ForIkikjOuq
NhyvgEo
BeGpaiZxakvQpbzsNns
XaplsiBbfbjWcjesRj
QgBhubDgpa
Static task
static1
Behavioral task
behavioral1
Sample
051b326fb9e5962e23d5c3cccf64c29a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
051b326fb9e5962e23d5c3cccf64c29a.exe
Resource
win10v2004-20231215-en
Target
051b326fb9e5962e23d5c3cccf64c29a
Size
86KB
MD5
051b326fb9e5962e23d5c3cccf64c29a
SHA1
a81c1ce6a9af757e232a0c677c5899259a9208ca
SHA256
326f2eea627e7a467d0bd1751c40b4a386b92ea5488cb34e11deecf3e39112b3
SHA512
d354a1f6b103c2ad95dd7744225818d1de13dd06216ffe65493076b360a6890bb4e741d992a658601f48f0e8c993af7e2e909530391ef7599e476abd88841160
SSDEEP
1536:ypk16dBd71jxPkYUYtlpaTeMm4O69k8le/W7BAC6orqDRgZU+SL:yfRVJUUpayh4O64cBv6orU
Checks for missing Authenticode signature.
resource |
---|
051b326fb9e5962e23d5c3cccf64c29a |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
LoadLibraryA
GetVolumeInformationA
GetFileAttributesW
VirtualProtect
GetModuleHandleA
GetLastError
HeapFree
CompareStringW
GetLogicalDriveStringsW
GetVolumePathNameA
SetEnvironmentVariableW
VirtualFree
GetSystemWindowsDirectoryW
ExitProcess
GetFileAttributesA
VirtualAlloc
getenv
rand
_strnicmp
__threadid
memcpy
is_wctype
__setlc_active
wcscoll
frexp
srand
__isascii
LoadCursorW
MonitorFromWindow
SetClassLongW
IsWindowEnabled
SetCursor
LoadIconW
EnumDesktopWindows
GetDlgItemInt
RemoveMenu
SetDlgItemTextW
AppendMenuW
mciSendCommandA
waveInGetNumDevs
mciGetErrorStringA
midiOutLongMsg
midiOutGetID
midiStreamStop
midiStreamOut
midiStreamRestart
mmioRenameA
DrvGetModuleHandle
ForIkikjOuq
NhyvgEo
BeGpaiZxakvQpbzsNns
XaplsiBbfbjWcjesRj
QgBhubDgpa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ