PZAlloc
PZCalculate
PZCorrection
PZFree
PZHistogram
PZInitImageConversion
PZTerminateImageConversion
Static task
static1
Behavioral task
behavioral1
Sample
eea8952f5ba2f57b3e63c81be4aa7f688250112a6381e7855f5cd350042d093eN.dll
Resource
win7-20241023-en
Target
eea8952f5ba2f57b3e63c81be4aa7f688250112a6381e7855f5cd350042d093eN.exe
Size
384KB
MD5
5c751ecc09495da7a7e8c9dfe6438b40
SHA1
0a25094712a1f0e7e8f973a623e70f01b564e2e7
SHA256
eea8952f5ba2f57b3e63c81be4aa7f688250112a6381e7855f5cd350042d093e
SHA512
5222e3fa7b46c332ca262338ac26f63520d6fe7f5d99d8da5ae37c5d4287350acf068f1f706f65b999b7b82cdf9f7c9b9bb9a1149625666a2f7c9d845d9fa431
SSDEEP
6144:b4HAARhdwUeKPQrs3nz33Eov9XDJgNAfqqRO:b4gARhdfe/2nz33Evys
Checks for missing Authenticode signature.
resource |
---|
eea8952f5ba2f57b3e63c81be4aa7f688250112a6381e7855f5cd350042d093eN.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStdHandle
HeapAlloc
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetProcAddress
RaiseException
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
HeapFree
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
PZAlloc
PZCalculate
PZCorrection
PZFree
PZHistogram
PZInitImageConversion
PZTerminateImageConversion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE