0@24
OGC
_Sd
PvQ@24
Static task
static1
Behavioral task
behavioral1
Sample
d741ee06ec0f19c58bfbe53ef5a84a81.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d741ee06ec0f19c58bfbe53ef5a84a81.exe
Resource
win10v2004-20240226-en
Target
d741ee06ec0f19c58bfbe53ef5a84a81
Size
206KB
MD5
d741ee06ec0f19c58bfbe53ef5a84a81
SHA1
8c2c68010c49dd3455c8e49d70d881ea0d721915
SHA256
a0631d380f73d1f5b9a79ac93480db61b3acfb6252574c2896a0570dc87756a2
SHA512
1273621c6046bb0bf38e17ab243154800533063cd0280bacacab263e3cb7a949a166e2307a67cd5ea8bd674b96405ddfd8a8b6e7ca047ba6307b98625a73fd93
SSDEEP
3072:vIov7F+yMOA+de1dqwHrc4nCIo3sJkceai6UXGGr4f51Q8OL1Oz1+UJCoAo:Nv7Mh2YLcM2sfeatcGC8iL1e1+UJCoA
Checks for missing Authenticode signature.
resource |
---|
d741ee06ec0f19c58bfbe53ef5a84a81 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetTopWindow
AdjustWindowRectEx
GetDlgItem
CallNextHookEx
IsCharLowerA
CallWindowProcA
GetMenuItemCount
GetFocus
BeginPaint
CharUpperA
LoadIconA
IsCharUpperA
SHStrDupA
PathIsDirectoryA
PathGetCharTypeA
SHGetValueA
SHDeleteKeyA
PathFileExistsA
lstrlenA
GetCurrentThreadId
LocalFree
GetCurrentThread
GetCurrentProcess
GetLastError
LocalReAlloc
VirtualAlloc
LocalAlloc
0@24
OGC
_Sd
PvQ@24
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ