ExecuteBang
Finalize
GetString
Initialize
Reload
Update
Static task
static1
Behavioral task
behavioral1
Sample
71865164f0c0027392069a0d0cf65dbcdf1ab199b96f28a72ee9584608bc495a.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
71865164f0c0027392069a0d0cf65dbcdf1ab199b96f28a72ee9584608bc495a.dll
Resource
win10v2004-20230703-en
Target
71865164f0c0027392069a0d0cf65dbcdf1ab199b96f28a72ee9584608bc495a
Size
159KB
MD5
301a18f5cc09d3e16770b7a3171dade8
SHA1
42346261c2f0688e87d6fb83d332020fc3385ba2
SHA256
71865164f0c0027392069a0d0cf65dbcdf1ab199b96f28a72ee9584608bc495a
SHA512
d52de0df9e50137b83e67085d59ab349e4b71bde6778592601e2eb5ac77ab534c9f039de673bcea4b6f3588df2bf12f5b4d3aa75d3886626e0774559d87b55af
SSDEEP
3072:Ojtr8cM74wb3jXhDLlfQzG2qAMcfp8Ks75pIcogZClZdBeWEZuu:frjlflIzG2JjfuKqDMgZMZbt4
Checks for missing Authenticode signature.
resource |
---|
71865164f0c0027392069a0d0cf65dbcdf1ab199b96f28a72ee9584608bc495a |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
RmExecute
RmReplaceVariables
RmLog
RmLogF
RmReadString
RmReadFormula
RmGet
RmPathToAbsolute
ReadConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
ReadFile
GetCurrentProcess
WriteFile
GetModuleHandleExW
TerminateProcess
CreatePipe
PeekNamedPipe
WaitForSingleObject
FreeLibraryAndExitThread
DuplicateHandle
DisableThreadLibraryCalls
CloseHandle
CreateProcessW
GetExitCodeProcess
SetStdHandle
CreateFileW
GetStringTypeW
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
WriteConsoleW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
CreateThread
ExitThread
ExitProcess
GetModuleFileNameW
HeapFree
HeapAlloc
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
PostMessageW
GetWindowThreadProcessId
EnumWindows
ExecuteBang
Finalize
GetString
Initialize
Reload
Update
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ