1296
msvcr100
__CxxFrameHandler3
memcpy
_setmbcp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_time64
_itoa_s
system
atoi
free
malloc
remove
memmove
printf
_localtime64
_ftime64
memset
kernel32
OutputDebugStringA
SetEvent
ReadFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
GetLastError
WriteFile
CreateThread
ClearCommError
SetCommState
GetCommState
SetupComm
SetCommTimeouts
CreateFileA
PurgeComm
EscapeCommFunction
SetCommMask
ResumeThread
MultiByteToWideChar
GetCurrentThreadId
ExitThread
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
Sleep
CloseHandle
ResetEvent
CreateEventA
CreateSemaphoreA
CreateMutexA
user32
InvalidateRect
EnableWindow
SetTimer
KillTimer
LoadIconW
GetSystemMenu
LoadImageA
GetWindowRect
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
AppendMenuA
wsprintfA
SendMessageA
gdi32
CreateDIBitmap
DeleteObject
comctl32
InitCommonControlsEx
gdiplus
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
ws2_32
htons
closesocket
setsockopt
WSACleanup
WSAStartup
WSAEnumNetworkEvents
WSAEventSelect
inet_addr
connect
WSAGetLastError
send
ioctlsocket
recv
select
__WSAFDIsSet
socket
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ngvdgeg Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE