ZtGame_IN
ZtGame_OUT
Static task
static1
Behavioral task
behavioral1
Sample
b674b38e90965f81666378c9146db152.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b674b38e90965f81666378c9146db152.dll
Resource
win10v2004-20240226-en
Target
b674b38e90965f81666378c9146db152
Size
24KB
MD5
b674b38e90965f81666378c9146db152
SHA1
02e908580d8292ece5acd8007819a25fbf6da558
SHA256
1fa2df0946d6afb38347df001f5c185b1df22fb0ab1f1811bea21731651e1e52
SHA512
a347483abf8d6311b7e02a9396b052e9330bb9c9ed6eb53062b374e6c849f6b07ef7e91447be53f1f193f764d49386957ed0b821639f242c92f6ca2ad674a6cb
SSDEEP
384:wiIBkRo4yvbbllWBVceu9KgGJvWrK9Sm2umsBUqU:VIBqbyvOEOJu3sB9
Checks for missing Authenticode signature.
resource |
---|
b674b38e90965f81666378c9146db152 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
VirtualFree
GetProcAddress
LoadLibraryA
GetCurrentThreadId
CloseHandle
CreateProcessA
GetTempPathA
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
TerminateProcess
Sleep
CreateThread
CreateFileA
WriteProcessMemory
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringA
GlobalFree
GlobalLock
GlobalAlloc
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
GetWindowTextA
FindWindowA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
WSACleanup
gethostbyname
gethostname
WSAStartup
ZtGame_IN
ZtGame_OUT
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ