BuUmOqUD
JjZFBQmj
JoaUFGOJjO
tPxNNHNaHT
uscIQSKPvgnC
Static task
static1
Behavioral task
behavioral1
Sample
39cbd7e42e426f0754cf203706716111.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39cbd7e42e426f0754cf203706716111.dll
Resource
win10v2004-20231222-en
Target
39cbd7e42e426f0754cf203706716111
Size
106KB
MD5
39cbd7e42e426f0754cf203706716111
SHA1
b09c6f122075ccc3a193e3c5bb7b7d3c5089b693
SHA256
e2a83b3c763d70cae4fda4360f2a3e1712f7c5d7eee689e1fd6bc1e7792793a7
SHA512
6d2220e69643a17fe9e3938eb7556f9ff9be87441799d7ce8ba5467b8008b513356ac68e61df1770de322c1048b7f11e75286f2c23ca119c3e11efbbc63e03f5
SSDEEP
1536:eAKTTXfgOEdr8AiegiOkIs4APPrz0XFiLtEcyWuoVD09QRtSWvx:agOEZZzF6s4APPH01i9uRWRf
Checks for missing Authenticode signature.
resource |
---|
39cbd7e42e426f0754cf203706716111 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
GetProcessHeap
HeapFree
FindAtomA
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetTempPathA
DeleteFileA
VirtualAlloc
GlobalAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
VirtualFree
CreateEventA
GetVersionExA
lstrcmpA
lstrcmpiA
GetSystemDirectoryA
GetSystemTime
MoveFileA
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
ReleaseMutex
GetTickCount
lstrlenA
GetVolumeInformationA
SetEvent
SystemTimeToFileTime
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
IsValidCodePage
GetOEMCP
lstrcpynA
lstrcatA
CreateFileA
WriteFile
CloseHandle
CreateProcessA
GetVersion
ExitProcess
GetModuleHandleA
GetProcAddress
WaitForSingleObject
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
GetLocaleInfoA
GetLastError
GetCommandLineA
RtlUnwind
VirtualQuery
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
GetWindowRect
CloseDesktop
InflateRect
ClientToScreen
GetFocus
GetCursorPos
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
EqualRect
IsWindowVisible
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
BuUmOqUD
JjZFBQmj
JoaUFGOJjO
tPxNNHNaHT
uscIQSKPvgnC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ