x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
066ff33c142c9b54999b2275251508d0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
066ff33c142c9b54999b2275251508d0.dll
Resource
win10v2004-20231215-en
Target
066ff33c142c9b54999b2275251508d0
Size
26KB
MD5
066ff33c142c9b54999b2275251508d0
SHA1
768d74b67dbaf6fdce81894574ca57d729dc4e98
SHA256
715a2e15065e15b2c7d32174037783d9ccb88b8c312c288f19c25b3181533d8f
SHA512
b73fff91ac2fae4e46bf17a5fcebc80ee4997656050a32ef377dac3fb6c268ede0bab95ba1ba79663c7de335a9c6337bd810bc81a4fa2d1a9e745c7930552b97
SSDEEP
384:Bm+9NhmdHTcqKa16zKKjoVNx+KvUd4sy2zgDUEM/xCJMA6yOxS9G5GVL:B/4dOagGKjoTxVUEMJCJMoWQO+
Checks for missing Authenticode signature.
resource |
---|
066ff33c142c9b54999b2275251508d0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
MulDiv
GetTickCount
WriteFile
ReadFile
CreateFileA
DeleteFileA
CreateEventA
lstrcmpA
SetFilePointer
HeapReAlloc
GetModuleFileNameA
InterlockedExchange
RtlUnwind
HeapFree
GetProcessHeap
HeapAlloc
GetStdHandle
CreateMutexW
WinExec
CreateMutexA
lstrlenA
CreateProcessA
VirtualQuery
CloseHandle
GlobalAlloc
lstrcpynA
lstrcpyA
lstrcatA
GlobalFree
GetLastError
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
RegisterWindowMessageA
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
CreateWindowExW
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetSetFilePointer
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ