lokihyr4cxw34d6frgu
lpi897bt674drtfdrr
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_09222b3190d150266a66a8254dbeee85.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VirusShare_09222b3190d150266a66a8254dbeee85.dll
Resource
win10v2004-20240426-en
Target
VirusShare_09222b3190d150266a66a8254dbeee85
Size
123KB
MD5
09222b3190d150266a66a8254dbeee85
SHA1
b15197891adcf0f6746d353d03f414e4b07489c2
SHA256
3ba02ca583c31b44b9bbaf98b4ddb12de0a5f62e8234712ae58eb9d455b787c4
SHA512
a091d3f20b05c5af5e0e5a5551897f5773d03fd931e6948ff39fc992d899d5e9bee1f59f256ced414e08ad1fc1b7d5ac0fde93cf271b1f7d58a1f0dd26877222
SSDEEP
1536:nffdERmW+PoQsmm/TZxuPU7qq3SIR3txXEbP08Ksgz5X0ya+UYonmXp:ffa+PovZxuuq0SIR3txUbT+5X03rbm5
Checks for missing Authenticode signature.
resource |
---|
VirusShare_09222b3190d150266a66a8254dbeee85 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
printf
free
memset
wcsrchr
_initterm
_adjust_fdiv
malloc
RegCreateKeyExW
CoTaskMemFree
lstrlenW
VirtualAlloc
GetComputerNameW
FreeLibrary
lstrcmpA
FreeConsole
MultiByteToWideChar
lstrcatW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
CreateEventW
InitializeCriticalSection
CompareStringW
GetSystemDirectoryW
UnhandledExceptionFilter
GetCurrentProcess
GlobalUnlock
LoadLibraryW
VirtualFree
GrayStringA
GetSubMenu
GetCapture
IsWindow
CreatePopupMenu
PtInRect
SetClipboardData
InvertRect
LoadStringW
GetQueueStatus
ClientToScreen
DeleteObject
GetTextExtentPointW
GetDeviceCaps
CreateCompatibleDC
SelectObject
DeleteDC
lokihyr4cxw34d6frgu
lpi897bt674drtfdrr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ