_Drblfzzwg_dqbppgrr_akt@16
_GomqgeeK_IiMogyx_d@8
_Pgtoheaf_thDDnxdcw@12
_Shmgpohc_shswpaPA_f@8
_Lbrqehyob_ukfxeifz_aeo@8
_GmzkWohh_HhiiEjxmNb@4
Static task
static1
Behavioral task
behavioral1
Sample
5a03f45f086ab91274fc888bc151695e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a03f45f086ab91274fc888bc151695e.exe
Resource
win10v2004-20231222-en
Target
5a03f45f086ab91274fc888bc151695e
Size
68KB
MD5
5a03f45f086ab91274fc888bc151695e
SHA1
e8481e083ad740769ea5528c9595dedbf23dc277
SHA256
9540a1ed1f2dea5433db2a10b6c4a6362c31cc92ef4c9101793de68ca6d8aa73
SHA512
e2fbeb1fc1403af7dc04d5cb526271887e609ea270543d4f79f4770f5714f4b63c1b144d19a4c840caf2f5622d26900e377d54e602862c150e2ddfc70bcf67de
SSDEEP
1536:xkof1Wto4pQ5fKNWQuaOH1wMtkyO1uJhtGv9XV2ybL4:xkDokNZYZkyOuhtG5V2y34
Checks for missing Authenticode signature.
resource |
---|
5a03f45f086ab91274fc888bc151695e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindTextW
ChooseColorW
GetOpenFileNameA
ChooseFontW
PathFindFileNameA
PathBuildRootA
TileChildWindows
TabbedTextOutW
MapVirtualKeyExW
SendDlgItemMessageW
GetUserObjectInformationA
PeekMessageA
FindWindowA
DestroyMenu
MoveWindow
DrawTextW
RemoveMenu
GetWindowRect
DestroyCaret
GetMenu
GetCursor
SetThreadExecutionState
GetFileSize
DeleteAtom
HeapValidate
OpenEventA
lstrcmpA
VirtualQuery
GetFullPathNameA
lstrcatA
ReadFile
GetACP
GetThreadPriority
GetFileAttributesExW
GetModuleHandleA
DeleteObject
CreateRectRgn
ExtFloodFill
Ellipse
SetMagicColors
CreateDCW
CreateDiscardableBitmap
ScaleViewportExtEx
GetTextExtentPointW
SetViewportExtEx
memset
_Drblfzzwg_dqbppgrr_akt@16
_GomqgeeK_IiMogyx_d@8
_Pgtoheaf_thDDnxdcw@12
_Shmgpohc_shswpaPA_f@8
_Lbrqehyob_ukfxeifz_aeo@8
_GmzkWohh_HhiiEjxmNb@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ