eee
fff
Static task
static1
Behavioral task
behavioral1
Sample
26f17e74369deb31ea477ad498a87158.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26f17e74369deb31ea477ad498a87158.dll
Resource
win10v2004-20231215-en
Target
26f17e74369deb31ea477ad498a87158
Size
26KB
MD5
26f17e74369deb31ea477ad498a87158
SHA1
a317919894f9ace34ede86a2c30ceeb585306dd1
SHA256
7524184a87b3fd53fffa5759b895b6e47ceb23ed5d0efba56807fd9f8adb534e
SHA512
2a6b9e2fa8bed81e88387429d09e06ac9d314fc4bfc64191ab13054dba44eb89962184429d6a0cdbf2a23402c1a9b805fe23b8cb2d73e472f46fd56ea147748f
SSDEEP
384:GAlFwO28J3z63nk9euTo33vvrnCsYdqDrerAeq0CzvtNlIwR2JR+e3go0i:llFw263+KLnCxdqDMLqQR+e3gfi
Checks for missing Authenticode signature.
resource |
---|
26f17e74369deb31ea477ad498a87158 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetComputerNameA
ExitProcess
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
GetModuleHandleA
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
SetUnhandledExceptionFilter
CreateThread
SetWindowsHookExA
FindWindowA
GetDesktopWindow
GetWindow
CallNextHookEx
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
_stricmp
_strupr
_strcmpi
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
strncpy
strstr
strchr
strcmp
wcslen
??3@YAXPAX@Z
__CxxFrameHandler
eee
fff
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ