fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
e1edadcbf5007f1dee33d754509a92f1.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e1edadcbf5007f1dee33d754509a92f1.dll
Resource
win10v2004-20231215-en
Target
e1edadcbf5007f1dee33d754509a92f1
Size
10KB
MD5
e1edadcbf5007f1dee33d754509a92f1
SHA1
2c37965c773d641a180b0861459d84adae5b7a8e
SHA256
3829dc0efa6dec58ae1332cc0301b282b14327e92b1695838100454745131733
SHA512
5b4a486bb1e9e98227d7475d4e7c101630d1c2403269da7cb47ecc020a975c3542eb3efc8526e665abfe06bcedcd7041dd756ef34cf4fd8b388d3d3d48ee2c79
SSDEEP
96:FWMQ+hGhb43HvsmSXajSvksmBsygy7NU8T5fEkppfKIkXr0AjNFlafZsT85bdKAS:cMQ+SCPsvoYmmeUCpfK3XBy6TLAS
Checks for missing Authenticode signature.
resource |
---|
e1edadcbf5007f1dee33d754509a92f1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetProcAddress
GetModuleHandleA
Sleep
GetCommandLineA
GetModuleFileNameA
ReadProcessMemory
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
IsBadReadPtr
VirtualProtectEx
CreateThread
GlobalFree
SetWindowsHookExA
ToUnicode
GetAsyncKeyState
CallNextHookEx
MapVirtualKeyA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
strcmp
_adjust_fdiv
malloc
_initterm
free
memset
strstr
strncpy
memcpy
strrchr
strcpy
strlen
_stricmp
strcat
sprintf
??2@YAPAXI@Z
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ