QSXdHOgKn
SsNQYkpFJu
VdjgLNnE
jGtbcTPDAra
yDsIyNhQ
Static task
static1
Behavioral task
behavioral1
Sample
865e7b07ad67f7adb2bc00425a922a0b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
865e7b07ad67f7adb2bc00425a922a0b.dll
Resource
win10v2004-20231222-en
Target
865e7b07ad67f7adb2bc00425a922a0b
Size
64KB
MD5
865e7b07ad67f7adb2bc00425a922a0b
SHA1
269c2566ef56e58308ee1dd1fc578255005d1e62
SHA256
78a3d035db38df27b3b461cec5293b572633ec01846d1541fd80991a8911a37b
SHA512
5919b3208e8765bfb2b5013ced76dabbd523de08de9aa06d204fe85384167b371959f43c0c7c940c76f54cb006951c69c21b323fd666bdfd83a0f3ef4bdb1922
SSDEEP
1536:vHQG9dCgTvEEMsZtvIoJyd3D8+Niwl0Cmp5:vHQ6dCgVdJ+NiwlNa
Checks for missing Authenticode signature.
resource |
---|
865e7b07ad67f7adb2bc00425a922a0b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
CreateEventA
GetVersionExA
lstrcmpA
VirtualAlloc
VirtualFree
lstrcmpiA
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetSystemTime
MoveFileA
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
GetTempPathA
CreateMutexA
GetTickCount
GetLocaleInfoA
GetVolumeInformationA
SetEvent
GetFileSize
SystemTimeToFileTime
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetTempFileNameA
DeleteFileA
GlobalAlloc
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
RtlUnwind
VirtualQuery
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
OpenProcess
FindAtomA
lstrlenA
lstrcpyA
lstrcatA
GetModuleHandleA
GetLastError
GetProcAddress
RaiseException
ReleaseMutex
GetModuleFileNameA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
GetWindowTextA
CloseDesktop
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
MessageBoxA
GetMessageA
SetWindowsHookExA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
EqualRect
ClientToScreen
GetCursorPos
IsWindowVisible
wsprintfA
GetFocus
InflateRect
TranslateMessage
DispatchMessageA
CallNextHookEx
FindWindowA
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
RegCreateKeyExA
SHDeleteValueA
SHGetValueA
SHSetValueA
SHDeleteKeyA
QSXdHOgKn
SsNQYkpFJu
VdjgLNnE
jGtbcTPDAra
yDsIyNhQ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ