C:\Users\admin\pngquant\target\release\deps\pngquant.pdb
Static task
static1
Behavioral task
behavioral1
Sample
52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8.exe
Resource
win10v2004-20241007-en
General
-
Target
52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8
-
Size
1.3MB
-
MD5
7c9eb45067a52f4d7953d26c01f3abd0
-
SHA1
d35e99e5d37bd86c654df3e6634c555b8eec5493
-
SHA256
52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8
-
SHA512
2049d0057d8feb8b56b72f18ffe3d6ddd985745a2ee0cf385370c9cd0329ae82e530774eb1612e238d3b3a848220319c80bfa7546bca985921c5c060fb0dee03
-
SSDEEP
24576:98CtRRjtvs4RaUfIu2Hm5Lg9uP1+74/LgHmPr9qvZqhLanLTLzLfqeqwLJPEtz+S:9pvt0RUQREtz+YTi/6Sdz3O5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8
Files
-
52e3631a6c6f19f7d757298770a948e3ebf1e9d09f2a324541e8b24a4b6f9da8.exe windows:6 windows x64 arch:x64
b00b18c010e836879a588fd088afbcb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapAlloc
GetCommandLineW
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetLastError
HeapReAlloc
FindFirstFileW
FindClose
FindNextFileW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsSetValue
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
SetLastError
GetEnvironmentVariableW
ReleaseSRWLockShared
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
ReleaseMutex
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
CloseHandle
GetStdHandle
GetConsoleMode
WriteFile
WriteConsoleW
TlsAlloc
GetModuleHandleW
FormatMessageW
InitializeCriticalSection
ExitProcess
TryEnterCriticalSection
CreateFileW
GetFileInformationByHandle
DeviceIoControl
DeleteCriticalSection
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
ws2_32
WSACleanup
vcruntime140
__current_exception
__current_exception_context
_CxxThrowException
__C_specific_handler
__intrinsic_setjmp
longjmp
__CxxFrameHandler3
memcmp
memcpy
memset
memmove
strrchr
api-ms-win-crt-string-l1-1-0
strncpy
strncmp
strlen
api-ms-win-crt-stdio-l1-1-0
__p__commode
fclose
fopen
_setmode
fputs
__stdio_common_vfprintf
__stdio_common_vsprintf
ftell
fseek
_set_fmode
fread
__acrt_iob_func
fflush
fwrite
api-ms-win-crt-filesystem-l1-1-0
remove
rename
_unlink
api-ms-win-crt-heap-l1-1-0
_set_new_mode
realloc
malloc
free
api-ms-win-crt-locale-l1-1-0
setlocale
_configthreadlocale
api-ms-win-crt-math-l1-1-0
floor
log
exp
sqrt
log10
pow
_fdclass
ceil
sqrtf
__setusermatherr
powf
_dclass
api-ms-win-crt-runtime-l1-1-0
_wassert
_seh_filter_exe
_set_app_type
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_crt_atexit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
terminate
abort
_initialize_onexit_table
_register_onexit_function
api-ms-win-crt-time-l1-1-0
_time64
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
Sections
.text Size: 533KB - Virtual size: 533KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE