Version
load
user
Fuck
Static task
static1
Behavioral task
behavioral1
Sample
1efd9aba90f1d11002980d8c147e7ce1d81c9f6643afff114ec87fd1c7ae623f.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1efd9aba90f1d11002980d8c147e7ce1d81c9f6643afff114ec87fd1c7ae623f.dll
Resource
win10v2004-20230915-en
Target
1efd9aba90f1d11002980d8c147e7ce1d81c9f6643afff114ec87fd1c7ae623f
Size
264KB
MD5
2c2dbd743174f20ee38736f9e0dc74f4
SHA1
c0455c33c07c9ee623577d3165929d63b6b5b25b
SHA256
1efd9aba90f1d11002980d8c147e7ce1d81c9f6643afff114ec87fd1c7ae623f
SHA512
3d9038e69f4bb78ccc9735788843b175184232ee5e36df23b25139dd97a067752a0893079cfea785facfbbbab5a621333baa9b020808164e8a52b877fec5f8df
SSDEEP
6144:s+6JQb9gAnPtYCmwafB3hbr6xp4JMQgU9HTBSdzyL+DS:s+6u+AP6otxp4JpJ9HTs
Checks for missing Authenticode signature.
resource |
---|
1efd9aba90f1d11002980d8c147e7ce1d81c9f6643afff114ec87fd1c7ae623f |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
LoadLibraryW
GetProcAddress
CreateFileW
GetCurrentProcess
lstrcpyW
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
GetDriveTypeW
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
GetSystemInfo
FreeLibrary
GetModuleFileNameW
GetCommandLineW
GetStartupInfoW
CreateProcessW
ExitProcess
WideCharToMultiByte
CreateFileA
DeviceIoControl
QueryPerformanceFrequency
CreateEventW
SetEvent
ResetEvent
QueryPerformanceCounter
WaitForSingleObject
InterlockedExchange
WriteFile
ExpandEnvironmentStringsW
CopyFileW
GetFileAttributesW
GetConsoleWindow
FormatMessageW
SetLastError
VirtualProtect
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
CreateThread
GetFileSize
DeleteFileW
ReleaseMutex
SetFilePointer
RaiseException
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LocalFree
ReadFile
LCMapStringW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetModuleHandleW
lstrcmpW
GetTickCount
Sleep
lstrcatW
GetSystemDirectoryW
GetLocaleInfoW
GetLocalTime
GetCurrentProcessId
MultiByteToWideChar
lstrlenW
InterlockedDecrement
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
VirtualFree
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapCreate
HeapDestroy
CreateEventA
InitializeCriticalSection
CreateWaitableTimerW
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetStdHandle
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetCommandLineA
HeapReAlloc
ExitThread
EncodePointer
DecodePointer
TryEnterCriticalSection
CancelWaitableTimer
SetWaitableTimer
lstrlenA
UnmapViewOfFile
SwitchToThread
CreateFileMappingW
MapViewOfFileEx
InterlockedIncrement
GetForegroundWindow
GetMonitorInfoW
GetWindowTextW
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
GetLastInputInfo
SendMessageW
FindWindowA
GetWindowTextA
GetWindow
GetClassNameA
OpenWindowStationW
SetProcessWindowStation
IsWindow
EnumDisplayMonitors
wsprintfW
OpenProcessToken
RegSetValueExW
RegCreateKeyW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
LookupAccountSidW
GetTokenInformation
GetCurrentHwProfileW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyW
RegOpenKeyExA
SHGetFolderPathW
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
SysStringLen
SysAllocString
getsockname
WSAAddressToStringW
WSASetLastError
WSAStringToAddressW
closesocket
send
setsockopt
WSAIoctl
htons
ntohs
WSAGetLastError
inet_ntoa
gethostbyname
gethostname
freeaddrinfo
getaddrinfo
WSAStartup
WSAResetEvent
WSAEventSelect
WSACleanup
bind
connect
recv
WSACloseEvent
WSACreateEvent
socket
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
shutdown
StrChrW
StrPBrkW
PathIsDirectoryA
NetWkstaGetInfo
DirectInput8Create
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
Version
load
user
Fuck
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ