ggg
hhh
Static task
static1
Behavioral task
behavioral1
Sample
0c59eb12417cc13152df972b5740c42d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c59eb12417cc13152df972b5740c42d.dll
Resource
win10v2004-20231215-en
Target
0c59eb12417cc13152df972b5740c42d
Size
40KB
MD5
0c59eb12417cc13152df972b5740c42d
SHA1
271a9c202f5d5883f3ba28ae1b0de9928101cd85
SHA256
93e63f949dd11aa1022d1802bedfb9134ceb84c78034477375d4c725c88c8082
SHA512
78d68590f9cd7d96ea42a2f2f9d31e77a3d965df438f9c4212ea0eccaefc7dae8cec6936323b8fff6aed56644324a20ced6592160e8d8375da9d4e6d05d790af
SSDEEP
768:0bqDhnr1/wztyLB0+A1xKQ3OL04xOzkmA+I2Fl:0bsOtyLKbN4ZT2Fl
Checks for missing Authenticode signature.
resource |
---|
0c59eb12417cc13152df972b5740c42d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
ExitProcess
GetCurrentThreadId
Sleep
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
GetCurrentProcess
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
fopen
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
fclose
fread
ggg
hhh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ