?FromHex@@YAEE@Z
?ToHex@@YAEE@Z
?UrlDecode@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
?UrlEncode@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
Static task
static1
Behavioral task
behavioral1
Sample
e4262d8c8b98e06e3ddad34e7a2e4f8b9143982c268a386f35b00fe391a747de.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e4262d8c8b98e06e3ddad34e7a2e4f8b9143982c268a386f35b00fe391a747de.exe
Resource
win10v2004-20230915-en
Target
e4262d8c8b98e06e3ddad34e7a2e4f8b9143982c268a386f35b00fe391a747de
Size
4.8MB
MD5
ca665dc8e1b9ebcfd67b851a6cb21399
SHA1
65ba5472c0dada30f816852cae7dd4625e098964
SHA256
e4262d8c8b98e06e3ddad34e7a2e4f8b9143982c268a386f35b00fe391a747de
SHA512
d3c551ffadcd1905014bac70c0f010d00b9d11cc9f83ced2e27032222f5763d7abb907ee42fdcf43fecda2367345252e735e7b989c2263bfcb0dfa4a76fe3e11
SSDEEP
49152:nW+AGPnJ0atdyEZY22UtupqR+n7PnjT6NvQ7TVMPKHNG1N4vVGddP4a73bW:WTGPn+sysECupqR+jaG2PKHs3mGdd
Checks for missing Authenticode signature.
resource |
---|
e4262d8c8b98e06e3ddad34e7a2e4f8b9143982c268a386f35b00fe391a747de |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ResumeThread
FindFirstFileA
RtlCaptureStackBackTrace
lstrcmpW
GetProcAddress
GetModuleHandleW
ExitProcess
CreateMutexW
GetShortPathNameW
LoadLibraryW
SetEndOfFile
GetModuleFileNameW
GetNativeSystemInfo
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
GetTimeZoneInformation
FlushFileBuffers
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetFullPathNameA
lstrcpyW
FreeLibrary
GetVersionExW
GetSystemInfo
OpenProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
Sleep
GetLastError
CloseHandle
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
CreateDirectoryW
GetFileAttributesExW
HeapQueryInformation
HeapSize
HeapReAlloc
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
OutputDebugStringA
GetConsoleCP
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetConsoleMode
SetConsoleCtrlHandler
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
CreateFileW
SetFilePointerEx
GetACP
ExitThread
HeapValidate
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameA
RtlUnwind
WaitForSingleObject
WaitForMultipleObjectsEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
SetProcessAffinityMask
VirtualProtect
VirtualFree
VirtualAlloc
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
FormatMessageW
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
IsDebuggerPresent
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
InitializeSListHead
GetTickCount64
InitializeCriticalSectionEx
SleepEx
FormatMessageA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerSetConditionMask
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WriteFile
GlobalMemoryStatus
FlushConsoleInputBuffer
GetSystemTime
SystemTimeToFileTime
CreateTimerQueue
SignalObjectAndWait
GetDlgItem
EnableMenuItem
GetSystemMenu
EnableWindow
SetDlgItemTextW
EndDialog
DialogBoxParamW
wsprintfW
PostMessageW
CharLowerBuffW
GetActiveWindow
GetSystemMetrics
GetWindowRect
MessageBoxW
GetWindowThreadProcessId
DefWindowProcW
ReleaseDC
GetDC
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
PostQuitMessage
RegisterClassExW
CreateWindowExW
DestroyWindow
ShowWindow
MoveWindow
SetWindowPos
GetWindowRgn
GetWindowLongW
SetWindowLongW
GetParent
LoadCursorW
SendDlgItemMessageW
SelectObject
PtInRegion
DeleteObject
DeleteDC
CreateRectRgn
CreateCompatibleDC
CreateDIBSection
CreateCompatibleBitmap
GetDeviceCaps
GetDIBits
GetObjectA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
RegSetValueExW
DeregisterEventSource
RegisterEventSourceA
ReportEventA
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderPathW
CoCreateGuid
DestroyEnvironmentBlock
CreateEnvironmentBlock
StrCpyW
PathFileExistsW
PathIsDirectoryW
StrCmpW
ntohs
gethostbyname
WSAStartup
WSACleanup
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
recv
send
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
getservbyname
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
gethostname
shutdown
htonl
ntohl
ord60
ord211
ord46
ord41
ord50
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord143
?FromHex@@YAEE@Z
?ToHex@@YAEE@Z
?UrlDecode@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
?UrlEncode@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@ABV12@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ