?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
Static task
static1
Behavioral task
behavioral1
Sample
0f3ef40706908c43062909b5b1f04c80.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f3ef40706908c43062909b5b1f04c80.dll
Resource
win10v2004-20231222-en
Target
0f3ef40706908c43062909b5b1f04c80
Size
63KB
MD5
0f3ef40706908c43062909b5b1f04c80
SHA1
e23553bc92d3a833dd55352bbbc21811e660c9f9
SHA256
a7bd5d8d5430ebaf25850622b82e9961befa75f7ae4c6346d5199795a3beedfe
SHA512
2f5ca65dc51d7363749c93c04708e87ab823c40ad14dbc5aea5f167d0796590225a0258f14097a70d1795ad605af5a3fb513729641123bfd1336e3bdfde9b54a
SSDEEP
1536:Vao7pu3Ils9556Z+P2ahDRyKcbFF2YVjh:Jpu95t2ahYKcbFQYVjh
Checks for missing Authenticode signature.
resource |
---|
0f3ef40706908c43062909b5b1f04c80 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnmapViewOfFile
FlushViewOfFile
GetTickCount
GetTempPathA
ResetEvent
WaitForMultipleObjects
SetEvent
OpenEventA
CreateEventA
HeapFree
GetProcessHeap
HeapAlloc
VirtualFreeEx
GetExitCodeThread
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
OpenProcess
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
CreateFileMappingA
Process32First
Process32Next
LoadLibraryA
FreeLibrary
ReadFile
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
FileTimeToSystemTime
GetFileInformationByHandle
SystemTimeToFileTime
GetLocalTime
RaiseException
InterlockedExchange
LocalAlloc
MapViewOfFile
GetCurrentProcessId
ExitProcess
OpenFileMappingA
GetFileAttributesA
WaitForSingleObject
GlobalUnlock
GlobalLock
CreateThread
GetSystemDirectoryA
GetComputerNameA
CreateFileA
GetLastError
Sleep
GetFileSize
WriteFile
SetFilePointer
SetEndOfFile
CloseHandle
GetModuleFileNameA
CreateToolhelp32Snapshot
WideCharToMultiByte
connect
socket
inet_addr
gethostbyname
htons
send
recv
inet_ntoa
WSAIoctl
WSASocketA
gethostname
WSAStartup
WSAGetLastError
WSACleanup
closesocket
SetWindowPos
SystemParametersInfoA
EndPaint
ReleaseDC
DrawTextA
BeginPaint
GetClientRect
CloseClipboard
GetWindowTextA
OpenClipboard
SendMessageA
DefWindowProcA
RegisterClassA
SetWindowLongA
CallWindowProcA
GetWindowLongA
EnumChildWindows
FindWindowA
CallNextHookEx
GetKeyState
ToAscii
GetKeyboardState
GetKeyNameTextA
GetDesktopWindow
GetSystemMetrics
GetForegroundWindow
UnhookWindowsHookEx
CreateWindowExA
SetClipboardViewer
SetWindowsHookExA
PeekMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
LoadIconA
GetParent
ShowWindow
UpdateWindow
GetClassNameA
LoadCursorA
GetClipboardData
SetSecurityDescriptorDacl
GetUserNameA
CreateProcessAsUserA
FreeSid
InitializeAcl
AllocateAndInitializeSid
GetLengthSid
IsValidSid
AddAccessAllowedAce
RegQueryValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
InitializeSecurityDescriptor
CreateFontIndirectA
SelectObject
SetTextColor
SetBkMode
ExtTextOutA
SetBkColor
DeleteObject
_mbsrchr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
wcstombs
fseek
ftell
malloc
realloc
free
atoi
isalpha
_CxxThrowException
_mbsstr
strftime
_mbsicmp
localtime
_mbsnbcpy
difftime
_ftol
srand
rand
time
strstr
_mbsnbcmp
sprintf
_mbscmp
strcat
_mbsrev
fopen
fclose
fread
fwrite
__CxxFrameHandler
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
memcpy
strlen
strcpy
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ