fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
d4eb5122f211a4a528e9217054bb8234.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4eb5122f211a4a528e9217054bb8234.dll
Resource
win10v2004-20240226-en
Target
d4eb5122f211a4a528e9217054bb8234
Size
13KB
MD5
d4eb5122f211a4a528e9217054bb8234
SHA1
abf1541067edcb096e61ddabf4c0f492dfda8237
SHA256
f720f5a7716eb5d6c7d8df3cda2eb643c326877afcd8bbfee14fa356f9b9d708
SHA512
1674ecb43a421b8c7e469b972efb7365aaa0cbc4595dca641ba4e60963e6682f5c231270fff8a769d71b3aca49d2bc3117ad5f16f5b96a9b82839dac582c389f
SSDEEP
192:ji124ccTh0J9ftvRV+YK6Uw6w7UeeBE2P5rKkOvBDqPccblPBKnnnn4:W124phA9tvX+geBJTOvBun2n
Checks for missing Authenticode signature.
resource |
---|
d4eb5122f211a4a528e9217054bb8234 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadReadPtr
CreateThread
VirtualProtectEx
GetModuleFileNameA
GetCurrentProcess
Sleep
GetCommandLineA
GlobalFree
GetProcAddress
GetModuleHandleA
ReadProcessMemory
GlobalLock
GlobalAlloc
ToAscii
UnhookWindowsHookEx
CallNextHookEx
GetAsyncKeyState
GetKeyboardState
SetWindowsHookExA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
_adjust_fdiv
malloc
_initterm
free
strlen
_stricmp
strstr
strncpy
??2@YAPAXI@Z
memcpy
strrchr
strcpy
strcmp
strcat
sprintf
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ