JEpInst
JEpRun
JEpShutdown
JEpStartup
JEpTest
Static task
static1
Behavioral task
behavioral1
Sample
72c1b320f4946a903be1ecbd56a94917.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72c1b320f4946a903be1ecbd56a94917.dll
Resource
win10v2004-20231222-en
Target
72c1b320f4946a903be1ecbd56a94917
Size
31KB
MD5
72c1b320f4946a903be1ecbd56a94917
SHA1
104aa1af4d2d3106f54030ff1bd3ebbd5aa3f976
SHA256
7a8c2213eaf863e001eb45e4f0eeec2cf6023679262c3cfe73b79d04121a2214
SHA512
850d87812eb6a28883c5b134ff93a00462931a1771e8a194bef3fce704e9899df355911f21609db0b626a4c8e34c4be8d93721f0cc250da61efb85ea043af047
SSDEEP
768:tWqpCaxgKiAh10xdWxXubY6u7i0ZgXBm+dFT:1ngLOuu7sZd
Checks for missing Authenticode signature.
resource |
---|
72c1b320f4946a903be1ecbd56a94917 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
FindAtomA
GetModuleFileNameA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
CreateThread
GetFileSize
lstrcmpA
GetLocaleInfoA
MoveFileExA
FreeLibrary
SystemTimeToFileTime
SetEvent
VirtualFree
GetWindowsDirectoryA
OpenProcess
GetVolumeInformationA
CreateEventA
GetSystemDirectoryA
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
GetLastError
MoveFileA
GetModuleHandleA
GetCurrentThreadId
GetVersionExA
lstrcpyA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
DeleteFileA
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
lstrcatA
CreateProcessA
Sleep
WriteFile
GetTickCount
WaitForSingleObject
lstrcpynA
lstrlenA
CreateFileA
WritePrivateProfileStringA
ExitProcess
IsDebuggerPresent
SetThreadDesktop
CloseDesktop
OpenInputDesktop
GetThreadDesktop
FindWindowExA
CallNextHookEx
ClientToScreen
TranslateMessage
InflateRect
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
GetCursorPos
GetCaretPos
PostMessageA
DispatchMessageA
GetMessageA
GetWindowRect
RegisterClassExA
GetFocus
wsprintfA
EqualRect
IsWindowVisible
FindWindowA
LoadCursorA
GetWindowThreadProcessId
LoadIconA
CreateProcessAsUserA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumValueA
RegCloseKey
OpenProcessToken
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
JEpInst
JEpRun
JEpShutdown
JEpStartup
JEpTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ