sbcInst
sbcRun
sbcShutdown
sbcStartup
sbcTest
Static task
static1
Behavioral task
behavioral1
Sample
15d4661001018141175503a7c785b160.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15d4661001018141175503a7c785b160.dll
Resource
win10v2004-20231215-en
Target
15d4661001018141175503a7c785b160
Size
31KB
MD5
15d4661001018141175503a7c785b160
SHA1
404857347b7a559eec90d5b5e5c89261ccf5c132
SHA256
f98510d42247d002d7b94f639d06dd57ff60fce1f228f99a0a86f2b7f2128298
SHA512
dbd67d2c7142d1e40c30dbded6cd6f87c51ff7641efedc12b8f6afbdac214ba6875ad2683e33450ba6be859474b2e54a520a6630dd36c6d2048bfdaba81ccf10
SSDEEP
768:9e18L4Hmtk71TiT/namOm1x9bB57GEiqWIG:u3JTiT9x9bk3
Checks for missing Authenticode signature.
resource |
---|
15d4661001018141175503a7c785b160 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
Sleep
GetSystemTime
FreeLibrary
GetCurrentThreadId
GetSystemDirectoryA
SystemTimeToFileTime
GetVersionExA
lstrcmpiA
SetEvent
GetProcAddress
lstrcpyA
VirtualAlloc
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
WritePrivateProfileStringA
GetFileSize
MoveFileA
OpenProcess
GetVolumeInformationA
GetTickCount
CreateEventA
GetLocaleInfoA
GetModuleHandleA
MoveFileExA
VirtualProtectEx
GetTempFileNameA
HeapAlloc
WriteProcessMemory
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetLocalTime
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateThread
lstrcmpA
CreateProcessA
IsDebuggerPresent
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
CallNextHookEx
PostMessageA
wsprintfA
EqualRect
GetThreadDesktop
OpenInputDesktop
CloseDesktop
GetCaretPos
IsWindowVisible
FindWindowA
InflateRect
GetWindowThreadProcessId
ClientToScreen
SetThreadDesktop
RegOpenKeyExA
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
sbcInst
sbcRun
sbcShutdown
sbcStartup
sbcTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ