tRbInst
tRbRun
tRbShutdown
tRbStartup
tRbTest
Static task
static1
Behavioral task
behavioral1
Sample
140acc4baec4276716c73421837a4791.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
140acc4baec4276716c73421837a4791.dll
Resource
win10v2004-20231222-en
Target
140acc4baec4276716c73421837a4791
Size
31KB
MD5
140acc4baec4276716c73421837a4791
SHA1
87cf4cfb3c70e63ddcd0f36f9ef7a990e07d42d3
SHA256
fc88a0fc2695e704d9f5f96c8736901b6831257decb0c449b6c0946fc21e0b19
SHA512
9044b9faaa36c5afd0d466511a34f768d153e0c93b50b9ed0ef4021659896d686516e60c4f6e8200ba808cbefa6ba73fa6a4f9cd6e0fc5b09e24ed3ac6899af0
SSDEEP
768:3Mg6LOAozgY/vbhdUevJdK1lBqVNfwlmn:3MgJgYXzNJsefw8
Checks for missing Authenticode signature.
resource |
---|
140acc4baec4276716c73421837a4791 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
lstrcpyA
CopyFileA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
MoveFileA
GetLocaleInfoA
GetLocalTime
MoveFileExA
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
GetSystemDirectoryA
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateProcessA
CreateThread
CreateEventA
Sleep
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
CloseDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
tRbInst
tRbRun
tRbShutdown
tRbStartup
tRbTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ