?DeleteJob@CSPApp@@QAEXK@Z
?GetSPApp@@YAAAVCSPApp@@XZ
?HelpPage@CSPApp@@QAEXXZ
?ParseCommandLine@CSPApp@@QAEXPB_W@Z
?RunJob@CSPApp@@QAEXK@Z
?Run_Code@CSPApp@@QAEXK@Z
?SupportInfo@CSPApp@@QAEXXZ
AfsSetMainWnd
Static task
static1
Behavioral task
behavioral1
Sample
969b4b9c889fbec39fae365ff4d7e5b1064dad94030a691e5b9c8479fc63289c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
969b4b9c889fbec39fae365ff4d7e5b1064dad94030a691e5b9c8479fc63289c.dll
Resource
win10v2004-20240319-en
Target
969b4b9c889fbec39fae365ff4d7e5b1064dad94030a691e5b9c8479fc63289c
Size
55KB
MD5
12e33995601af221c2aa85f51633a4bb
SHA1
9a89ecc009115c789e34c40deeaba4540857e475
SHA256
969b4b9c889fbec39fae365ff4d7e5b1064dad94030a691e5b9c8479fc63289c
SHA512
5a88a87b4e9b33fba3694409df2637d514ffaedb02017152c1397a9704cb2015acab90be2c7b8969d2e25ada1f23b7befe27731e0de68d9807198c6e0e38178d
SSDEEP
768:3z2I03MfUi6q/VcbHDSstxihwOiYkeEn+AilPeQcmnTEDR16hypnz:dfH6z5tx+RknjilP9ypz
Checks for missing Authenticode signature.
resource |
---|
969b4b9c889fbec39fae365ff4d7e5b1064dad94030a691e5b9c8479fc63289c |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
CreateFileA
GetFileSize
CreateMutexW
FindFirstFileW
lstrlenA
GetCurrentProcess
GetModuleHandleW
GetTickCount
WriteFile
Sleep
ReadFile
GetModuleFileNameW
lstrcatA
OpenMutexW
GetProcAddress
LocalAlloc
SetCurrentDirectoryW
lstrcmpiW
IsDebuggerPresent
CheckRemoteDebuggerPresent
LocalFree
ResumeThread
GetSystemTimeAsFileTime
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
IsProcessorFeaturePresent
?DeleteJob@CSPApp@@QAEXK@Z
?GetSPApp@@YAAAVCSPApp@@XZ
?HelpPage@CSPApp@@QAEXXZ
?ParseCommandLine@CSPApp@@QAEXPB_W@Z
?RunJob@CSPApp@@QAEXK@Z
?Run_Code@CSPApp@@QAEXK@Z
?SupportInfo@CSPApp@@QAEXXZ
AfsSetMainWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ