pvoInst
pvoRun
pvoShutdown
pvoStartup
pvoTest
Static task
static1
Behavioral task
behavioral1
Sample
4440e57547a6933571d16bcdf3882ed1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4440e57547a6933571d16bcdf3882ed1.dll
Resource
win10v2004-20231222-en
Target
4440e57547a6933571d16bcdf3882ed1
Size
33KB
MD5
4440e57547a6933571d16bcdf3882ed1
SHA1
897dc6cf034dd9b11c527a187bd6c8b722e57523
SHA256
674904e2cb8e3e003871d9b206b516aabec270f6ea1dcbc3a5093ef4ac47382c
SHA512
4a9d2dca5ace073ca0de66cc78aef133ec0ebb15d69b0644d201f4e4d41ba1830ef0bf1f2be08102c594e8c11b71d1bc09fc0b8b83bef03ab73fe6467c721fa1
SSDEEP
768:lMjLSlQqP+Dizaa/zXx0WjBXlg8KZ7/5G4:ZeoP5I5G
Checks for missing Authenticode signature.
resource |
---|
4440e57547a6933571d16bcdf3882ed1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
GetTempPathA
GetSystemTime
lstrcatA
lstrcpynA
CreateThread
GetLastError
WaitForSingleObject
VirtualAlloc
GetTickCount
GetLocaleInfoA
GetModuleHandleA
MoveFileExA
FreeLibrary
GetSystemDirectoryA
GetCurrentThreadId
SystemTimeToFileTime
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
lstrcpyA
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
GetFileSize
CreateProcessA
OpenProcess
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
CreateFileA
GetVersion
CloseHandle
Sleep
ExitProcess
CreateMutexA
GetModuleFileNameA
FindAtomA
WriteFile
WritePrivateProfileStringA
GetLocalTime
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
InflateRect
PostMessageA
FindWindowA
LoadCursorA
GetMessageA
GetWindowThreadProcessId
GetWindowRect
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowsHookExA
wsprintfA
DispatchMessageA
EqualRect
TranslateMessage
ClientToScreen
GetFocus
GetCursorPos
LoadIconA
CallNextHookEx
GetCaretPos
IsWindowVisible
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegDeleteKeyA
RegCreateKeyExA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
pvoInst
pvoRun
pvoShutdown
pvoStartup
pvoTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ