iii
jjj
Static task
static1
Behavioral task
behavioral1
Sample
50ce1614c48cf07773ece0825266268a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50ce1614c48cf07773ece0825266268a.dll
Resource
win10v2004-20231215-en
Target
50ce1614c48cf07773ece0825266268a
Size
29KB
MD5
50ce1614c48cf07773ece0825266268a
SHA1
bfc3679987915ce42d71166443ef133b60db9975
SHA256
4a7c79eb5d23da552a70290d69605868354f49810136a9535bf51b9759c0d094
SHA512
83236e71e29e1a598cebc8f37ac65a32ec30503a2a69ce49f7678a397c9e58022c60b9d3d8b2865e5c5d0912d7fd9781296177a03b0d55aa70c3344c2b08edc1
SSDEEP
384:YAW9pxW2nd5Dp6wubHFNdh8CDcd9U9D/dTCeGW7z4FWEtqg9KVh3L:ApZDp6w2lNdh8CDvD/dThGehEtnK37
Checks for missing Authenticode signature.
resource |
---|
50ce1614c48cf07773ece0825266268a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadFile
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
CloseHandle
GetLocalTime
DeleteFileA
Sleep
GetModuleHandleA
GetProcAddress
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
LoadLibraryA
GetLastError
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
FindWindowA
GetAsyncKeyState
CallNextHookEx
ToAscii
GetWindowThreadProcessId
strchr
fclose
fread
fopen
_stricmp
_strupr
_strcmpi
_strlwr
??3@YAXPAX@Z
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
wcslen
strrchr
atoi
iii
jjj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ