cadcd
rewrew
Static task
static1
Behavioral task
behavioral1
Sample
65f61aa3a378a2928ab5eb6fe7f80f70.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65f61aa3a378a2928ab5eb6fe7f80f70.dll
Resource
win10v2004-20231215-en
Target
65f61aa3a378a2928ab5eb6fe7f80f70
Size
22KB
MD5
65f61aa3a378a2928ab5eb6fe7f80f70
SHA1
e6922dfbae32912c1b71fcc6b30367bfb9f3d17f
SHA256
8bc9d694635765443b658ae5d28ff7913feac1eb5b38e523ed6f337852c1cba5
SHA512
abc9016d9e2b7137769e5eb32ccf34b1c57a2ef43366a679799189100dfde9aeed376071b49866bf64bb72763c5a6e145c317f2a1a23572f2dfddc66b104e463
SSDEEP
384:ciL/9YfFRsFM7N5X4BDUhonpn67qA7Tyg1euk5f5XNkMr5mHRHlo8:cib9YNWFM7N5oBDU+M7qCB1eujI5GRHX
Checks for missing Authenticode signature.
resource |
---|
65f61aa3a378a2928ab5eb6fe7f80f70 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
ExitProcess
WriteFile
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
GetTempPathA
VirtualAlloc
ReadProcessMemory
GetCurrentProcessId
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetCurrentThreadId
GetCurrentProcess
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
_strcmpi
_stricmp
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
cadcd
rewrew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ