ClassObject
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
1fd07863bdaa7dedb39f56c7f41e02a0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1fd07863bdaa7dedb39f56c7f41e02a0N.dll
Resource
win10v2004-20240709-en
Target
1fd07863bdaa7dedb39f56c7f41e02a0N.exe
Size
200KB
MD5
1fd07863bdaa7dedb39f56c7f41e02a0
SHA1
909689a18b71f6b9a96637f8b3a86460349b7184
SHA256
06b371b8025f0ff5fc427fc5215797ef94538d4eb58c531f90282b3ed7daccad
SHA512
8c943d9099c9840403d1276c716c995b0e41466a7beae7ce47eff1c30423eb35e21de7110093c285708c1233252f67a71cb22135a60a1c1a7e87cb1f9eae7221
SSDEEP
3072:BVkgEz4rVOfek2THpgQqqMkPtghomXHNoh2+fS8BpuSNXVACL7IS:LkgEz4sjOp1tyoGX+fzGM2CD
Checks for missing Authenticode signature.
resource |
---|
1fd07863bdaa7dedb39f56c7f41e02a0N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord772
strcspn
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
htonl
PathIsDirectoryA
CoUninitialize
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
ClassObject
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ