d:\Work\00.Project\00.Kies\ErrorReport\Source\Output\Release\ErrorReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d29141d2922bd488d3fe3d4697ab0b6524cdfbc996be957027bdba63342a52be.exe
Resource
win7-20240903-en
General
-
Target
d29141d2922bd488d3fe3d4697ab0b6524cdfbc996be957027bdba63342a52be
-
Size
124KB
-
MD5
63a7073302793e62fc5549dd6b4c01cb
-
SHA1
4669bbabb0a1c88ab43562a320ca7359ed823a30
-
SHA256
d29141d2922bd488d3fe3d4697ab0b6524cdfbc996be957027bdba63342a52be
-
SHA512
df398dfd3a9b4819aa2df21c4deb54752abed8e47e0921cf94c477f8277045b5322ca6cfee569a1767e341c041affd40f4300911f3b57a199bec9dda0b12649a
-
SSDEEP
1536:qSZ2lI7gFvjvQCfWjO/3SjeEbZgkBNFj/AOwZgkBNFj/AOnjfGCq2iW7z:zZ2a7mknO/36vmkXFymkXFdjGCH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d29141d2922bd488d3fe3d4697ab0b6524cdfbc996be957027bdba63342a52be
Files
-
d29141d2922bd488d3fe3d4697ab0b6524cdfbc996be957027bdba63342a52be.exe windows:5 windows x86 arch:x86
1e825d86d517a1a5475eaa3dde5d21a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedExchange
GetModuleHandleA
SetLastError
LoadLibraryA
UnmapViewOfFile
CloseHandle
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
MapViewOfFile
FreeLibrary
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
UnhandledExceptionFilter
GetLastError
IsDebuggerPresent
advapi32
RegCloseKey
user32
GetClientRect
IsIconic
GetSystemMetrics
DrawIcon
gdi32
GetStockObject
mfc90u
ord2106
ord3543
ord374
ord3515
ord4682
ord4910
ord3140
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord2891
ord6466
ord1728
ord4702
ord5154
ord3743
ord5653
ord4603
ord6800
ord5512
ord2074
ord5602
ord4664
ord1492
ord639
ord1751
ord1754
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5167
ord4631
ord5632
ord2057
ord4000
ord690
ord1556
ord2084
ord5734
ord2537
ord6114
ord5553
ord3071
ord1211
ord441
ord2479
ord4494
ord280
ord813
ord6579
ord811
ord2904
ord1486
ord5008
ord5182
ord744
ord524
ord2901
ord4741
ord4516
ord266
ord6703
ord3185
ord6760
ord4442
ord6311
ord290
ord1354
ord2593
ord2069
ord1108
ord4211
ord1220
ord296
ord286
ord935
ord600
ord265
ord909
ord2208
ord794
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord4348
ord4905
ord2774
ord2893
ord1183
ord3537
ord1137
ord5737
ord799
ord4681
ord3670
ord589
ord4967
ord4043
ord801
ord2764
ord4080
ord4081
ord4345
ord4071
ord5685
ord1272
msvcr90
__setusermatherr
__wargv
__argc
__CxxFrameHandler3
memcpy
_wtoi
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
memset
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
sprintf
_snwprintf
wcscpy
wcslen
_swprintf
wcsncat
strlen
comctl32
ord17
ws2_32
gethostname
gethostbyname
WSACleanup
WSAStartup
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�t���u* Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE