@@Unit1@Finalize
@@Unit1@Initialize
_Form1
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
62cdbaaa5195922c7b15b174a5bfa650N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62cdbaaa5195922c7b15b174a5bfa650N.exe
Resource
win10v2004-20240802-en
Target
62cdbaaa5195922c7b15b174a5bfa650N.exe
Size
3.1MB
MD5
62cdbaaa5195922c7b15b174a5bfa650
SHA1
2f5c84f62ea39fafa0cabc2eaf37eb6136dfa1a9
SHA256
d72e5a0034be64c079e02177360f7db46692ad3d9a37c3ad9330355aaf50f311
SHA512
b5971b41c896393fa2fbb19988cc0c7cb4e9706683454c81cd1a3c8e38ba258298b2f433a742ae72d5cd5c60a941ac37f04496a39e23e767895c687b7a412a5d
SSDEEP
98304:8yM1ZNxlfQqZa6MI1QR42nMMxMola8MMMMgYuLuNNUMMMMMM:ZM1ZNx+qj1A4
Checks for missing Authenticode signature.
resource |
---|
62cdbaaa5195922c7b15b174a5bfa650N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegSetValueExW
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetFileVersionInfoW
ord203
FlatSB_GetScrollPos
SelectPalette
AlphaBlend
LoadCursorW
OleInitialize
SafeArrayGetLBound
@@Unit1@Finalize
@@Unit1@Initialize
_Form1
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ