?__egekhueaud@@YAOXZ
?__gvjvvsmgop@@YAKXZ
?__mqkyep@@YAFXZ
?__nmxshjwwal@@YAKXZ
?__qqxkwgcjdsxc@@YA_JXZ
?__xhzvesiojf@@YAHXZ
?__xifyegykcra@@YAFXZ
?__zsdzgjq@@YAOXZ
Static task
static1
Behavioral task
behavioral1
Sample
528140a532f35f415d1bcdb69f81efa1e7a4d005f1f576d6f1c3ae705d3af830.dll
Resource
win7-20240221-en
Target
528140a532f35f415d1bcdb69f81efa1e7a4d005f1f576d6f1c3ae705d3af830
Size
6.4MB
MD5
c0ebdb57f5327c4160f0eb188ee81f36
SHA1
d9aa3907ca0f78a74f697875ce625742137d9044
SHA256
528140a532f35f415d1bcdb69f81efa1e7a4d005f1f576d6f1c3ae705d3af830
SHA512
8fd899bdada216c81cac8dd97a1229c46072f9cd6c47be4f71dd89d4462f09ffcfd8e9e4ea1018fe989ce2767baaf4f8fdeaadacb367788f002a008da7035b38
SSDEEP
196608:pWEQrW9RykbAlXPHdju/MDMmYZhRT9T/ZZyPkv7s:wE6+ykbcHdjKHP5tREcv7
Checks for missing Authenticode signature.
resource |
---|
528140a532f35f415d1bcdb69f81efa1e7a4d005f1f576d6f1c3ae705d3af830 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
CreateFileW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetOEMCP
GetACP
EnterCriticalSection
LocalFree
GetSystemInfo
DeviceIoControl
RemoveDirectoryW
FlushFileBuffers
WritePrivateProfileStringW
InitializeSListHead
CompareFileTime
VirtualQuery
TlsGetValue
ExitProcess
GetCommandLineW
TlsAlloc
WinExec
IsValidCodePage
CloseHandle
WideCharToMultiByte
EncodePointer
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetCurrentThreadId
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
GetProcessHeap
GetModuleHandleExW
AreFileApisANSI
WriteFile
GetConsoleCP
GetConsoleMode
HeapSize
GetStdHandle
GetFileType
ReadFile
SetFilePointerEx
MessageBoxA
GetDlgItem
MessageBeep
ShowCaret
EnumWindows
GetScrollInfo
DrawStateW
GetKeyboardType
InsertMenuW
SetDlgItemTextA
ValidateRect
RegisterClassA
GetClientRect
UnionRect
IsDlgButtonChecked
IsWindow
GetSysColorBrush
EndPage
GetTextExtentPoint32A
CreateFontA
CreateBrushIndirect
SetStretchBltMode
Polyline
SetViewportExtEx
GetPixel
RestoreDC
SetLayout
SelectClipRgn
GetDeviceCaps
OpenProcessToken
RegQueryValueExW
ShellExecuteW
?__egekhueaud@@YAOXZ
?__gvjvvsmgop@@YAKXZ
?__mqkyep@@YAFXZ
?__nmxshjwwal@@YAKXZ
?__qqxkwgcjdsxc@@YA_JXZ
?__xhzvesiojf@@YAHXZ
?__xifyegykcra@@YAFXZ
?__zsdzgjq@@YAOXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ