JAyyeQlG
RiZymOFNHj
aCNofcClBP
anGAKJrj
cnuAdOWFh
Static task
static1
Behavioral task
behavioral1
Sample
58d5db88d1f5d1a16aa5d6ad2a603e48.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58d5db88d1f5d1a16aa5d6ad2a603e48.dll
Resource
win10v2004-20231222-en
Target
58d5db88d1f5d1a16aa5d6ad2a603e48
Size
38KB
MD5
58d5db88d1f5d1a16aa5d6ad2a603e48
SHA1
51d730f96ea579686923b55fcd70c94ec2c9c57c
SHA256
79f406af9161b997f9a2c77470098b5f1faf936453fdd683e50125327466b389
SHA512
cd66e63bf0cf2567ccfd05ea237f4fab8b409f884ca51afdacb69ce049d08eeaedd25a51490a5da5ad4235a7ad85723c17138dd66da5b63933a6ac1f6a0f2c5e
SSDEEP
768:AV58sHmf2sh2C6+2esbWNpy9B3yTRNgl/SWKbLH/0WXBmrIaxST:Aesgl6GsbW/yT/labrf9
Checks for missing Authenticode signature.
resource |
---|
58d5db88d1f5d1a16aa5d6ad2a603e48 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
FindAtomA
GetModuleFileNameA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
CreateThread
GetFileSize
lstrcmpA
GetLocaleInfoA
MoveFileExA
FreeLibrary
SystemTimeToFileTime
SetEvent
VirtualFree
GetWindowsDirectoryA
OpenProcess
GetVolumeInformationA
CreateEventA
GetSystemDirectoryA
lstrcmpiA
GetProcAddress
VirtualAlloc
GetLastError
WritePrivateProfileStringA
MoveFileA
GetModuleHandleA
GetCurrentThreadId
GetVersionExA
lstrcpyA
HeapAlloc
HeapFree
GetProcessHeap
ReadFile
VirtualProtectEx
GetTempFileNameA
DeleteFileA
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
lstrcatA
CreateProcessA
Sleep
WriteFile
GetTickCount
WaitForSingleObject
lstrcpynA
lstrlenA
CreateFileA
LoadLibraryA
ExitProcess
IsDebuggerPresent
SetThreadDesktop
CloseDesktop
OpenInputDesktop
GetThreadDesktop
FindWindowExA
CallNextHookEx
ClientToScreen
TranslateMessage
InflateRect
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
GetCursorPos
GetCaretPos
PostMessageA
DispatchMessageA
GetMessageA
GetWindowRect
RegisterClassExA
GetFocus
wsprintfA
EqualRect
IsWindowVisible
FindWindowA
LoadCursorA
GetWindowThreadProcessId
LoadIconA
CreateProcessAsUserA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumValueA
RegCloseKey
OpenProcessToken
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
JAyyeQlG
RiZymOFNHj
aCNofcClBP
anGAKJrj
cnuAdOWFh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ