erc
fdsew
Static task
static1
Behavioral task
behavioral1
Sample
cdaac24adfe5717eab3957ce49a0e769.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cdaac24adfe5717eab3957ce49a0e769.dll
Resource
win10v2004-20240226-en
Target
cdaac24adfe5717eab3957ce49a0e769
Size
40KB
MD5
cdaac24adfe5717eab3957ce49a0e769
SHA1
8be92cd99ca71f9f45aa34f771286e93cb575cfb
SHA256
544f4a2054b25b2c81d6a07498b393192df6182547348477c33aa6adbe5598ab
SHA512
cd645108d201d0b17c5c8475a0f80bba777bbe4ebe929c9c83e46e97975e6b7e32f0145748e85ef39fac0b8e920d8d27f19ab8df57a84972856ae53957cef1ce
SSDEEP
768:h/S1B6NCNVIQX6DRuzArXCy4gIqkRie5orr:h61BqRugyy4gKW3
Checks for missing Authenticode signature.
resource |
---|
cdaac24adfe5717eab3957ce49a0e769 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
ExitProcess
MultiByteToWideChar
TerminateProcess
CreateProcessA
CopyFileA
VirtualAlloc
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
OpenThread
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
SendMessageA
FindWindowExA
IsWindowVisible
RegOpenKeyExA
RegCloseKey
RegSetValueExA
wcslen
_strlwr
_stricmp
_strupr
__CxxFrameHandler
strchr
strncpy
??3@YAXPAX@Z
strstr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
_strcmpi
strlen
erc
fdsew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ