OpenVrdfckchvrl
CloseNdcbdxfk
InitPlyejocg
Wpvwtghc
Jtxommgko
SetMvtgwdnv
Static task
static1
Behavioral task
behavioral1
Sample
197ddd92042ce424735b041a55765f50.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
197ddd92042ce424735b041a55765f50.exe
Resource
win10v2004-20231215-en
Target
197ddd92042ce424735b041a55765f50
Size
388KB
MD5
197ddd92042ce424735b041a55765f50
SHA1
96bfa612771fd17740b1901920f13b079ed6f658
SHA256
f737ef4d558b3e4699bd6b3c78c6ae203d6e19fd09533be619f3f6fec5452c23
SHA512
d5ef93804118fab164179de2d6f2d1b8b4b0d270991f4a1c6200cf2c99fecc6078010f9d8876e793a0be21ab229df5e9e0fcddb8ed3163a6fc05125c8cd9d3fb
SSDEEP
3072:WqBl2VSB3hSE4b5kivlyZXhYU4wAZLYA42pGx+Tgc67OMGD35Kh:n1BRy9vehGwUL74k6aMcm
Checks for missing Authenticode signature.
resource |
---|
197ddd92042ce424735b041a55765f50 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetPriorityClass
GlobalAlloc
SetConsoleCursorInfo
ReadFileScatter
SetPriorityClass
WriteProfileStringA
GetProfileStringA
SetThreadExecutionState
GetBinaryTypeA
WriteProcessMemory
GetConsoleAliasesLengthA
ProcessIdToSessionId
HeapLock
GetProcessIoCounters
lstrlenA
MulDiv
LZOpenFileA
IsBadCodePtr
SetFileTime
WaitForMultipleObjects
GetFileSize
GetMailslotInfo
SetEndOfFile
MoveFileWithProgressA
GetCurrentDirectoryA
GetEnvironmentStringsA
DeleteFileA
GetVolumeNameForVolumeMountPointA
GetVersionExA
GetNamedPipeHandleStateA
SearchPathA
CreateWaitableTimerA
GetProcessHeaps
_lread
FindAtomA
SetConsoleLocalEUDC
GetSystemTime
ReadConsoleOutputCharacterA
IsBadStringPtrA
GetVolumePathNameA
GetTapeParameters
GetWindowsDirectoryA
ReplaceFile
LocalFlags
ShowConsoleCursor
GetCommModemStatus
GetDiskFreeSpaceExA
OpenEventA
HeapSize
SetCommTimeouts
PeekConsoleInputA
SetConsoleCursor
GetThreadContext
SetFileValidData
GetLocaleInfoA
GetOEMCP
SetConsoleLocalEUDC
GetTempFileNameA
GetPrivateProfileStringA
CreateTimerQueueTimer
WaitForSingleObjectEx
BuildCommDCBAndTimeoutsA
GetComputerNameA
GetEnvironmentVariableA
SizeofResource
ReadConsoleA
GetProcessId
GetDefaultCommConfigA
GetVersionExA
OpenFileMappingA
GetCommState
ConnectNamedPipe
GetTickCount
VirtualAlloc
HeapFree
SetConsoleTitleA
CreateDirectoryExA
LZStart
GetConsoleCursorMode
VirtualQuery
CreateMutexA
GetModuleFileNameA
IsDebuggerPresent
lstrcmpA
GlobalGetAtomNameA
VerifyVersionInfoA
DeleteTimerQueueEx
GetDllDirectoryA
SetLocaleInfoA
ReadConsoleOutputCharacterA
IsSystemResumeAutomatic
GetLogicalDriveStringsA
ReadConsoleOutputA
FindFirstFileExA
GetExitCodeThread
UnlockFileEx
TransmitCommChar
PeekConsoleInputA
SetLocalPrimaryComputerNameA
GetFileTime
ReadConsoleOutputCharacterA
BeginUpdateResourceA
GetNamedPipeHandleStateA
EnumSystemGeoID
OpenWaitableTimerA
GetProcAddress
SetThreadUILanguage
GetSystemTimeAdjustment
OpenJobObjectA
RegisterWaitForSingleObject
GetDiskFreeSpaceExA
_lclose
ReleaseMutex
FindResourceA
GetLogicalDriveStringsA
HeapQueryInformation
GlobalAddAtomA
HeapUnlock
GetCalendarInfoA
GetCalendarInfoA
HeapAlloc
GetConsoleTitleA
lstrcatA
GetLocaleInfoA
OpenProfileUserMapping
WriteConsoleOutputAttribute
Heap32First
MoveFileExW
lstrcmpi
LoadLibraryExA
GetUserGeoID
GetLogicalDriveStringsA
SetConsoleMaximumWindowSize
GetCommState
CreateDirectoryExA
GlobalMemoryStatus
WinExec
GetTimeZoneInformation
OpenFileMappingA
FindVolumeMountPointClose
LockFile
GetLocaleInfoA
GetConsoleWindow
ReadConsoleOutputAttribute
GetConsoleHardwareState
GetTickCount
lstrcatA
GetCurrentProcessId
GetCompressedFileSizeA
GetConsoleScreenBufferInfo
GetProcessId
FlushViewOfFile
LZClose
GetDiskFreeSpaceA
IsBadReadPtr
GetDriveTypeA
ChangeTimerQueueTimer
ReadConsoleOutputAttribute
CopyFileExA
OpenFileMappingA
GetCurrentConsoleFont
LZStart
SetFilePointer
FindFirstChangeNotificationA
FlushInstructionCache
GetFullPathNameA
IsValidCodePage
ReleaseMutex
FindNextChangeNotification
VirtualProtectEx
CreateDirectoryA
GlobalMemoryStatus
WriteConsoleOutputA
PurgeComm
GlobalAddAtomA
ScrollWindowEx
GetAltTabInfoA
EnumPropsExA
SetInternalWindowPos
GetWindowTextA
RegisterDeviceNotificationA
IsCharAlphaNumericW
SetCursorContents
EnumWindowStationsA
SetScrollPos
ReplyMessage
CallWindowProcA
LockSetForegroundWindow
GetUpdateRect
EnumPropsExA
SetDeskWallpaper
GetUserObjectSecurity
GetMenuItemRect
IsCharAlphaNumericA
SetScrollPos
IsZoomed
PrivateExtractIconsA
GetDlgItemInt
EndMenu
IsIconic
DefFrameProcA
SetCursorContents
GetShellWindow
DestroyReasons
LockSetForegroundWindow
DrawFrame
CountClipboardFormats
GetWindowLongA
OpenWindowStationA
OpenWindowStationA
SetMenuContextHelpId
CreateDialogParamA
EnumDisplaySettingsExA
ShowWindow
GetSysColor
GetCursorFrameInfo
GetInputState
UnregisterClassA
LockWindowUpdate
RegisterMessagePumpHook
DestroyReasons
DragDetect
EnumThreadWindows
EndMenu
GetKeyState
SetMenuItemBitmaps
RegisterClipboardFormatA
IsMenu
CreateAcceleratorTableA
GetDCEx
SetMenu
LoadStringA
GetComboBoxInfo
RegisterSystemThread
CreateDesktopA
UpdatePerUserSystemParameters
MapDialogRect
AnyPopup
CharLowerBuffA
LoadKeyboardLayoutA
DlgDirSelectExA
SendIMEMessageExA
RegisterClassExW
ChildWindowFromPoint
UnhookWindowsHook
OemToCharBuffA
CreateAcceleratorTableA
EnumDisplayDevicesA
GetMenuContextHelpId
SendInput
ChangeMenuA
GetMenuItemInfoA
DestroyMenu
ChildWindowFromPointEx
CreateDialogParamA
ScrollDC
SetSystemMenu
DestroyReasons
HiliteMenuItem
BroadcastSystemMessageA
SetMenu
closesocket
OpenVrdfckchvrl
CloseNdcbdxfk
InitPlyejocg
Wpvwtghc
Jtxommgko
SetMvtgwdnv
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ