ClassObject
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
64fce1b19302867329a12788df0d19e0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
64fce1b19302867329a12788df0d19e0N.dll
Resource
win10v2004-20240802-en
Target
64fce1b19302867329a12788df0d19e0N.exe
Size
200KB
MD5
64fce1b19302867329a12788df0d19e0
SHA1
74371e34fa515a082acea644e47b3fff134c2800
SHA256
62d933b489e447b22dd61f2b781642538ed444600ae70eaf3a3a5c84f3531208
SHA512
bfcb0cb4c84f5c65a1c81bf10c19023897394b0d99d81bb8a2775ceb6e59e9ba757d439b1d212d787953e43dffa02390bb83afcb954f9aba9b8773077c29c894
SSDEEP
3072:BVkgEz4rVOfek2THpgQqqMkPtghomXHNoh2+fS8BpuSNXVACL7Is:LkgEz4sjOp1tyoGX+fzGM2CL
Checks for missing Authenticode signature.
resource |
---|
64fce1b19302867329a12788df0d19e0N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord772
strcspn
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
htonl
PathIsDirectoryA
CoUninitialize
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
ClassObject
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ