Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
35effbd9683a10ee7983ae415f768486f46ad8e77f257156f8fee6d8b638d396.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35effbd9683a10ee7983ae415f768486f46ad8e77f257156f8fee6d8b638d396.dll
Resource
win10v2004-20240508-en
Target
35effbd9683a10ee7983ae415f768486f46ad8e77f257156f8fee6d8b638d396
Size
56KB
MD5
34c7c6fc0cac7e84e326fd286419dfe6
SHA1
4835a6070d2464ceb3789dbe4c9bb6914f68c8f1
SHA256
35effbd9683a10ee7983ae415f768486f46ad8e77f257156f8fee6d8b638d396
SHA512
a39fdfc3362d72db2a0547275030579d819b1c9ac51608701dc24999097c3f250e0e87791b5255dd902aae0c0a0117891838f83baa83356ae142dc481d086fd6
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5HOOVpYklEq:oyUuAC6xopRbIHlY0
Checks for missing Authenticode signature.
resource |
---|
35effbd9683a10ee7983ae415f768486f46ad8e77f257156f8fee6d8b638d396 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ