ClassObject
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
78fe0e08e22028b71ac990771bdec8219a87d27733872a8c149d959dc36a3b3b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78fe0e08e22028b71ac990771bdec8219a87d27733872a8c149d959dc36a3b3b.dll
Resource
win10v2004-20241007-en
Target
78fe0e08e22028b71ac990771bdec8219a87d27733872a8c149d959dc36a3b3b
Size
200KB
MD5
d2cc0196c9987e00491af818fe7b4f01
SHA1
00d4ccf6ffd046d8154d001048b160cac7f58019
SHA256
78fe0e08e22028b71ac990771bdec8219a87d27733872a8c149d959dc36a3b3b
SHA512
5010c5bd0ff25b865b41df717c58e7b78eec0980b1ae6dfc1e086e91b02f341e80ca1bb659bdf9317fc414ef2122f299058c678aca44f6f5493136e5c853e28f
SSDEEP
3072:BVkgEz4rVOfek2THpgQqqMkPtghomXHNoh2+fS8BpuSNXVACL7IB:LkgEz4sjOp1tyoGX+fzGM2CE
Checks for missing Authenticode signature.
resource |
---|
78fe0e08e22028b71ac990771bdec8219a87d27733872a8c149d959dc36a3b3b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord772
strcspn
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
htonl
PathIsDirectoryA
CoUninitialize
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
ClassObject
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ