?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
b444354f5587abe3fbdac80849e3f8f9484ced81c20894929a45b504ea77d520N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b444354f5587abe3fbdac80849e3f8f9484ced81c20894929a45b504ea77d520N.exe
Resource
win10v2004-20241007-en
Target
b444354f5587abe3fbdac80849e3f8f9484ced81c20894929a45b504ea77d520N
Size
94KB
MD5
8b37ffb4aa0944b3e2ac425d77343ff0
SHA1
032b9edf96240df828c205d4c9910fcddf04dfd4
SHA256
b444354f5587abe3fbdac80849e3f8f9484ced81c20894929a45b504ea77d520
SHA512
ba83c058d5d252ab1e99740ce632b251ac19ba8a5f1ce68b3e330790d5dbaaa4d27a24fa30086e18b1824811ff6237ee25552b5febba9a0a01f1fe6eea29e628
SSDEEP
1536:vE3pUfYcr/6rCwzs6yOc1ETzoFyYwP/bJFvYcWHBcPjqX1bXYbZJHTmiAnx2IYW:vE2fxrwCwzDyF1OoFyYsQpHu7qXVXYVw
Checks for missing Authenticode signature.
Processes:
resource |
---|
b444354f5587abe3fbdac80849e3f8f9484ced81c20894929a45b504ea77d520N |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UrlCompareA
ord29
ChrCmpIW
PathIsRootW
PathGetCharTypeW
PathGetDriveNumberW
StrCmpLogicalW
StrStrIW
PathIsSameRootA
UrlGetPartA
StrPBrkA
StrToIntA
lstrcatA
GetClassLongA
IsCharLowerA
LoadBitmapA
GetActiveWindow
GetProcessWindowStation
IsMenu
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ