?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
Resource
win10v2004-20241007-en
Target
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
Size
95KB
MD5
947e80d98a8c8eda82327937f91ec3b0
SHA1
66392ee63d5fb6a8ea4daf066205277eb11eb06c
SHA256
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2
SHA512
4a4d7892815a9dcf1e649c9eec849a6f9478dd4ac88b650cb2cf80c124ca26c2daf8bc4a9ac71927c7411ee1a538fa9025414f0a69d382e7b93486c61c28d83c
SSDEEP
1536:Q87uzDyU3cDzaw6qbKXK1A7TI+a8TFM8Er3s0X0vRWs+vwM1hxN:Q87uzD/sDf6qbK61YC8TTErcN0/
Checks for missing Authenticode signature.
resource |
---|
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetClassLongA
GetActiveWindow
IsMenu
IsCharLowerA
GetProcessWindowStation
LoadBitmapA
lstrcatA
PathIsRootW
PathGetCharTypeW
ChrCmpIW
StrToIntA
PathGetDriveNumberW
PathIsSameRootA
StrCmpLogicalW
StrStrIW
ord29
UrlCompareA
StrPBrkA
UrlGetPartA
?FormFactor@@YGXUverifyEw@CA7
?FormWeight@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ