C:\Users\THUNDEROBOT\Desktop\iremoval pro gsm\iRemoval4.0\Application Files\iRemovalPRO_1_0_0_0\iRemovalProWPF_src_pack\iRemovalProWPF\obj\Debug\net4.7.2\iRemovalProWPF.pdb
Static task
static1
Behavioral task
behavioral1
Sample
B888E5C71FBF4D927FB01EE81A537F1E.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
B888E5C71FBF4D927FB01EE81A537F1E.exe
Resource
win10v2004-20240226-en
General
-
Target
B888E5C71FBF4D927FB01EE81A537F1E.exe
-
Size
1.1MB
-
MD5
b888e5c71fbf4d927fb01ee81a537f1e
-
SHA1
12c4f8997f94e7148a64e76f0be09e7060284510
-
SHA256
c43501842aa992b148cf960ec61b47fb10cafdee534afbd6d4f37388ca72fa6e
-
SHA512
c23b6796768cd073f51f0c47ee78b64d4c2f02542609ff733423518b55322db9ee41bd7b3736486df314bbea3144d49f0b13f236a2059bb0a632cc07758b9abe
-
SSDEEP
24576:N4ItF/QAbcKOizQ1A0jkYU/Lgq+T2U5aOYVNa9s0O16rbMwZn7TZh9N+w0/OC/M8:btF/QAbcKOizQ1A0jkYU/Lgq+T2U5aOK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource B888E5C71FBF4D927FB01EE81A537F1E.exe
Files
-
B888E5C71FBF4D927FB01EE81A537F1E.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.~$) Size: - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.?L8 Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.%~q Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ