DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a8165731ebcdd5a3a03d89916849ab30.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a8165731ebcdd5a3a03d89916849ab30.dll
Resource
win10v2004-20231020-en
Target
NEAS.a8165731ebcdd5a3a03d89916849ab30.exe
Size
48KB
MD5
a8165731ebcdd5a3a03d89916849ab30
SHA1
ad082dd22d0fcba8bd82a883bdf709790713136f
SHA256
a0b052c462d893d2b0eb22210a0b2a80dcfc5ca8e8bf7acf10b799591a923256
SHA512
22bec0a197e3e585f16fff4c34116493e550a3d35605815d0c35af69af0f4d378a8ea339fd0c881b4efc29e0aba2c6404c2f8b543bf9fa49339b00632153c197
SSDEEP
384:IILVH2VE3PkKeKFD/fhuqrr47cHNcEF97EGWcbv7xuY:IIFz3PkTkBuqr8YHNvF97EGWcF
Checks for missing Authenticode signature.
resource |
---|
NEAS.a8165731ebcdd5a3a03d89916849ab30.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
WindowsCreateString
WindowsGetStringRawBuffer
DisableThreadLibraryCalls
GetModuleHandleW
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
_vsnprintf
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcspn
strlen
wcscmp
wcslen
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ