Version
load
user
Fuck
Static task
static1
Behavioral task
behavioral1
Sample
983f7f89222d55a24d17533b9bc6795c03d1448e5a5a1fee4ab277dda8c85fcf.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
983f7f89222d55a24d17533b9bc6795c03d1448e5a5a1fee4ab277dda8c85fcf.dll
Resource
win10v2004-20230703-en
Target
983f7f89222d55a24d17533b9bc6795c03d1448e5a5a1fee4ab277dda8c85fcf
Size
254KB
MD5
c86d6114351da8d5acc640276fb87149
SHA1
139d109e9f36a3c77f9c89c4ccbccebc2d18fa39
SHA256
983f7f89222d55a24d17533b9bc6795c03d1448e5a5a1fee4ab277dda8c85fcf
SHA512
683011ce0db6c6c3a4799d5e91e82c20184242da82a92baa241e1b6cb58ebb54a3fe9e06d3b7fe30e7987d877d1e3689c18272b483d137cae45799bf193eff77
SSDEEP
6144:q+DoUPJUWJRHEwsqt7ztXkrjZ5wLXkVD9tTBedfy/1:q+DoAmiku7ztFLXkVD9tTI
Checks for missing Authenticode signature.
resource |
---|
983f7f89222d55a24d17533b9bc6795c03d1448e5a5a1fee4ab277dda8c85fcf |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
LoadLibraryW
GetProcAddress
CreateFileW
GetCurrentProcess
lstrcpyW
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
GetDriveTypeW
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
GetSystemInfo
FreeLibrary
GetModuleFileNameW
GetCommandLineW
GetStartupInfoW
CreateProcessW
ExitProcess
WideCharToMultiByte
CreateFileA
DeviceIoControl
QueryPerformanceFrequency
CreateEventW
SetEvent
ResetEvent
QueryPerformanceCounter
WaitForSingleObject
InterlockedExchange
WriteFile
ExpandEnvironmentStringsW
CopyFileW
GetFileAttributesW
GetConsoleWindow
FormatMessageW
SetLastError
VirtualProtect
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
CreateThread
GetFileSize
DeleteFileW
ReleaseMutex
SetFilePointer
RaiseException
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LocalFree
ReadFile
LCMapStringW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetModuleHandleW
lstrcmpW
GetTickCount
Sleep
lstrcatW
GetSystemDirectoryW
GetLocaleInfoW
GetLocalTime
GetCurrentProcessId
MultiByteToWideChar
lstrlenW
InterlockedDecrement
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
VirtualFree
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapCreate
HeapDestroy
CreateEventA
InitializeCriticalSection
CreateWaitableTimerW
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetStdHandle
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetCommandLineA
HeapReAlloc
ExitThread
EncodePointer
DecodePointer
TryEnterCriticalSection
CancelWaitableTimer
SetWaitableTimer
lstrlenA
UnmapViewOfFile
SwitchToThread
CreateFileMappingW
MapViewOfFileEx
InterlockedIncrement
GetForegroundWindow
GetMonitorInfoW
GetWindowTextW
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
GetLastInputInfo
SendMessageW
FindWindowA
GetWindowTextA
GetWindow
GetClassNameA
OpenWindowStationW
SetProcessWindowStation
IsWindow
EnumDisplayMonitors
wsprintfW
OpenProcessToken
RegSetValueExW
RegCreateKeyW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
LookupAccountSidW
GetTokenInformation
GetCurrentHwProfileW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyW
RegOpenKeyExA
SHGetFolderPathW
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
SysStringLen
SysAllocString
getsockname
WSAAddressToStringW
WSASetLastError
WSAStringToAddressW
closesocket
send
setsockopt
WSAIoctl
htons
ntohs
WSAGetLastError
inet_ntoa
gethostbyname
gethostname
freeaddrinfo
getaddrinfo
WSAStartup
WSAResetEvent
WSAEventSelect
WSACleanup
bind
connect
recv
WSACloseEvent
WSACreateEvent
socket
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
shutdown
StrChrW
StrPBrkW
PathIsDirectoryA
NetWkstaGetInfo
DirectInput8Create
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
Version
load
user
Fuck
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ