ClassObject
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
e8394ef0dd670cf7a69639bf2106f7dc4164d835ac9eba9cffa1d687471db82a.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e8394ef0dd670cf7a69639bf2106f7dc4164d835ac9eba9cffa1d687471db82a.dll
Resource
win10v2004-20240802-en
Target
e8394ef0dd670cf7a69639bf2106f7dc4164d835ac9eba9cffa1d687471db82a
Size
200KB
MD5
8c7ad35fbe94ba6610d42e4fc06e5135
SHA1
73e0a3940995e4c22f7688e4168df5728cf1e292
SHA256
e8394ef0dd670cf7a69639bf2106f7dc4164d835ac9eba9cffa1d687471db82a
SHA512
062225a9bb9588269ea317f4a8edebe6c91c649e8f0d2e3b85bf2cd62528b9489e9532c37c210f93771cd2ef3003b536e9d5da2fa554c558c2bae2442fc5c246
SSDEEP
3072:BVkgEz4rVOfek2THpgQqqMkPtghomXHNoh2+fS8BpuSNXVACL7IL:LkgEz4sjOp1tyoGX+fzGM2Cc
Checks for missing Authenticode signature.
resource |
---|
e8394ef0dd670cf7a69639bf2106f7dc4164d835ac9eba9cffa1d687471db82a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord772
strcspn
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
htonl
PathIsDirectoryA
CoUninitialize
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
ClassObject
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ