fvsuuysuxxjjj
mdnydxyhe
zpukgmukzhuykrc
Static task
static1
Behavioral task
behavioral1
Sample
c39c7a20528029dd5201263527a147f0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c39c7a20528029dd5201263527a147f0.exe
Resource
win10v2004-20240226-en
Target
c39c7a20528029dd5201263527a147f0
Size
128KB
MD5
c39c7a20528029dd5201263527a147f0
SHA1
975d2daa672630b2e225d7f239830ee14ce6737a
SHA256
832951b0183cd7cc5a2839996d02975e9f3d4537f08da2a089a2609aa323d388
SHA512
dba07def7f1b02e6f042df2c04d0ef4c5bed73f8c3895c95099f756bccc4b357a1547be48266a3eef2deab74252dabae46411ead686e8750cea7bccb4e853a55
SSDEEP
1536:yRhaW9yRFmj3/Iruw3It/7avoXMBgITL9xJOCnFtLo+NiI1Ixe:yRhaW9UoLWusvocBvT5x1Fi+NJwe
Checks for missing Authenticode signature.
resource |
---|
c39c7a20528029dd5201263527a147f0 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
VirtualAlloc
HeapAlloc
TerminateProcess
LoadLibraryA
IsBadReadPtr
lstrcmpiA
GetProcAddress
GetStringTypeW
AssignProcessToJobObject
GetProcessHeap
UpdateResourceA
RedrawWindow
TrackPopupMenuEx
DefDlgProcA
EndPath
GetCurrentPositionEx
GetTextCharsetInfo
StrokePath
fvsuuysuxxjjj
mdnydxyhe
zpukgmukzhuykrc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ