GetTeqwrfih
Ewgcpukmv
Static task
static1
Behavioral task
behavioral1
Sample
a0e102e88f81ceff687cc12efcc5a149.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0e102e88f81ceff687cc12efcc5a149.dll
Resource
win10v2004-20240221-en
Target
a0e102e88f81ceff687cc12efcc5a149
Size
68KB
MD5
a0e102e88f81ceff687cc12efcc5a149
SHA1
0b6c9bdf88561870d7b33d207f3745bf7306c552
SHA256
dc72bc412edba20a76e786ccd23d9f5ba37c356f800b84fc555ddd7afd98c229
SHA512
21922c2a90b3a2e9f4d29e384ba79df0595c5897163f291ec4102218805f83988fbb0a590c55e6062760332b477ca8462f0b3eab4722fa6b20fb3c3ba5a077fd
SSDEEP
1536:SaHdAJ+SWStNuy0X7wzGkFsmdkvfxaRnj4IQ0lqT90nvVFGmrk/:rHmzhZwwi6smdp4IQ0lc0nvVzk
Checks for missing Authenticode signature.
resource |
---|
a0e102e88f81ceff687cc12efcc5a149 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessWorkingSetSize
WaitNamedPipeA
VirtualAlloc
GetTapePosition
FindFirstFileA
GetVDMCurrentDirectories
GetWriteWatch
HeapValidate
GetCommandLineA
VerifyVersionInfoA
GetNamedPipeInfo
UpdateResourceA
ResetWriteWatch
ExitProcess
GetModuleFileNameA
GetCommandLineW
OpenFileMappingA
GetSystemTime
GetModuleFileNameA
GetDefaultCommConfigA
PostQueuedCompletionStatus
GetCommMask
GetVolumePathNameA
UnlockFile
CopyFileExW
InternetOpenUrlA
DeleteUrlCacheEntryW
HttpQueryInfoA
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
InternetOpenA
GetClipboardSequenceNumber
TrackPopupMenuEx
RegisterUserApiHook
EndDeferWindowPos
FlashWindow
GetInternalWindowPos
GetProcessDefaultLayout
GetMenuItemInfoA
ImpersonateDdeClientWindow
DispatchMessageA
GetWindowTextA
FindWindowExA
DefDlgProcA
InSendMessageEx
GetSysColorBrush
PostThreadMessageA
GetAltTabInfoA
EnumDisplaySettingsExA
GetParent
GetProgmanWindow
GetUpdateRect
MessageBoxIndirectA
OpenClipboard
ReplyMessage
DestroyCursor
GetTeqwrfih
Ewgcpukmv
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ