E:\r\b\PlayerCore\platform\windows\Release\Win32\TPThumbHD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4ba6007def5ae8804f0abb087fe47459f20ef6e0ab093130f97e2f49e2033de.exe
Resource
win7-20240708-en
General
-
Target
d4ba6007def5ae8804f0abb087fe47459f20ef6e0ab093130f97e2f49e2033de
-
Size
203KB
-
MD5
b1eb5fb1d94cee74c43c3591118c1662
-
SHA1
50e6b7ef358f56dc44f81099c3b71ac31dfc9ad4
-
SHA256
d4ba6007def5ae8804f0abb087fe47459f20ef6e0ab093130f97e2f49e2033de
-
SHA512
0fbf356b9aae08b6d1a11187b1149e841def63cc92af77fe8fcae49ff09096eabcfe62131a4f14a5d9321037424c6c621f33808a8dddc8f9fb182a9d4a079e2e
-
SSDEEP
3072:+9GEy/b+rtl7j9WkS2TVgBhYuTbpq8kmpk1c1b7UmDcAru:NCRj9Wr25iuuP8mpk1c1b7Uqc8u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4ba6007def5ae8804f0abb087fe47459f20ef6e0ab093130f97e2f49e2033de
Files
-
d4ba6007def5ae8804f0abb087fe47459f20ef6e0ab093130f97e2f49e2033de.exe windows:5 windows x86 arch:x86
9102947eb027d73ad3dd046d43d3fa02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
SizeofResource
GetCurrentProcess
GetStdHandle
WriteFile
TerminateProcess
GetModuleFileNameW
CreateMutexW
ReleaseMutex
MultiByteToWideChar
LockResource
CloseHandle
LoadLibraryW
FindResourceExW
LoadResource
FindResourceW
SetCurrentDirectoryW
GetProcAddress
GetCurrentProcessId
FindFirstFileW
FindNextFileW
FindClose
DeleteFileW
FileTimeToLocalFileTime
WideCharToMultiByte
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
InitializeSListHead
shell32
CommandLineToArgvW
shlwapi
PathFileExistsW
msvcp140
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
vcruntime140
memcpy
__std_exception_copy
memset
memmove
__std_exception_destroy
__std_terminate
__std_type_info_compare
_except_handler4_common
_CxxThrowException
wcsrchr
__CxxFrameHandler3
api-ms-win-crt-heap-l1-1-0
free
calloc
_callnewh
_set_new_mode
malloc
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_cexit
terminate
_seh_filter_exe
_set_app_type
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_register_onexit_function
_c_exit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_controlfp_s
_errno
_invalid_parameter_noinfo
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0
wmemcpy_s
wcsnlen
api-ms-win-crt-stdio-l1-1-0
_wfsopen
__stdio_common_vsprintf
fclose
fwrite
__p__commode
_set_fmode
ferror
fseek
ftell
fopen
fread
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-utility-l1-1-0
srand
rand
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE