x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
e2145cb4b6fcd5cf92997eafb9c140c9.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2145cb4b6fcd5cf92997eafb9c140c9.dll
Resource
win10v2004-20240226-en
Target
e2145cb4b6fcd5cf92997eafb9c140c9
Size
33KB
MD5
e2145cb4b6fcd5cf92997eafb9c140c9
SHA1
734ea0b53a69db863f68099f7907c1843b727302
SHA256
4ff3e764318d9fd1d793be8bc7ffa4951f56ea751bd29f8d87ba9e54cbf4a798
SHA512
3c2a48c8bb9c5a435534842e079df0e1ace5afbe51f5e737d82f428d21725ceee5908a36069ec7b3a03d9f0aaf15a385450668ee29c17ca86ad6604bf5fc5614
SSDEEP
384:OazWLLr89GA5K++joAkvrY+xCJMA6i4e7kNq:FU8QAgkv0gCJMUpA
Checks for missing Authenticode signature.
resource |
---|
e2145cb4b6fcd5cf92997eafb9c140c9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
HeapFree
HeapReAlloc
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
lstrcatA
MulDiv
GetTickCount
CloseHandle
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
HeapAlloc
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
FindNextFileW
GetModuleHandleW
PulseEvent
OpenEventA
WriteFile
ResetEvent
GetCommandLineW
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
GlobalAlloc
lstrcpynA
lstrcpyA
CreateEventA
GlobalFree
ShowWindowAsync
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
SetDlgItemTextA
CharLowerBuffA
GetClientRect
GetWindowRect
CreateWindowExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetReadFile
InternetSetFilePointer
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetOpenA
InternetConnectA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ