Install
UnInstall
Static task
static1
Behavioral task
behavioral1
Sample
57135a64acd3526c9fbbbe93aecce739.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57135a64acd3526c9fbbbe93aecce739.dll
Resource
win10v2004-20231215-en
Target
57135a64acd3526c9fbbbe93aecce739
Size
32KB
MD5
57135a64acd3526c9fbbbe93aecce739
SHA1
bd47d854a40bacd312721fdc4f2037f31ac4a1d4
SHA256
e2eca948d06ce4884f723ecc7981ec19da59a6a3822ee28ff751623f13dbda7c
SHA512
139eef039a5ea175191257e18cd7787f60aed8a4af26341f6339d9c1874baf1effd6f567d7f1f58a9c45bd557cb3060b41d95e38f8b55bc14fcb90e168a6b731
SSDEEP
384:40RuclXpK1+T3tdwX/45scuml/0Oyk4VZ3moIo9jcz:4CxpI+T3nSAp0jIo9Y
Checks for missing Authenticode signature.
resource |
---|
57135a64acd3526c9fbbbe93aecce739 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalUnlock
GlobalLock
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetClassNameA
FindWindowExA
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
EmptyClipboard
SetClipboardData
CallNextHookEx
wsprintfA
Install
UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ