fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
c710c7dc8855bcf989d789a91d29e220.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c710c7dc8855bcf989d789a91d29e220.dll
Resource
win10v2004-20240226-en
Target
c710c7dc8855bcf989d789a91d29e220
Size
7KB
MD5
c710c7dc8855bcf989d789a91d29e220
SHA1
0f9471e7f3fc76ad9cba93d943396bb740dc81f3
SHA256
67e5c80b322bd3b02e08dfbed7da8c2ebb778ea2b748fb6c5c63669bc08692f3
SHA512
8dd03acf0f8a9f0649464f91414692bbb0b1cce990bedfc0772ba66581ec277d4d67c36b7b69fa593f3c1025275225a5fb39c40d6cd62c5853d4234c792007ab
SSDEEP
96:V8r80jb6swgqIzaz1dS2li+QLBJOJmqki5hCDQ6:Z0fhaPiLBgJmqvHsQ
Checks for missing Authenticode signature.
resource |
---|
c710c7dc8855bcf989d789a91d29e220 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Sleep
GetCurrentProcess
ExitProcess
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcat
strcpy
strlen
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ