ENProcess
HDDGuard
Static task
static1
Behavioral task
behavioral1
Sample
07389f7061212c2018c0cde9f490925d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07389f7061212c2018c0cde9f490925d.dll
Resource
win10v2004-20231215-en
Target
07389f7061212c2018c0cde9f490925d
Size
5KB
MD5
07389f7061212c2018c0cde9f490925d
SHA1
5d407dee386972debe047611a242e49c2c786bb4
SHA256
4541904d9c8f94acf8f577973dfc102fe9debf892525790688f4b25bd26bb742
SHA512
9b2d55c9a01e7032fa731489127839b20511129f86ca8b60c7463e727d17279834eb03a20adce3e8b421a0c75199d2842499e8632f0a82f7046ddec7d3c99107
SSDEEP
96:02nHe4TSDr15qRWLJQwbG/k5iP5VWcZHxUBNVJQP:02n+4mDpFC4G/kIP5VWW23JQ
Checks for missing Authenticode signature.
resource |
---|
07389f7061212c2018c0cde9f490925d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetCommandLineA
GetModuleFileNameA
GetPrivateProfileStringA
lstrlenA
TerminateProcess
GetCurrentProcess
WinExec
lstrcmpA
Sleep
DeleteFileA
GlobalAlloc
lstrcatA
lstrcpyA
GetSystemDirectoryA
GetModuleHandleA
CallNextHookEx
SetWindowsHookExA
CharUpperA
CharLowerA
wsprintfA
URLDownloadToFileA
DeleteUrlCacheEntry
ENProcess
HDDGuard
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ