EnHookWindow
UnHookWindow
fs448547aaaa
Static task
static1
Behavioral task
behavioral1
Sample
0b43cd6b3e6e4c4e702ca2c51ff1f233.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b43cd6b3e6e4c4e702ca2c51ff1f233.dll
Resource
win10v2004-20231215-en
Target
0b43cd6b3e6e4c4e702ca2c51ff1f233
Size
21KB
MD5
0b43cd6b3e6e4c4e702ca2c51ff1f233
SHA1
958e6004b8169a8d67f4142fb4e5185e6f77ea55
SHA256
4799a74d1f8d472b39b808a795bc601462f8b22f930ad9c3508e9dc050a6817f
SHA512
7a21b6bf6be6bd65c5a65c73b3eb93d48db1a35f5fb5fa9d4a18f7e29a81fccf75eb95f27ac46aa450729eb7b7cf889257bcd298ee51bc88fc000d7daa1be1f9
SSDEEP
384:VlPyZNjtU2mLAZMXRO4htCdAwV5OZjjElzxsH+Zd:VdyZiRXROmDiU1jQxsH4
Checks for missing Authenticode signature.
resource |
---|
0b43cd6b3e6e4c4e702ca2c51ff1f233 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fs448547aaaa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ