HmArOYaJ
HwjddBC
RngOnU
TIYdrj
jrtaBMw
Static task
static1
Behavioral task
behavioral1
Sample
1154590dcb8ccaafaa10e618872c5b8c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1154590dcb8ccaafaa10e618872c5b8c.dll
Resource
win10v2004-20231215-en
Target
1154590dcb8ccaafaa10e618872c5b8c
Size
71KB
MD5
1154590dcb8ccaafaa10e618872c5b8c
SHA1
ee7885dffd62ae2fd5da0088aec015a9207e059d
SHA256
762dbb1849b47133e7da37a1c01edf1ada8b748cb176f6f2c795d006d687833a
SHA512
6209f6f2849733d0cf35fbc7d82859101f5871849c57fe7cc0d2dd885f80bc6f4eac80e8f36c1e1b83e34eef21bda981cc5c74ae1fa05b5a1fb31e090ef01dd5
SSDEEP
1536:VmFaItYoDeoPJWmnsJeMo9RCjXCgymAFnFI:CZsJnYuizG
Checks for missing Authenticode signature.
resource |
---|
1154590dcb8ccaafaa10e618872c5b8c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
malloc
free
_XcptFilter
_initterm
_amsg_exit
_except_handler3
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
InterlockedExchange
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetLastError
CreateMutexA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
lstrcpyA
GetProcessHeap
FindAtomA
HeapFree
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
GetTempFileNameA
wsprintfA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
InflateRect
GetFocus
IsWindowVisible
EqualRect
ClientToScreen
GetWindowRect
GetCursorPos
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteValueA
SHGetValueA
SHSetValueA
SHDeleteKeyA
GetBkColor
GetBkMode
HmArOYaJ
HwjddBC
RngOnU
TIYdrj
jrtaBMw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ