_26dObjFj
__GOw53@16
_9fbAuDwAP
Static task
static1
Behavioral task
behavioral1
Sample
9b376fc2b80cc008525200e2f72fe287.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b376fc2b80cc008525200e2f72fe287.dll
Resource
win10v2004-20231215-en
Target
9b376fc2b80cc008525200e2f72fe287
Size
177KB
MD5
9b376fc2b80cc008525200e2f72fe287
SHA1
1093641704d61cce9ebbbf93f39e4e889fdbf9ad
SHA256
3e8712eb4ce8264f1bf9564b50fdafd6fc9d553eafac6c0c3867f1306a4b44f0
SHA512
68236aa3e40bf39444efc5366806fca53db4658b434f6bd644b0763a22376865dd29bb6da9068baf578bd2ecf1c38a6e7d2c35c21a8cbe9824833a16c044e54c
SSDEEP
3072:WnuZ4RGu2BDhT8cai10oaFkXSLWHCMX/6OpyNeTCtj3HxB/9s0ejGP:ERMfEiW76d6KyN+Ct9B9ve
Checks for missing Authenticode signature.
resource |
---|
9b376fc2b80cc008525200e2f72fe287 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsWindowEnabled
SetCursor
GetMenu
SetClassLongA
SetCapture
SetClipboardData
GetCapture
GetDesktopWindow
CharLowerA
SetFocus
CoRevokeClassObject
GetHGlobalFromStream
CoUnmarshalInterface
SetBkMode
GetStringTypeW
SetLastError
ReadFile
GetCurrentProcess
GetFileAttributesA
GlobalAlloc
GetStringTypeA
lstrlenA
GetFileType
LockResource
GetCurrentThreadId
GetCommandLineA
VirtualAlloc
GetLastError
ExitProcess
IsBadHugeReadPtr
IsBadReadPtr
GetStdHandle
GetProcessHeap
lstrcmpiA
GetModuleHandleW
CloseHandle
VirtualQuery
GetModuleHandleA
ImageList_Destroy
ImageList_Read
ImageList_Create
ImageList_Remove
ImageList_Draw
ImageList_GetBkColor
ImageList_Add
ImageList_DrawEx
_26dObjFj
__GOw53@16
_9fbAuDwAP
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ