hhh
iii
jklp
Static task
static1
Behavioral task
behavioral1
Sample
095e30d3b4accb31763da68b9ab3bb08.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
095e30d3b4accb31763da68b9ab3bb08.dll
Resource
win10v2004-20231222-en
Target
095e30d3b4accb31763da68b9ab3bb08
Size
40KB
MD5
095e30d3b4accb31763da68b9ab3bb08
SHA1
12355d9352341df3d51061952a13e00a992f2877
SHA256
6a9b2205044fccd048765713365b0e1ebf6bbfd3a869073352f1234d19b7ad69
SHA512
df96ce83b767ab3c7538a61112487709cd51abe78eb8287e3d10800b1ea7a8d6e05c9fb20c9fb0975d9ea2279283b6fe8aaa51af351ff55a0dfcc75affa60172
SSDEEP
768:6paaDH/1cQKCnUVVGi6XGNRFwlbZ6BnL+x+NZjwui:6pLNTWV8i6XZbZ2/Zj/i
Checks for missing Authenticode signature.
resource |
---|
095e30d3b4accb31763da68b9ab3bb08 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
ReadFile
ExitProcess
GetCurrentThreadId
GetCurrentProcess
WriteFile
DeleteFileA
VirtualProtectEx
VirtualProtect
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
_stricmp
_strupr
_strlwr
_strcmpi
_strnicmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
hhh
iii
jklp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ