_E37QINg@20
_m8EG3Fzd
Static task
static1
Behavioral task
behavioral1
Sample
b9b6494aa4c7c4ca1d67cd17a8238304.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9b6494aa4c7c4ca1d67cd17a8238304.exe
Resource
win10v2004-20240226-en
Target
b9b6494aa4c7c4ca1d67cd17a8238304
Size
83KB
MD5
b9b6494aa4c7c4ca1d67cd17a8238304
SHA1
ced288f6fd0b19e711eacc7e3332d71d4045aba7
SHA256
549dbf492168868b5dc3fcf3b3474cb05f25731074157b64ae5574636cefaf60
SHA512
8101fc72fe349bb6d5cd5de96d65cba783e6266b1eadcd1ca19d93cff26cf6298255a9c83c4b2f554e4bca0e20786b3c5e0a9f761c55ea5e53a22e9f090ea83d
SSDEEP
1536:RYU+PdL36dTtZeYePSL4NpcF3NCe5e/LPmri3R2V8wYdmR8a:RYFdEwRpclUeQ88TBa
Checks for missing Authenticode signature.
resource |
---|
b9b6494aa4c7c4ca1d67cd17a8238304 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
FindResourceA
GetStdHandle
LoadLibraryExA
GetThreadLocale
GetOEMCP
HeapFree
GetModuleHandleA
GetCurrentProcessId
SetErrorMode
RaiseException
lstrcpynA
FindClose
SetEvent
GlobalFindAtomA
VirtualFree
VirtualQuery
lstrcatA
GetFileType
LoadLibraryA
SetEndOfFile
ExitProcess
LocalFree
EnumCalendarInfoA
DeleteCriticalSection
CharNextW
TrackPopupMenu
GetKeyboardState
GetCursorPos
SetClipboardData
ReleaseDC
SetActiveWindow
IsCharUpperA
GetClientRect
GetClassInfoA
SetTimer
RegisterClipboardFormatA
IsZoomed
ChildWindowFromPoint
LoadBitmapA
BeginPaint
LoadStringA
GetCursor
CloseClipboard
DestroyWindow
GetScrollPos
ReleaseCapture
GetScrollRange
IntersectRect
DrawIcon
SetPropA
GetWindowTextA
IsDlgButtonChecked
PeekMessageA
ScrollWindow
GetCapture
GetKeyNameTextA
DefWindowProcA
GetParent
PostMessageA
GetPropA
DestroyMenu
IsCharLowerA
RegisterClassA
GetWindowLongA
wsprintfA
CharLowerA
EnumWindows
DefFrameProcA
GetKeyboardType
IsWindowUnicode
UnregisterClassA
IsIconic
GetScrollInfo
GetMenuItemCount
TranslateMessage
GetSubMenu
MessageBeep
GetMenu
SetWindowTextA
GetWindowPlacement
GetKeyState
OffsetRect
SetForegroundWindow
CharNextA
MoveWindow
Shell_NotifyIconA
SHFileOperationA
DragQueryFileA
SHGetFileInfoA
SHGetSpecialFolderLocation
_E37QINg@20
_m8EG3Fzd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ