TGoInst
TGoRun
TGoShutdown
TGoStartup
TGoTest
Static task
static1
Behavioral task
behavioral1
Sample
10536cb62dbd4aad1fb8ef42d5da92cd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10536cb62dbd4aad1fb8ef42d5da92cd.dll
Resource
win10v2004-20231215-en
Target
10536cb62dbd4aad1fb8ef42d5da92cd
Size
32KB
MD5
10536cb62dbd4aad1fb8ef42d5da92cd
SHA1
dc52fc04faaf1a7a362036dd8003472de453ecdf
SHA256
2d7132a5e939e3bd1556ab09f9e8ddcc362368eaad7a74dac1fd21c16e23fefd
SHA512
9a64e6f30b4ffa79d6ea3e3bb11820d1591b4cf1cb5965c559a5aa5f331f16d85ffd14d2d6490f4bd47f5b44d855517ce9b6e24a588a4fbc6badb0f3b377d5d6
SSDEEP
768:wjAw0bVUM62X/OwfAU7z9/76opipxBONbcGNn:wjMbVJ62POidvipqX
Checks for missing Authenticode signature.
resource |
---|
10536cb62dbd4aad1fb8ef42d5da92cd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcpynA
lstrcatA
CreateThread
GetLastError
WaitForSingleObject
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
lstrcpyA
VirtualFree
GetWindowsDirectoryA
CreateFileA
GetFileSize
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
Sleep
GetVersion
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
LoadLibraryA
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
CreateWindowExA
GetWindowRect
DefWindowProcA
RegisterClassExA
SetWindowsHookExA
GetCursorPos
GetFocus
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
GetCaretPos
CallNextHookEx
PostMessageA
wsprintfA
ClientToScreen
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
TGoInst
TGoRun
TGoShutdown
TGoStartup
TGoTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ