_FfgdjhjfghghjlkfUJfkjfdjkgjkfjkgfJfkd@0
_GetClassInfoAGetClassInfoAGetClassInfoAGetClassInfoA@0
Static task
static1
Behavioral task
behavioral1
Sample
45090c8e872407670d11bb7909326c01.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45090c8e872407670d11bb7909326c01.exe
Resource
win10v2004-20231215-en
Target
45090c8e872407670d11bb7909326c01
Size
204KB
MD5
45090c8e872407670d11bb7909326c01
SHA1
dcc4f49ff536ac4b3c9fce06dce0acaba58457d1
SHA256
9b0af780e9af81064f0b42699ecbf16b21e154f8368e9583e41b9bd1778ee5b2
SHA512
4d6edb00816164a9e130f1cd40e16c6d068c1e694ddaa54ae1480a0ea5d77e75689731b2583a552bd4205a7e47e6ae135fa2f9c65e382afe1f30f976b7b0583e
SSDEEP
6144:ywrpszAB1DOhRWXLuCSJQcoHlX1Lc5ypoUa0I:RChRExSQxlX5OyCUa0I
Checks for missing Authenticode signature.
resource |
---|
45090c8e872407670d11bb7909326c01 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadIconA
GetDlgItemTextW
OemToCharA
ToUnicodeEx
LoadImageA
SwapMouseButton
DrawFocusRect
wsprintfW
CharUpperBuffA
RedrawWindow
DefFrameProcA
ReplyMessage
GetIconInfo
ScrollWindow
DefDlgProcW
CharLowerBuffW
CreateDialogParamW
CharPrevA
ChildWindowFromPoint
GetMessageW
IsCharUpperA
IsCharUpperW
MessageBoxW
lstrlenA
GetCPInfo
VirtualQuery
GlobalSize
ResumeThread
SetHandleCount
CreateFileMappingW
MulDiv
GetCurrentThread
GetTextColor
CreateHatchBrush
CreateICA
RestoreDC
CreateFontIndirectA
SetRectRgn
CreatePalette
GetViewportOrgEx
SetDIBitsToDevice
CreateICW
CreateDIBitmap
_FfgdjhjfghghjlkfUJfkjfdjkgjkfjkgfJfkd@0
_GetClassInfoAGetClassInfoAGetClassInfoAGetClassInfoA@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ