vLkpVOb@12
_AHNGD
_8z0yIB3Ik0@20
eRVM7E@20
Static task
static1
Behavioral task
behavioral1
Sample
3d16bde4e52ca6c53914708eef6606d6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d16bde4e52ca6c53914708eef6606d6.dll
Resource
win10v2004-20231215-en
Target
3d16bde4e52ca6c53914708eef6606d6
Size
177KB
MD5
3d16bde4e52ca6c53914708eef6606d6
SHA1
b31fe05e1c4be74697a00cefc90843937afafe4d
SHA256
79e0b217bc8adaa064de3086c044ad24ae7d51b4df120b7546538daa4635d9df
SHA512
c92a2ee916aa6808ca6ebf9029c0cceb726615fd9095db7bc864a39ab272c4577d4e880e392960e95ac0e186c883c9f3eed73271f699b2c2293e3c211202779c
SSDEEP
3072:AMq7vlFIFC2xxa0M1NkUuXD02/52kPzxz2W5B2QQaP6LkDNJ2S:AZvvIn2nkUL2/5zDQSf
Checks for missing Authenticode signature.
resource |
---|
3d16bde4e52ca6c53914708eef6606d6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFocus
GetWindowTextLengthA
IsCharUpperA
GetDlgItem
wsprintfA
GetSystemMetrics
GetSysColorBrush
GetDesktopWindow
CreateWindowExA
IsWindowEnabled
GetMenu
SafeArrayPtrOfIndex
SysReAllocStringLen
IsBadHugeReadPtr
FreeResource
LocalAlloc
lstrcpynA
LockResource
GetFullPathNameA
HeapDestroy
ExitProcess
VirtualAlloc
Sleep
GlobalFindAtomA
GetThreadLocale
LoadLibraryExA
GetTickCount
CompareStringA
GetCommandLineA
ResetEvent
HeapFree
GetStdHandle
lstrcatA
GetACP
GlobalAlloc
IsBadReadPtr
InitializeCriticalSection
SHFileOperationA
SHGetDesktopFolder
PathIsContentTypeA
SHQueryInfoKeyA
PathGetCharTypeA
SHStrDupA
SHEnumValueA
vLkpVOb@12
_AHNGD
_8z0yIB3Ik0@20
eRVM7E@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ