vLkpVOb@12
_AHNGD
_8z0yIB3Ik0@20
eRVM7E@20
Static task
static1
Behavioral task
behavioral1
Sample
4c51f65d5fa58fc48656b3c55472108a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c51f65d5fa58fc48656b3c55472108a.dll
Resource
win10v2004-20231215-en
Target
4c51f65d5fa58fc48656b3c55472108a
Size
177KB
MD5
4c51f65d5fa58fc48656b3c55472108a
SHA1
12fac589f001ca78dbb414a281f2527857030fc4
SHA256
ca892f33536bc208b3175ba712900293d9ca1d152e1c968d1113a25d49f71898
SHA512
e520a532e7f5f15d0291215d0095bb4cf1d0cd48acb3f241421dd2064988b3693a06465d593dec0b37d014e7f3a03c208964975b115a7039039bba0aabed2ca4
SSDEEP
3072:AMq7vlFIFC2xxa0M1NkUuXD02/52kPzxz2W5B2QQaP6LkDNJ2S:AZvvIn2nkUL2/5zDQSf
Checks for missing Authenticode signature.
resource |
---|
4c51f65d5fa58fc48656b3c55472108a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFocus
GetWindowTextLengthA
IsCharUpperA
GetDlgItem
wsprintfA
GetSystemMetrics
GetSysColorBrush
GetDesktopWindow
CreateWindowExA
IsWindowEnabled
GetMenu
SafeArrayPtrOfIndex
SysReAllocStringLen
IsBadHugeReadPtr
FreeResource
LocalAlloc
lstrcpynA
LockResource
GetFullPathNameA
HeapDestroy
ExitProcess
VirtualAlloc
Sleep
GlobalFindAtomA
GetThreadLocale
LoadLibraryExA
GetTickCount
CompareStringA
GetCommandLineA
ResetEvent
HeapFree
GetStdHandle
lstrcatA
GetACP
GlobalAlloc
IsBadReadPtr
InitializeCriticalSection
SHFileOperationA
SHGetDesktopFolder
PathIsContentTypeA
SHQueryInfoKeyA
PathGetCharTypeA
SHStrDupA
SHEnumValueA
vLkpVOb@12
_AHNGD
_8z0yIB3Ik0@20
eRVM7E@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ