__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
fe00acc93b6da3b4836a8d3a5c29e7709742eaac0cd1ac9c4b769696da79d835N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe00acc93b6da3b4836a8d3a5c29e7709742eaac0cd1ac9c4b769696da79d835N.exe
Resource
win10v2004-20240802-en
Target
fe00acc93b6da3b4836a8d3a5c29e7709742eaac0cd1ac9c4b769696da79d835N
Size
964KB
MD5
929688d09ad827590b80c0c6c5d71750
SHA1
038dee86a21cc8e84a14c5c9e3182e50bd839109
SHA256
fe00acc93b6da3b4836a8d3a5c29e7709742eaac0cd1ac9c4b769696da79d835
SHA512
a141cfe7fff723491908dbb7c5eb3f0877e319a4d43f98832cd9699f7b304f0d8c5f641d82c35eff2b044450e56a5ee6dcdc87b55d942cd1883a9d47fdc1a4df
SSDEEP
12288:83ULO2IiSXJ8VRb51+AXUuDcIAq/sKUGNlP5DU4yuA6AEKXyCAez977D3HHN4Rv+:usO2mcl1+qcxKbDCEKXyi7nqCy8Qk
Checks for missing Authenticode signature.
resource |
---|
fe00acc93b6da3b4836a8d3a5c29e7709742eaac0cd1ac9c4b769696da79d835N |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
BeginUpdateResourceA
CloseHandle
CompareStringA
CopyFileA
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DebugBreak
DeleteCriticalSection
DeleteFileA
EndUpdateResourceA
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushInstructionCache
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTimeZoneInformation
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
Process32First
Process32Next
RaiseException
ReadFile
ReleaseMutex
ResetEvent
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetThreadPriority
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UpdateResourceA
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
CharNextA
EnumThreadWindows
GetClientRect
GetDesktopWindow
GetKeyboardType
GetSystemMetrics
LoadStringA
MessageBoxA
SetCursorPos
wsprintfA
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ