@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
2c79136702101a937649b9517f0e11df8d9604540db65a01e0fa26cfd458aed0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c79136702101a937649b9517f0e11df8d9604540db65a01e0fa26cfd458aed0.exe
Resource
win10v2004-20240802-en
Target
2c79136702101a937649b9517f0e11df8d9604540db65a01e0fa26cfd458aed0
Size
511KB
MD5
1bc854a6c199ab720c00bf67581204a7
SHA1
d772cd24f07b1d74a89bccd7aec372d5bbc32c1b
SHA256
2c79136702101a937649b9517f0e11df8d9604540db65a01e0fa26cfd458aed0
SHA512
35a5d35e2a2ec1971579c2ca1f34ddd72c2bf3f818fea44f53d620a28505b97a8f8c9842c6e641c94ae1afe44834ce3311e420de9740731b5a34176ee2e6b62f
SSDEEP
3072:br00FSUiwFOePgYAMKYeMXKw+ghrKZ9lqfxNzrvdXCCjiRY:brtSUiwFLgYAM3eMXK2KZGJt4m
Checks for missing Authenticode signature.
resource |
---|
2c79136702101a937649b9517f0e11df8d9604540db65a01e0fa26cfd458aed0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetCurrentDirectoryA
SetConsoleCtrlHandler
GetSystemTime
VirtualFree
CreateFileA
GetFileAttributesA
ReadFile
UnhandledExceptionFilter
InitializeCriticalSection
GetTickCount
GlobalMemoryStatus
GetEnvironmentStrings
GetStdHandle
EnterCriticalSection
SetHandleCount
SetLastError
GetFileType
RtlUnwind
RaiseException
GetCurrentThreadId
GetWindowsDirectoryA
GetCommandLineA
GetLocalTime
GetVersion
LeaveCriticalSection
GetModuleHandleA
WriteFile
ExitProcess
GetProcAddress
GetStartupInfoA
VirtualAlloc
DeleteFileA
GetModuleFileNameA
GetLastError
CloseHandle
SetFilePointer
DeleteDC
GetStockObject
GetDeviceCaps
DeleteObject
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CheckDlgButton
BeginPaint
SetDlgItemInt
TranslateMessage
UpdateWindow
TranslateAcceleratorA
WinHelpA
SetWindowTextA
SetTimer
SetDlgItemTextA
ShowWindow
ReleaseDC
RegisterClassA
DispatchMessageA
PostQuitMessage
MoveWindow
MessageBoxA
LoadIconA
LoadCursorA
KillTimer
IsDlgButtonChecked
GetWindowRect
GetSystemMetrics
GetMessageA
GetMenu
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
GetDC
LoadAcceleratorsA
EnumThreadWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
RegSetValueA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegQueryValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
sndPlaySoundA
GetSaveFileNameA
GetOpenFileNameA
SHGetPathFromIDList
SHBrowseForFolder
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE