ClassObject
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
623a03863e8bdaa6145edcf24749bf84121dfea43a1263c434a91e6b07519b19N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
623a03863e8bdaa6145edcf24749bf84121dfea43a1263c434a91e6b07519b19N.dll
Resource
win10v2004-20241007-en
Target
623a03863e8bdaa6145edcf24749bf84121dfea43a1263c434a91e6b07519b19N
Size
200KB
MD5
c65d26b3349dbc52c91021cfe0308980
SHA1
eafc023e5ebdf60fe5bb5f61ce863451ed1cd926
SHA256
623a03863e8bdaa6145edcf24749bf84121dfea43a1263c434a91e6b07519b19
SHA512
e430a191b085fe5192dfd07f3f1db2571632079e81b15bb39c9d44b327efaea58a5fe79256e8cbbd91800b98b09df38077752d7d76c47386a4d2b137669f856c
SSDEEP
3072:BVkgEz4rVOfek2THpgQqqMkPtghomXHNoh2+fS8BpuSNXVACL7In:LkgEz4sjOp1tyoGX+fzGM2CG
Checks for missing Authenticode signature.
resource |
---|
623a03863e8bdaa6145edcf24749bf84121dfea43a1263c434a91e6b07519b19N |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord772
strcspn
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
htonl
PathIsDirectoryA
CoUninitialize
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
ClassObject
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ