Elv
Kdj
Lfy
Pcb
Skn
Vsz
Xlm
Zjd
Static task
static1
Behavioral task
behavioral1
Sample
4d0871608fedfe7270b6f79764f0a2ae.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d0871608fedfe7270b6f79764f0a2ae.dll
Resource
win10v2004-20231215-en
Target
4d0871608fedfe7270b6f79764f0a2ae
Size
108KB
MD5
4d0871608fedfe7270b6f79764f0a2ae
SHA1
79615e260bd108b9fdf71acba22bca3bfcea3d9a
SHA256
e470c170070de660d0b5c47b195a9dd1056939ad371a9a617ce530cd050689b1
SHA512
aab2b644145ab8bdf541efe60c15a1b92b8e15ac84103d9fb54abc0b381345adb2760f53400c900c66382a326a4191b1b7bb27654ded9443753cff2f59fb780d
SSDEEP
3072:RRi0Ii9K2ZQsIBwD6/ENFc/AlKSKMMiU1m9:XnZjCRs6WKSKNP
Checks for missing Authenticode signature.
resource |
---|
4d0871608fedfe7270b6f79764f0a2ae |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VariantClear
VariantCopyInd
LoadTypeLib
SysAllocStringLen
InitializeSecurityDescriptor
ControlService
OpenProcessToken
OpenServiceA
QueryServiceStatus
StartServiceA
CloseServiceHandle
CLSIDFromString
CoCreateGuid
CoGetClassObject
ReleaseStgMedium
OleIsCurrentClipboard
OleFlushClipboard
CreateDataAdviseHolder
CoUninitialize
CoTaskMemRealloc
CoLockObjectExternal
CoGetMalloc
LoadCursorFromFileA
GetCursor
DrawTextA
CopyImage
CharToOemBuffA
wsprintfA
LoadMenuA
SHFileOperationA
SHGetFileInfoA
SHBindToParent
PathFileExistsA
PathFindExtensionA
PathIsRelativeA
PathQuoteSpacesA
PathCompactPathExA
vsprintf
__dllonexit
strchr
fflush
free
malloc
memcpy
rand
time
realloc
sscanf
strstr
strtol
sprintf
CompareStringA
EnumResourceLanguagesA
EnumResourceTypesA
ExitThread
GetCommandLineA
GetOEMCP
GetPrivateProfileStringA
InitializeCriticalSection
SetEndOfFile
SleepEx
TlsSetValue
lstrcatA
lstrcmpiA
lstrcpynA
lstrlenA
Elv
Kdj
Lfy
Pcb
Skn
Vsz
Xlm
Zjd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ