awerotl
big
emupaud
main
meku
yawaotc
Static task
static1
Behavioral task
behavioral1
Sample
5d00a8cf0e4cb18bb1448dc4764842b37ca5ef94664a0a75ea4e90a9a67a54e9.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5d00a8cf0e4cb18bb1448dc4764842b37ca5ef94664a0a75ea4e90a9a67a54e9.dll
Resource
win10v2004-20240419-en
Target
5d00a8cf0e4cb18bb1448dc4764842b37ca5ef94664a0a75ea4e90a9a67a54e9
Size
659KB
MD5
f6f6e6f2b7d7c9075a4bb78c0f72c33e
SHA1
d5eb75790926f647bd88c6e092250dd22be7f8b9
SHA256
5d00a8cf0e4cb18bb1448dc4764842b37ca5ef94664a0a75ea4e90a9a67a54e9
SHA512
640a6702aa3924c3c8da0254f46077483b961cc7770bec910900c9f839bdcaceba94657490495f296b87db40961b98942e236f6dff62451de63e91faeef4b5f3
SSDEEP
12288:Gcp0PVBHqserIEJS1JDbHijfy/Xu/i/P+b9vPNmBtinL4dXzR8Ik4pv:Gcy9pqserItdR
Checks for missing Authenticode signature.
resource |
---|
5d00a8cf0e4cb18bb1448dc4764842b37ca5ef94664a0a75ea4e90a9a67a54e9 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
LoadLibraryA
WriteConsoleW
CloseHandle
CreateFileW
OutputDebugStringW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
GetModuleFileNameW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCurrentThread
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlsAlloc
FlsGetValue
RtlUnwind
ord3
OleUIInsertObjectW
ord1
OleUIAddVerbMenuW
OleUIPasteSpecialW
OleUIEditLinksW
ord5
OleUIChangeIconW
ord6
OleUIConvertW
ord7
ord2
OleUIBusyW
ord8
OleUIChangeSourceW
ord12
OleUIObjectPropertiesW
ord11
OleUIUpdateLinksW
ord9
ord4
UpdatePerfNameFilesW
UpdatePerfNameFilesA
SetServiceAsTrustedA
InstallPerfDllW
InstallPerfDllA
SetServiceAsTrustedW
SafeArrayGetLBound
VarI2FromBool
VarI2FromR8
VarCyFromUI2
VarR8FromUI1
VarR8FromUI4
VarCyFromUI1
LHashValOfNameSys
LHashValOfNameSysA
CreateErrorInfo
VariantCopy
VarBoolFromI4
VarBoolFromUI2
SysStringByteLen
VarR8FromUI2
awerotl
big
emupaud
main
meku
yawaotc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ