XAeInst
XAeRun
XAeShutdown
XAeStartup
XAeTest
Static task
static1
Behavioral task
behavioral1
Sample
8c47c091dde35bf14c41678674772522.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c47c091dde35bf14c41678674772522.dll
Resource
win10v2004-20231222-en
Target
8c47c091dde35bf14c41678674772522
Size
32KB
MD5
8c47c091dde35bf14c41678674772522
SHA1
280f3a897454041db3703cf80184ae76ff65a7fc
SHA256
25ad5a7377c2f10c368bf015df01a51fe797298864266669ea968b6f7d72f0a2
SHA512
655f707fdd8f7806df8e439037fb8592b31cf632badb2b068a4702e6862fef5bf4ddada8158cfb961dc1fcf82b909f81108403e124b61f530de2156593ce0e92
SSDEEP
768:HUm32FxlWFoTRmA+J+wvehBB6VRfwsvh:HUm4uotIJ+jqfwO
Checks for missing Authenticode signature.
resource |
---|
8c47c091dde35bf14c41678674772522 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetTickCount
GetModuleFileNameA
CreateMutexA
CloseHandle
WriteFile
GetVersion
GetTempPathA
GetSystemTime
GetSystemDirectoryA
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
lstrcpyA
CopyFileA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
MoveFileA
GetLocalTime
CreateEventA
MoveFileExA
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
lstrcatA
CreateFileA
CreateProcessA
CreateThread
GetLocaleInfoA
Sleep
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
CloseDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
XAeInst
XAeRun
XAeShutdown
XAeStartup
XAeTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ