aaaacc
fdsfds
jkiopw
Static task
static1
Behavioral task
behavioral1
Sample
47c759bc8757287f0cbf1767363c444c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47c759bc8757287f0cbf1767363c444c.dll
Resource
win10v2004-20231215-en
Target
47c759bc8757287f0cbf1767363c444c
Size
36KB
MD5
47c759bc8757287f0cbf1767363c444c
SHA1
9f65c4c60801c0dbde6e38ade34745a490f8c728
SHA256
9191b74b68bd21a115194e1638a76747ef664b038b03f1c49a6cbd186afb820d
SHA512
e176186bc6590760548b58a2d2d49995a011f9b47f30d83ab3262bfbbadd3cf3d980fc1ee5bbd72b39425232a14082f3b794bad3e6b3321dc522ccd9f1cf92e8
SSDEEP
384:qk0pA4nWDafi4dVLQ7ol+A/12h/LMS5nQ9t6czJc8aCBOucEtX/yJQa:cQDy/12yDt6cJa6OdEtXM
Checks for missing Authenticode signature.
resource |
---|
47c759bc8757287f0cbf1767363c444c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
DeleteFileA
GetTempPathA
VirtualAlloc
WriteFile
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
CreateProcessA
ExitProcess
GetCurrentThreadId
GetCurrentProcess
VirtualProtectEx
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
lstrcatA
GetModuleHandleA
LoadLibraryA
TerminateProcess
GetProcAddress
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
RegOpenKeyExA
RegCloseKey
_stricmp
_strlwr
_strcmpi
_adjust_fdiv
malloc
_initterm
free
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
strcmp
__CxxFrameHandler
aaaacc
fdsfds
jkiopw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ