msdtcexe.pdb
Static task
static1
General
-
Target
1d7f8b604fa24212265b66b6de04d9c0N
-
Size
746KB
-
MD5
1d7f8b604fa24212265b66b6de04d9c0
-
SHA1
5a7177d47c89cbca30b0fb85a4922631dc0a7059
-
SHA256
832a2f801a377dd89d62682440a7c04dc0414a875631f0fba5dfdafd7abc7a40
-
SHA512
2d133a945dda9a452a6830188d7b40295966dad8b55d885f6846c937a9becbb8783825e7b429c42c9c587c0027a4349e2ec03bf1fa62ec0fac6067f9eaa893c6
-
SSDEEP
12288:P9kynXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:PWynsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d7f8b604fa24212265b66b6de04d9c0N
Files
-
1d7f8b604fa24212265b66b6de04d9c0N.exe windows:10 windows x64 arch:x64
3c631dedc9c5020eea535c9b35c97488
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-processenvironment-l1-1-0
ExpandEnvironmentStringsW
GetCommandLineW
GetCommandLineA
api-ms-win-core-com-l1-1-0
CoInitializeEx
StringFromGUID2
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoGetObjectContext
msvcrt
_fmode
_commode
_wcmdln
__C_specific_handler
memcpy
?terminate@@YAXXZ
_lock
_unlock
_initterm
__setusermatherr
__dllonexit
_cexit
_exit
exit
_onexit
_CxxThrowException
_local_unwind
__set_app_type
memcmp
__wgetmainargs
_amsg_exit
_XcptFilter
fopen
fflush
fclose
fprintf
fwprintf
__CxxFrameHandler3
_vsnwprintf
memcpy_s
_wcsicmp
_purecall
??1exception@@UEAA@XZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
_vsnprintf_s
_stricmp
memmove_s
wcsrchr
_waccess
??0exception@@QEAA@AEBQEBDH@Z
?what@exception@@UEBAPEBDXZ
strchr
_wfopen
??1type_info@@UEAA@XZ
_callnewh
malloc
free
wcschr
memset
msdtctm
ord4
ntdll
RtlVirtualUnwind
RtlReportException
RtlLookupFunctionEntry
RtlCaptureContext
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
CreateProcessW
GetExitCodeProcess
OpenProcessToken
GetStartupInfoW
GetCurrentThreadId
TlsAlloc
TlsFree
TlsGetValue
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
api-ms-win-core-errorhandling-l1-1-0
GetLastError
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-libraryloader-l1-2-0
LoadLibraryExW
FreeLibrary
LoadResource
GetProcAddress
GetModuleFileNameA
FindResourceExW
LockResource
GetModuleHandleW
LoadStringW
GetModuleHandleExW
GetModuleFileNameW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryA
GetLocalTime
GetTickCount
api-ms-win-core-registry-l1-1-0
RegSetValueExW
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-synch-l1-1-0
CreateMutexExW
ResetEvent
ReleaseSemaphore
CreateEventA
ReleaseSRWLockShared
EnterCriticalSection
ReleaseMutex
DeleteCriticalSection
AcquireSRWLockShared
InitializeCriticalSectionAndSpinCount
CreateSemaphoreExW
OpenSemaphoreW
LeaveCriticalSection
WaitForSingleObjectEx
AcquireSRWLockExclusive
WaitForSingleObject
ReleaseSRWLockExclusive
InitializeCriticalSectionEx
SetEvent
api-ms-win-core-heap-l1-1-0
HeapFree
GetProcessHeap
HeapAlloc
api-ms-win-core-file-l1-1-0
GetFullPathNameW
FindFirstFileW
SetFileAttributesW
CreateDirectoryW
DeleteFileW
FindClose
CreateFileW
FindNextFileW
api-ms-win-core-threadpool-l1-2-0
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolTimer
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-psapi-l1-1-0
QueryFullProcessImageNameW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-version-l1-1-0
VerQueryValueW
api-ms-win-core-heap-l2-1-0
LocalAlloc
LocalFree
api-ms-win-security-base-l1-1-0
GetTokenInformation
kernel32
QueueUserWorkItem
UnregisterWaitEx
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE