Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
e786e9087e6e16bd95ea8ed89dc0a389ffc5d6d0791beee5d0463024cf779d30.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e786e9087e6e16bd95ea8ed89dc0a389ffc5d6d0791beee5d0463024cf779d30.dll
Resource
win10v2004-20240508-en
Target
e786e9087e6e16bd95ea8ed89dc0a389ffc5d6d0791beee5d0463024cf779d30
Size
56KB
MD5
e0d92773b78deb8d154e973671053901
SHA1
4b036bf0af1feb429f1ff79671c23f483f338fd4
SHA256
e786e9087e6e16bd95ea8ed89dc0a389ffc5d6d0791beee5d0463024cf779d30
SHA512
efb4e4487f5e6b162c102fcfa02928e8223169ccb24a971e6aa0cb97ec9be2f9915d7e7b6232cbfeb4c97034879f5cc4e865b9a02e415fb1a3701ce2bf76a920
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5mOVb2Yklcq:oyUuAC6xopRbI32YI
Checks for missing Authenticode signature.
resource |
---|
e786e9087e6e16bd95ea8ed89dc0a389ffc5d6d0791beee5d0463024cf779d30 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ