Fuck
Py_Main
Static task
static1
Behavioral task
behavioral1
Sample
4af849c34aa48cbd18a13b1e8f94c9d69628d13f0165d762f30521d7e2fdb148.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4af849c34aa48cbd18a13b1e8f94c9d69628d13f0165d762f30521d7e2fdb148.dll
Resource
win10v2004-20231023-en
Target
4af849c34aa48cbd18a13b1e8f94c9d69628d13f0165d762f30521d7e2fdb148
Size
328KB
MD5
e2eb1297e685226657d34bd3b31a1b1f
SHA1
ae219ad01e548c42446d0560df7100ee5781a83e
SHA256
4af849c34aa48cbd18a13b1e8f94c9d69628d13f0165d762f30521d7e2fdb148
SHA512
f234b3ff198b5a8bfe214c3d4a8dae20e141878beab1b1686465b9d1a891177d29c44f65377c80912ae8f91dc084b3f75ee7ca7f25047f0ca498c7c3ac9223bb
SSDEEP
6144:E2qcthXGQ+88YaBi3KGkQowp43KTM0vcMGo+:E2jvXGP88YaBiRkQowp4aTM0v5+
Checks for missing Authenticode signature.
resource |
---|
4af849c34aa48cbd18a13b1e8f94c9d69628d13f0165d762f30521d7e2fdb148 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord800
ord641
ord860
ord540
ord324
ord825
ord2370
ord4234
ord4853
ord1994
ord635
ord1978
ord2721
ord2818
ord5181
ord317
ord5192
ord1200
ord6334
ord775
ord535
ord4224
ord858
ord924
ord926
ord503
ord616
ord2411
ord2023
ord4218
ord2578
ord6055
ord1776
ord4398
ord5290
ord3402
ord4424
ord3582
ord567
ord6640
ord2299
ord2302
ord922
ord537
ord2820
ord3169
ord3811
ord551
ord795
ord3721
ord6215
ord4055
ord3092
ord6508
ord6741
ord2582
ord4402
ord3370
ord3640
ord693
ord3996
ord3301
ord6907
ord4099
ord3998
ord1911
ord3316
ord3314
ord5242
ord6121
ord1774
ord2490
ord5010
ord5658
ord2395
ord6322
ord2609
ord1006
ord1787
ord6123
ord4291
ord1261
ord5708
ord6502
ord6740
ord6784
ord5572
ord2915
ord6649
ord2764
ord609
ord2575
ord4396
ord3574
ord2301
ord2645
ord1979
ord5442
ord823
ord3318
ord665
ord5186
ord354
ord2379
ord4129
ord5683
ord2642
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord807
ord674
ord529
ord554
ord366
ord796
ord2494
ord2627
ord5280
ord6000
ord2117
ord6625
ord4457
ord4163
ord2124
ord4413
ord1841
ord4589
ord4588
ord4899
ord4370
ord4892
ord4533
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord5260
ord2091
ord4432
ord364
ord784
ord4241
ord4720
ord6270
ord4220
ord2584
ord3654
ord3663
ord2438
ord2863
ord1644
ord1146
ord4277
ord6662
ord4278
ord2763
ord6905
ord4243
ord801
ord6143
ord541
ord6696
ord941
ord6678
ord4615
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord6467
ord6199
ord617
ord5301
ord5214
ord296
ord986
ord520
ord4159
ord6117
ord2621
ord2919
ord1134
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4858
ord2399
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord338
ord652
ord4823
ord4614
ord4613
ord1945
ord4273
ord4341
ord4349
ord4723
ord4890
ord4964
ord4961
ord1726
ord560
ord813
ord2535
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4376
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord5252
ord3798
ord2626
ord5265
ord1116
?terminate@@YAXXZ
_except_handler3
_onexit
__CxxFrameHandler
_mbscmp
__dllonexit
sprintf
exit
sscanf
wcstombs
strtol
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_ftol
strlen
atof
memcpy
memset
realloc
mbstowcs
_wcsnicmp
free
strcmp
malloc
qsort
bsearch
LocalFree
ExitProcess
lstrlenA
GetThreadLocale
IsBadReadPtr
FreeLibrary
LoadLibraryA
GetProcAddress
GetModuleFileNameA
GetFileAttributesA
LocalAlloc
LoadMenuA
UpdateWindow
SendMessageA
EnableWindow
GetSubMenu
GetCursorPos
DeleteDC
StartDocA
StartPage
TextOutA
GetDeviceCaps
GetTextMetricsA
EndDoc
EndPage
PrintDlgA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Fuck
Py_Main
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ