getActiveDesktop
getSpecials
getSplit
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
0c64b04b060b7b4903e5f367fa453055.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c64b04b060b7b4903e5f367fa453055.dll
Resource
win10v2004-20231215-en
Target
0c64b04b060b7b4903e5f367fa453055
Size
16KB
MD5
0c64b04b060b7b4903e5f367fa453055
SHA1
cea5280664ed674480e59d66b1369e513e59eeaf
SHA256
cc9b8eea65a076b39ed48595015878c7a9eaf5b0611243f7f38f800980e08b46
SHA512
c738e6f91d13eb2781a1cc5472f867502c76372bf2bf6950f03b804ab5b71702410e8622b52b07c729724676f38db3d9b1fee019d799e862d02f9bff7f9db05f
SSDEEP
384:Li1wf/g8AYWPN6WxRLzx7XrzBTRDWrUq4uN8sCGWS4EWr:mG/g8ATI0Lt7XBUrUq4rH
Checks for missing Authenticode signature.
resource |
---|
0c64b04b060b7b4903e5f367fa453055 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetFileAttributesA
lstrcatA
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetTempPathA
CreateThread
CreateFileA
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
VirtualFree
GetSystemDirectoryA
VirtualAlloc
CreateFileMappingW
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MessageBoxA
CallNextHookEx
RtlFreeAnsiString
strstr
NtQueryInformationThread
NtClose
NtOpenProcess
RtlUnicodeStringToAnsiString
memset
memcpy
getActiveDesktop
getSpecials
getSplit
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ