ProcessTrans
fuckfuck
Static task
static1
Behavioral task
behavioral1
Sample
14591024e4bcbfe36b4769b64377430b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14591024e4bcbfe36b4769b64377430b.dll
Resource
win10v2004-20231215-en
Target
14591024e4bcbfe36b4769b64377430b
Size
56KB
MD5
14591024e4bcbfe36b4769b64377430b
SHA1
6d7fe29563f132b284702b263be861d751c08fbd
SHA256
c2ec3a5664087dd65f4e8b85418f322e148e3b2f2056654938685c850c17234b
SHA512
116ec55a59a7036bae513c1d40295217e1c554ffb28ce7fdb7e80bfe317362af6c90062cefe0aa3b8ffe690ea1619e68b04e2faab0ae9cac9ceb82bf65b82b6b
SSDEEP
768:3GDpAPLwSrbOOH9za7VjA5elf7gQUZINOPyhw59MLlrMZoqmRHKKG:2DGES/Ht+ueB0QAIYUwsxKo0KG
Checks for missing Authenticode signature.
resource |
---|
14591024e4bcbfe36b4769b64377430b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpEndRequestA
HttpSendRequestExA
InternetReadFile
HttpSendRequestA
InternetCloseHandle
InternetSetOptionA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetWriteFile
SHDeleteKeyA
inet_addr
closesocket
accept
send
recv
listen
connect
htons
socket
bind
setsockopt
ord3953
ord6467
ord815
ord561
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord1116
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord3178
ord3010
ord3790
ord356
ord2770
ord1980
ord2781
ord4058
ord3181
ord800
ord3319
ord3310
ord2820
ord6385
ord668
ord354
ord5186
ord1979
ord665
ord825
ord823
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord3738
atol
__CxxFrameHandler
strchr
strrchr
_strupr
sprintf
_beginthread
fclose
fseek
fopen
fread
fwrite
free
malloc
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
calloc
_stat
lstrlenA
SetCurrentDirectoryA
GetVolumeInformationA
lstrcpyA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcess
Process32Next
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
MoveFileA
CreateDirectoryA
CreateEventA
Sleep
WaitForSingleObject
SetEvent
GetComputerNameA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVersion
ReleaseMutex
DeleteFileA
CreateMutexA
WaitForMultipleObjects
GetSystemDirectoryA
GetCurrentThread
ReadFile
WriteFile
CreateProcessA
GetEnvironmentVariableA
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
LocalAlloc
GetTempPathA
LocalFree
TerminateProcess
SendMessageA
DispatchMessageA
SetCursorPos
IsWindow
TranslateMessage
ExitWindowsEx
keybd_event
mouse_event
FindWindowA
GetDC
ReleaseDC
PeekMessageA
wsprintfA
GetDeviceCaps
CreateDCA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
RegEnumValueA
QueryServiceConfigA
ImpersonateSelf
OpenThreadToken
GetUserNameA
AdjustTokenPrivileges
SHEmptyRecycleBinA
SHFileOperationA
ShellExecuteA
capCreateCaptureWindowA
ProcessTrans
fuckfuck
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ